PowerSwitch S3048-ON

Dell PowerSwitch S3048-ON User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S3048-ON User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S3048–ON
System
9.11(2.0P1)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 05
Rev. A00
Contents
1 About this Guide...........................................................................................................................................33
Audience............................................................................................................................................................................33
Conventions......................................................................................................................................................................33
Related Documents......................................................................................................................................................... 33
2 Conguration Fundamentals........................................................................................................................ 34
Accessing the Command Line........................................................................................................................................34
CLI Modes.........................................................................................................................................................................34
Navigating CLI Modes...............................................................................................................................................36
The do Command............................................................................................................................................................ 39
Undoing Commands........................................................................................................................................................ 39
Obtaining Help..................................................................................................................................................................40
Entering and Editing Commands................................................................................................................................... 40
Command History.............................................................................................................................................................41
Filtering show Command Outputs..................................................................................................................................41
Example of the grep Keyword................................................................................................................................... 41
Multiple Users in Conguration Mode...........................................................................................................................42
3 Getting Started............................................................................................................................................44
Console Access................................................................................................................................................................45
Serial Console.............................................................................................................................................................45
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................46
Entering CLI commands Using an SSH Connection..............................................................................................46
Executing Local CLI Scripts Using an SSH Connection........................................................................................46
Default Conguration.......................................................................................................................................................47
Conguring a Host Name................................................................................................................................................47
Accessing the System Remotely....................................................................................................................................47
Accessing the System Remotely..............................................................................................................................47
Congure the Management Port IP Address......................................................................................................... 47
Congure a Management Route..............................................................................................................................48
Conguring a Username and Password..................................................................................................................48
Conguring the Enable Password..................................................................................................................................48
Conguration File Management.....................................................................................................................................49
Copy Files to and from the System......................................................................................................................... 49
Mounting an NFS File System..................................................................................................................................50
Save the Running-Conguration.............................................................................................................................. 51
Congure the Overload Bit for a Startup Scenario............................................................................................... 52
Viewing Files...............................................................................................................................................................52
Compressing Conguration Files............................................................................................................................. 53
Managing the File System.............................................................................................................................................. 56
Enabling Software Features on Devices Using a Command Option......................................................................... 56
View Command History...................................................................................................................................................57
Contents
3
Upgrading Dell Networking OS.......................................................................................................................................57
Verify Software Images Before Installation...................................................................................................................57
Using HTTP for File Transfers........................................................................................................................................ 58
4 Management............................................................................................................................................... 60
Conguring Privilege Levels........................................................................................................................................... 60
Creating a Custom Privilege Level............................................................................................................................61
Removing a Command from EXEC Mode............................................................................................................... 61
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................ 61
Allowing Access to CONFIGURATION Mode Commands.....................................................................................61
Allowing Access to Dierent Modes........................................................................................................................ 61
Applying a Privilege Level to a Username............................................................................................................... 63
Applying a Privilege Level to a Terminal Line.......................................................................................................... 63
Conguring Logging........................................................................................................................................................ 63
Audit and Security Logs............................................................................................................................................ 64
Conguring Logging Format ...................................................................................................................................66
Display the Logging Buer and the Logging Conguration..................................................................................66
Setting Up a Secure Connection to a Syslog Server.............................................................................................67
Sending System Messages to a Syslog Server......................................................................................................68
Track Login Activity......................................................................................................................................................... 68
Restrictions for Tracking Login Activity...................................................................................................................68
Conguring Login Activity Tracking......................................................................................................................... 68
Display Login Statistics..............................................................................................................................................69
Limit Concurrent Login Sessions....................................................................................................................................70
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................70
Conguring Concurrent Session Limit......................................................................................................................71
Enabling the System to Clear Existing Sessions..................................................................................................... 71
Enabling Secured CLI Mode............................................................................................................................................72
Log Messages in the Internal Buer..............................................................................................................................72
Conguration Task List for System Log Management.......................................................................................... 72
Disabling System Logging............................................................................................................................................... 72
Sending System Messages to a Syslog Server............................................................................................................ 73
Conguring a UNIX System as a Syslog Server.....................................................................................................73
Changing System Logging Settings...............................................................................................................................73
Display the Logging Buer and the Logging Conguration........................................................................................ 74
Conguring a UNIX Logging Facility Level....................................................................................................................75
Synchronizing Log Messages......................................................................................................................................... 76
Enabling Timestamp on Syslog Messages.................................................................................................................... 76
File Transfer Services.......................................................................................................................................................77
Conguration Task List for File Transfer Services.................................................................................................. 77
Enabling the FTP Server........................................................................................................................................... 77
Conguring FTP Server Parameters........................................................................................................................77
Conguring FTP Client Parameters......................................................................................................................... 78
Terminal Lines................................................................................................................................................................... 78
Denying and Permitting Access to a Terminal Line................................................................................................79
Conguring Login Authentication for Terminal Lines.............................................................................................80
4
Contents
Setting Timeout for EXEC Privilege Mode....................................................................................................................81
Using Telnet to get to Another Network Device...........................................................................................................81
Lock CONFIGURATION Mode....................................................................................................................................... 82
Viewing the Conguration Lock Status...................................................................................................................82
LPC Bus Quality Degradation......................................................................................................................................... 82
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................83
Reloading the system...................................................................................................................................................... 83
5 802.1X......................................................................................................................................................... 85
Port-Authentication Process.......................................................................................................................................... 87
EAP over RADIUS...................................................................................................................................................... 87
Conguring 802.1X...........................................................................................................................................................88
Related Conguration Tasks..................................................................................................................................... 88
Important Points to Remember......................................................................................................................................88
Conguring dot1x Prole ................................................................................................................................................89
Conguring MAC addresses for a do1x Prole.............................................................................................................89
Conguring the Static MAB and MAB Prole .............................................................................................................89
Conguring Critical VLAN ..............................................................................................................................................90
Enabling 802.1X................................................................................................................................................................ 92
Conguring Request Identity Re-Transmissions...........................................................................................................93
Conguring a Quiet Period after a Failed Authentication..................................................................................... 94
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 95
Re-Authenticating a Port................................................................................................................................................95
Conguring Timeouts......................................................................................................................................................96
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................97
Guest and Authentication-Fail VLANs.......................................................................................................................... 98
Conguring a Guest VLAN....................................................................................................................................... 99
Conguring an Authentication-Fail VLAN...............................................................................................................99
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)...................................101
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................................................................101
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 102
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................102
Conguring ACL VLAN Groups.............................................................................................................................. 102
Conguring FP Blocks for VLAN Parameters.......................................................................................................103
Viewing CAM Usage...................................................................................................................................................... 104
Allocating FP Blocks for VLAN Processes.................................................................................................................. 105
7 Access Control Lists (ACLs)....................................................................................................................... 107
IP Access Control Lists (ACLs).....................................................................................................................................108
CAM Usage...............................................................................................................................................................109
Implementing ACLs on Dell Networking OS..........................................................................................................109
Important Points to Remember......................................................................................................................................111
Conguration Task List for Route Maps..................................................................................................................111
Conguring Match Routes.......................................................................................................................................113
Conguring Set Conditions......................................................................................................................................114
Contents
5
Congure a Route Map for Route Redistribution..................................................................................................115
Congure a Route Map for Route Tagging............................................................................................................ 116
Continue Clause........................................................................................................................................................ 116
IP Fragment Handling..................................................................................................................................................... 117
IP Fragments ACL Examples....................................................................................................................................117
Layer 4 ACL Rules Examples....................................................................................................................................117
Congure a Standard IP ACL.........................................................................................................................................118
Conguring a Standard IP ACL Filter......................................................................................................................119
Congure an Extended IP ACL.....................................................................................................................................120
Conguring Filters with a Sequence Number.......................................................................................................120
Conguring Filters Without a Sequence Number................................................................................................. 121
Congure Layer 2 and Layer 3 ACLs............................................................................................................................122
Assign an IP ACL to an Interface..................................................................................................................................123
Applying an IP ACL.........................................................................................................................................................123
Counting ACL Hits....................................................................................................................................................124
Congure Ingress ACLs................................................................................................................................................. 124
Congure Egress ACLs.................................................................................................................................................. 124
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 125
IP Prex Lists.................................................................................................................................................................. 126
Implementation Information.................................................................................................................................... 126
Conguration Task List for Prex Lists.................................................................................................................. 126
ACL Resequencing......................................................................................................................................................... 130
Resequencing an ACL or Prex List.......................................................................................................................130
Route Maps.....................................................................................................................................................................132
Implementation Information.................................................................................................................................... 132
Logging of ACL Processes............................................................................................................................................ 132
Guidelines for Conguring ACL Logging................................................................................................................133
Conguring ACL Logging.........................................................................................................................................133
Flow-Based Monitoring Support for ACLs.................................................................................................................. 134
Behavior of Flow-Based Monitoring.......................................................................................................................134
Enabling Flow-Based Monitoring............................................................................................................................135
8 Bidirectional Forwarding Detection (BFD)...................................................................................................137
How BFD Works..............................................................................................................................................................137
BFD Packet Format..................................................................................................................................................138
BFD Sessions............................................................................................................................................................ 139
BFD Three-Way Handshake.................................................................................................................................... 140
Session State Changes............................................................................................................................................142
Important Points to Remember.................................................................................................................................... 142
Congure BFD................................................................................................................................................................ 142
Congure BFD for Physical Ports...........................................................................................................................143
Congure BFD for Static Routes............................................................................................................................144
Congure BFD for OSPF......................................................................................................................................... 147
Congure BFD for OSPFv3.....................................................................................................................................150
Congure BFD for IS-IS............................................................................................................................................151
Congure BFD for BGP...........................................................................................................................................153
6
Contents
Congure BFD for VRRP.........................................................................................................................................160
Conguring Protocol Liveness................................................................................................................................ 163
Troubleshooting BFD................................................................................................................................................163
9 Border Gateway Protocol IPv4 (BGPv4).................................................................................................... 165
Autonomous Systems (AS)...........................................................................................................................................165
Sessions and Peers.........................................................................................................................................................167
Establish a Session................................................................................................................................................... 167
Route Reectors.............................................................................................................................................................168
BGP Attributes................................................................................................................................................................169
Best Path Selection Criteria....................................................................................................................................169
Weight.........................................................................................................................................................................171
Local Preference........................................................................................................................................................171
Multi-Exit Discriminators (MEDs)...........................................................................................................................172
Origin..........................................................................................................................................................................173
AS Path...................................................................................................................................................................... 174
Next Hop....................................................................................................................................................................174
Multiprotocol BGP.......................................................................................................................................................... 174
Implement BGP with Dell Networking OS...................................................................................................................175
Additional Path (Add-Path) Support......................................................................................................................175
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 175
Ignore Router-ID in Best-Path Calculation............................................................................................................ 176
Four-Byte AS Numbers............................................................................................................................................176
AS4 Number Representation.................................................................................................................................. 176
AS Number Migration...............................................................................................................................................178
BGP4 Management Information Base (MIB)........................................................................................................179
Important Points to Remember.............................................................................................................................. 179
Conguration Information..............................................................................................................................................180
BGP Conguration......................................................................................................................................................... 180
Enabling BGP.............................................................................................................................................................181
Conguring AS4 Number Representations........................................................................................................... 184
Conguring Peer Groups.........................................................................................................................................186
Conguring BGP Fast Fall-Over.............................................................................................................................188
Conguring Passive Peering................................................................................................................................... 190
Maintaining Existing AS Numbers During an AS Migration.................................................................................190
Allowing an AS Number to Appear in its Own AS Path........................................................................................191
Enabling Graceful Restart........................................................................................................................................192
Enabling Neighbor Graceful Restart.......................................................................................................................193
Filtering on an AS-Path Attribute........................................................................................................................... 193
Regular Expressions as Filters.................................................................................................................................195
Redistributing Routes.............................................................................................................................................. 196
Enabling Additional Paths........................................................................................................................................ 197
Conguring IP Community Lists............................................................................................................................. 197
Conguring an IP Extended Community List........................................................................................................198
Filtering Routes with Community Lists..................................................................................................................199
Manipulating the COMMUNITY Attribute............................................................................................................200
Contents
7
Changing MED Attributes....................................................................................................................................... 201
Changing the LOCAL_PREFERENCE Attribute.................................................................................................. 201
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............ 202
Changing the WEIGHT Attribute...........................................................................................................................203
Enabling Multipath...................................................................................................................................................203
Filtering BGP Routes...............................................................................................................................................203
Filtering BGP Routes Using Route Maps..............................................................................................................205
Filtering BGP Routes Using AS-PATH Information............................................................................................. 205
Conguring BGP Route Reectors....................................................................................................................... 206
Aggregating Routes................................................................................................................................................. 207
Conguring BGP Confederations...........................................................................................................................207
Enabling Route Flap Dampening............................................................................................................................ 208
Changing BGP Timers............................................................................................................................................. 210
Enabling BGP Neighbor Soft-Reconguration..................................................................................................... 210
Enabling or disabling BGP neighbors...................................................................................................................... 211
Route Map Continue................................................................................................................................................213
Enabling MBGP Congurations.................................................................................................................................... 213
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor.......................................... 214
BGP Regular Expression Optimization.........................................................................................................................214
Debugging BGP.............................................................................................................................................................. 214
Storing Last and Bad PDUs.....................................................................................................................................215
Capturing PDUs........................................................................................................................................................216
PDU Counters........................................................................................................................................................... 217
Sample Congurations................................................................................................................................................... 217
10 Content Addressable Memory (CAM).......................................................................................................224
CAM Allocation...............................................................................................................................................................224
Test CAM Usage............................................................................................................................................................226
View CAM-ACL Settings.............................................................................................................................................. 226
View CAM Usage...........................................................................................................................................................228
CAM Optimization......................................................................................................................................................... 228
Troubleshoot CAM Proling..........................................................................................................................................228
QoS CAM Region Limitation...................................................................................................................................228
11 Control Plane Policing (CoPP).................................................................................................................. 229
Congure Control Plane Policing................................................................................................................................. 230
Conguring CoPP for Protocols............................................................................................................................. 231
Conguring CoPP for CPU Queues...................................................................................................................... 233
CoPP for OSPFv3 Packets.....................................................................................................................................234
Conguring CoPP for OSPFv3...............................................................................................................................237
Displaying CoPP Conguration ..............................................................................................................................237
12 Dynamic Host Conguration Protocol (DHCP)......................................................................................... 240
DHCP Packet Format and Options............................................................................................................................. 240
Assign an IP Address using DHCP...............................................................................................................................242
Implementation Information..........................................................................................................................................243
8
Contents
Congure the System to be a DHCP Server..............................................................................................................243
Conguring the Server for Automatic Address Allocation..................................................................................244
Specifying a Default Gateway................................................................................................................................ 245
Congure a Method of Hostname Resolution..................................................................................................... 245
Using DNS for Address Resolution........................................................................................................................245
Using NetBIOS WINS for Address Resolution..................................................................................................... 246
Creating Manual Binding Entries............................................................................................................................246
Debugging the DHCP Server................................................................................................................................. 246
Using DHCP Clear Commands...............................................................................................................................247
Congure the System to be a Relay Agent.................................................................................................................247
Congure the System to be a DHCP Client............................................................................................................... 249
Conguring the DHCP Client System................................................................................................................... 249
DHCP Client on a Management Interface............................................................................................................250
DHCP Client Operation with Other Features........................................................................................................251
Congure the System for User Port Stacking (Option 230)....................................................................................252
Congure Secure DHCP............................................................................................................................................... 252
Option 82..................................................................................................................................................................252
DHCP Snooping.......................................................................................................................................................253
Drop DHCP Packets on Snooped VLANs Only....................................................................................................256
Dynamic ARP Inspection.........................................................................................................................................257
Conguring Dynamic ARP Inspection................................................................................................................... 258
Source Address Validation............................................................................................................................................ 259
Enabling IP Source Address Validation..................................................................................................................259
DHCP MAC Source Address Validation................................................................................................................ 260
Enabling IP+MAC Source Address Validation.......................................................................................................260
Viewing the Number of SAV Dropped Packets.................................................................................................... 261
Clearing the Number of SAV Dropped Packets....................................................................................................261
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 262
ECMP for Flow-Based Anity.....................................................................................................................................262
Conguring the Hash Algorithm............................................................................................................................ 262
Enabling Deterministic ECMP Next Hop.............................................................................................................. 262
Conguring the Hash Algorithm Seed.................................................................................................................. 263
Link Bundle Monitoring................................................................................................................................................. 263
Managing ECMP Group Paths...............................................................................................................................264
Creating an ECMP Group Bundle..........................................................................................................................264
Modifying the ECMP Group Threshold.................................................................................................................264
14 FIPS Cryptography...................................................................................................................................266
Conguration Tasks....................................................................................................................................................... 266
Preparing the System....................................................................................................................................................266
Enabling FIPS Mode...................................................................................................................................................... 267
Generating Host-Keys................................................................................................................................................... 267
Monitoring FIPS Mode Status......................................................................................................................................267
Disabling FIPS Mode..................................................................................................................................................... 268
Contents
9
15 Force10 Resilient Ring Protocol (FRRP)...................................................................................................269
Protocol Overview.........................................................................................................................................................269
Ring Status............................................................................................................................................................... 270
Multiple FRRP Rings................................................................................................................................................270
Important FRRP Points............................................................................................................................................271
Important FRRP Concepts..................................................................................................................................... 272
Implementing FRRP.......................................................................................................................................................273
FRRP Conguration.......................................................................................................................................................273
Creating the FRRP Group.......................................................................................................................................273
Conguring the Control VLAN............................................................................................................................... 274
Conguring and Adding the Member VLANs.......................................................................................................275
Setting the FRRP Timers........................................................................................................................................276
Clearing the FRRP Counters.................................................................................................................................. 276
Viewing the FRRP Conguration........................................................................................................................... 276
Viewing the FRRP Information...............................................................................................................................276
Troubleshooting FRRP...................................................................................................................................................277
Conguration Checks.............................................................................................................................................. 277
Sample Conguration and Topology............................................................................................................................ 277
FRRP Support on VLT...................................................................................................................................................278
Example Scenario.....................................................................................................................................................279
Important Points to Remember............................................................................................................................. 280
16 GARP VLAN Registration Protocol (GVRP).............................................................................................. 281
Important Points to Remember.................................................................................................................................... 281
Congure GVRP.............................................................................................................................................................282
Related Conguration Tasks................................................................................................................................... 282
Enabling GVRP Globally................................................................................................................................................ 283
Enabling GVRP on a Layer 2 Interface........................................................................................................................283
Congure GVRP Registration.......................................................................................................................................283
Congure a GARP Timer.............................................................................................................................................. 284
RPM Redundancy..........................................................................................................................................................284
17 High Availability (HA)................................................................................................................................286
Component Redundancy.............................................................................................................................................. 286
Automatic and Manual Stack Unit Failover.......................................................................................................... 286
Synchronization between Management and Standby Units.............................................................................. 287
Forcing a Stack Unit Failover..................................................................................................................................287
Specifying an Auto-Failover Limit.......................................................................................................................... 288
Disabling Auto-Reboot............................................................................................................................................ 288
Manually Synchronizing Management and Standby Units................................................................................. 288
Pre-Conguring a Stack Unit Slot............................................................................................................................... 288
Removing a Provisioned Logical Stack Unit............................................................................................................... 289
Hitless Behavior............................................................................................................................................................. 289
Graceful Restart.............................................................................................................................................................289
Software Resiliency.......................................................................................................................................................290
10
Contents
Software Component Health Monitoring............................................................................................................. 290
System Health Monitoring......................................................................................................................................290
Failure and Event Logging...................................................................................................................................... 290
Hot-Lock Behavior......................................................................................................................................................... 291
18 Internet Group Management Protocol (IGMP)......................................................................................... 292
IGMP Implementation Information...............................................................................................................................292
IGMP Protocol Overview..............................................................................................................................................292
IGMP Version 2........................................................................................................................................................ 292
IGMP Version 3........................................................................................................................................................ 294
Congure IGMP............................................................................................................................................................. 297
Related Conguration Tasks................................................................................................................................... 297
Viewing IGMP Enabled Interfaces...............................................................................................................................298
Selecting an IGMP Version...........................................................................................................................................298
Viewing IGMP Groups...................................................................................................................................................298
Adjusting Timers............................................................................................................................................................ 299
Adjusting Query and Response Timers................................................................................................................. 299
Preventing a Host from Joining a Group.................................................................................................................... 300
Enabling IGMP Immediate-Leave.................................................................................................................................303
IGMP Snooping..............................................................................................................................................................303
IGMP Snooping Implementation Information....................................................................................................... 303
Conguring IGMP Snooping...................................................................................................................................303
Removing a Group-Port Association.....................................................................................................................304
Disabling Multicast Flooding...................................................................................................................................304
Specifying a Port as Connected to a Multicast Router...................................................................................... 305
Conguring the Switch as Querier........................................................................................................................ 305
Fast Convergence after MSTP Topology Changes...................................................................................................306
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................306
Protocol Separation.................................................................................................................................................306
Enabling and Disabling Management Egress Interface Selection...................................................................... 307
Handling of Management Route Conguration................................................................................................... 308
Handling of Switch-Initiated Trac.......................................................................................................................309
Handling of Switch-Destined Trac..................................................................................................................... 309
Handling of Transit Trac (Trac Separation).....................................................................................................310
Mapping of Management Applications and Trac Type..................................................................................... 310
Behavior of Various Applications for Switch-Initiated Trac ..............................................................................311
Behavior of Various Applications for Switch-Destined Trac ........................................................................... 312
Interworking of EIS With Various Applications......................................................................................................313
Designating a Multicast Router Interface....................................................................................................................313
19 Interfaces..................................................................................................................................................315
Basic Interface Conguration........................................................................................................................................315
Advanced Interface Conguration................................................................................................................................315
Interface Types............................................................................................................................................................... 316
View Basic Interface Information..................................................................................................................................316
Resetting an Interface to its Factory Default State................................................................................................... 318
Contents
11
Enabling a Physical Interface.........................................................................................................................................318
Enabling Energy Ecient Ethernet.............................................................................................................................. 319
View EEE Information.................................................................................................................................................... 319
Clear EEE Counters....................................................................................................................................................... 324
Physical Interfaces.........................................................................................................................................................324
Conguration Task List for Physical Interfaces.................................................................................................... 324
Overview of Layer Modes...................................................................................................................................... 325
Conguring Layer 2 (Data Link) Mode..................................................................................................................325
Conguring Layer 2 (Interface) Mode.................................................................................................................. 326
Conguring Layer 3 (Network) Mode...................................................................................................................326
Conguring Layer 3 (Interface) Mode.................................................................................................................. 326
Egress Interface Selection (EIS).................................................................................................................................. 327
Important Points to Remember..............................................................................................................................327
Conguring EIS.........................................................................................................................................................327
Management Interfaces................................................................................................................................................328
Conguring Management Interfaces.....................................................................................................................328
Conguring a Management Interface on an Ethernet Port................................................................................329
VLAN Interfaces............................................................................................................................................................ 330
Loopback Interfaces.......................................................................................................................................................331
Null Interfaces................................................................................................................................................................. 331
Port Channel Interfaces................................................................................................................................................ 332
Port Channel Denition and Standards.................................................................................................................332
Port Channel Benets............................................................................................................................................. 332
Port Channel Implementation.................................................................................................................................332
Interfaces in Port Channels.................................................................................................................................... 333
Conguration Tasks for Port Channel Interfaces.................................................................................................333
Creating a Port Channel..........................................................................................................................................333
Adding a Physical Interface to a Port Channel.....................................................................................................334
Reassigning an Interface to a New Port Channel................................................................................................335
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 336
Adding or Removing a Port Channel from a VLAN............................................................................................. 336
Assigning an IP Address to a Port Channel.......................................................................................................... 338
Deleting or Disabling a Port Channel.....................................................................................................................338
Load Balancing Through Port Channels................................................................................................................338
Changing the Hash Algorithm................................................................................................................................338
Bulk Conguration......................................................................................................................................................... 340
Interface Range........................................................................................................................................................340
Bulk Conguration Examples..................................................................................................................................340
Dening Interface Range Macros................................................................................................................................ 342
Dene the Interface Range.................................................................................................................................... 342
Choosing an Interface-Range Macro.................................................................................................................... 342
Monitoring and Maintaining Interfaces........................................................................................................................342
Maintenance Using TDR......................................................................................................................................... 343
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................344
Link Dampening..............................................................................................................................................................344
12
Contents
Important Points to Remember............................................................................................................................. 345
Enabling Link Dampening........................................................................................................................................345
Link Bundle Monitoring................................................................................................................................................. 346
Using Ethernet Pause Frames for Flow Control........................................................................................................ 347
Enabling Pause Frames........................................................................................................................................... 348
Congure the MTU Size on an Interface....................................................................................................................348
Port-Pipes.......................................................................................................................................................................349
Auto-Negotiation on Ethernet Interfaces...................................................................................................................349
Setting the Speed of Ethernet Interfaces............................................................................................................ 349
Set Auto-Negotiation Options................................................................................................................................ 351
View Advanced Interface Information..........................................................................................................................351
Conguring the Interface Sampling Size.............................................................................................................. 352
Conguring the Trac Sampling Size Globally...........................................................................................................353
Dynamic Counters......................................................................................................................................................... 355
Clearing Interface Counters................................................................................................................................... 355
20 Internet Protocol Security (IPSec)...........................................................................................................357
Conguring IPSec .........................................................................................................................................................357
21 IPv4 Routing............................................................................................................................................ 359
IP Addresses...................................................................................................................................................................360
Implementation Information................................................................................................................................... 360
Conguration Tasks for IP Addresses......................................................................................................................... 360
Assigning IP Addresses to an Interface.......................................................................................................................360
Conguring Static Routes............................................................................................................................................. 361
Congure Static Routes for the Management Interface..........................................................................................362
IPv4 Path MTU Discovery Overview.......................................................................................................................... 363
Using the Congured Source IP Address in ICMP Messages..................................................................................363
Conguring the ICMP Source Interface............................................................................................................... 363
Conguring the Duration to Establish a TCP Connection........................................................................................ 364
Enabling Directed Broadcast........................................................................................................................................ 364
Resolution of Host Names............................................................................................................................................364
Enabling Dynamic Resolution of Host Names............................................................................................................365
Specifying the Local System Domain and a List of Domains................................................................................... 365
Conguring DNS with Traceroute............................................................................................................................... 366
ARP................................................................................................................................................................................. 366
Conguration Tasks for ARP........................................................................................................................................ 367
Conguring Static ARP Entries....................................................................................................................................367
Enabling Proxy ARP.......................................................................................................................................................367
Clearing ARP Cache......................................................................................................................................................368
ARP Learning via Gratuitous ARP............................................................................................................................... 368
Enabling ARP Learning via Gratuitous ARP................................................................................................................368
ARP Learning via ARP Request................................................................................................................................... 368
Conguring ARP Retries...............................................................................................................................................369
ICMP................................................................................................................................................................................370
Conguration Tasks for ICMP...................................................................................................................................... 370
Contents
13
Enabling ICMP Unreachable Messages...................................................................................................................... 370
UDP Helper.....................................................................................................................................................................370
Congure UDP Helper.............................................................................................................................................370
Important Points to Remember.............................................................................................................................. 371
Enabling UDP Helper......................................................................................................................................................371
Conguring a Broadcast Address................................................................................................................................. 371
Congurations Using UDP Helper................................................................................................................................372
UDP Helper with Broadcast-All Addresses................................................................................................................. 372
UDP Helper with Subnet Broadcast Addresses.........................................................................................................373
UDP Helper with Congured Broadcast Addresses.................................................................................................. 373
UDP Helper with No Congured Broadcast Addresses............................................................................................ 374
Troubleshooting UDP Helper........................................................................................................................................ 374
22 IPv6 Routing............................................................................................................................................ 375
Protocol Overview......................................................................................................................................................... 375
Extended Address Space........................................................................................................................................376
Stateless Autoconguration....................................................................................................................................376
IPv6 Headers............................................................................................................................................................ 376
IPv6 Header Fields................................................................................................................................................... 377
Extension Header Fields..........................................................................................................................................379
Addressing................................................................................................................................................................ 380
Implementing IPv6 with Dell Networking OS..............................................................................................................381
ICMPv6...........................................................................................................................................................................382
Path MTU Discovery.....................................................................................................................................................383
IPv6 Neighbor Discovery.............................................................................................................................................. 383
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................384
Conguration Task List for IPv6 RDNSS.................................................................................................................... 384
Conguring the IPv6 Recursive DNS Server....................................................................................................... 384
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................385
Displaying IPv6 RDNSS Information......................................................................................................................386
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 386
Conguration Tasks for IPv6........................................................................................................................................ 387
Adjusting Your CAM-Prole.................................................................................................................................... 387
Assigning an IPv6 Address to an Interface...........................................................................................................388
Assigning a Static IPv6 Route................................................................................................................................388
Conguring Telnet with IPv6..................................................................................................................................389
SNMP over IPv6......................................................................................................................................................389
Displaying IPv6 Information....................................................................................................................................389
Displaying an IPv6 Interface Information.............................................................................................................. 390
Showing IPv6 Routes..............................................................................................................................................390
Showing the Running-Conguration for an Interface.........................................................................................392
Clearing IPv6 Routes...............................................................................................................................................392
Disabling ND Entry Timeout................................................................................................................................... 392
Conguring IPv6 RA Guard.......................................................................................................................................... 393
Conguring IPv6 RA Guard on an Interface.........................................................................................................394
Monitoring IPv6 RA Guard..................................................................................................................................... 395
14
Contents
23 Intermediate System to Intermediate System.......................................................................................... 396
IS-IS Protocol Overview............................................................................................................................................... 396
IS-IS Addressing.............................................................................................................................................................396
Multi-Topology IS-IS.......................................................................................................................................................397
Transition Mode........................................................................................................................................................397
Interface Support.....................................................................................................................................................398
Adjacencies...............................................................................................................................................................398
Graceful Restart.............................................................................................................................................................398
Timers....................................................................................................................................................................... 398
Implementation Information..........................................................................................................................................398
Conguration Information.............................................................................................................................................399
Conguration Tasks for IS-IS................................................................................................................................. 400
Conguring the Distance of a Route.....................................................................................................................407
Changing the IS-Type.............................................................................................................................................. 408
Redistributing IPv4 Routes......................................................................................................................................410
Redistributing IPv6 Routes...................................................................................................................................... 411
Conguring Authentication Passwords..................................................................................................................412
Setting the Overload Bit..........................................................................................................................................412
Debugging IS-IS........................................................................................................................................................413
IS-IS Metric Styles..........................................................................................................................................................414
Congure Metric Values................................................................................................................................................ 414
Maximum Values in the Routing Table................................................................................................................... 414
Change the IS-IS Metric Style in One Level Only.................................................................................................414
Leaks from One Level to Another...........................................................................................................................416
Sample Congurations................................................................................................................................................... 417
24 Link Aggregation Control Protocol (LACP)............................................................................................... 419
Introduction to Dynamic LAGs and LACP................................................................................................................... 419
Important Points to Remember.............................................................................................................................. 419
LACP Modes............................................................................................................................................................ 420
Conguring LACP Commands............................................................................................................................... 420
LACP Conguration Tasks.............................................................................................................................................421
Creating a LAG..........................................................................................................................................................421
Conguring the LAG Interfaces as Dynamic.........................................................................................................421
Setting the LACP Long Timeout............................................................................................................................422
Monitoring and Debugging LACP.......................................................................................................................... 422
Shared LAG State Tracking.......................................................................................................................................... 423
Conguring Shared LAG State Tracking............................................................................................................... 423
Important Points about Shared LAG State Tracking........................................................................................... 425
LACP Basic Conguration Example............................................................................................................................ 425
Congure a LAG on ALPHA................................................................................................................................... 425
25 Layer 2.....................................................................................................................................................434
Manage the MAC Address Table................................................................................................................................. 434
Clearing the MAC Address Table........................................................................................................................... 434
Contents
15
Setting the Aging Time for Dynamic Entries........................................................................................................434
Conguring a Static MAC Address........................................................................................................................435
Displaying the MAC Address Table........................................................................................................................ 435
MAC Learning Limit.......................................................................................................................................................435
Setting the MAC Learning Limit............................................................................................................................ 436
mac learning-limit Dynamic.....................................................................................................................................436
mac learning-limit mac-address-sticky................................................................................................................. 436
mac learning-limit station-move.............................................................................................................................437
mac learning-limit no-station-move.......................................................................................................................437
Learning Limit Violation Actions............................................................................................................................. 437
Setting Station Move Violation Actions................................................................................................................ 438
Recovering from Learning Limit and Station Move Violations........................................................................... 438
Disabling MAC Address Learning on the System.................................................................................................439
NIC Teaming................................................................................................................................................................... 439
Congure Redundant Pairs...........................................................................................................................................440
Important Points about Conguring Redundant Pairs........................................................................................ 442
Far-End Failure Detection............................................................................................................................................. 443
FEFD State Changes...............................................................................................................................................444
Conguring FEFD.................................................................................................................................................... 445
Enabling FEFD on an Interface...............................................................................................................................445
Debugging FEFD......................................................................................................................................................446
26 Link Layer Discovery Protocol (LLDP)..................................................................................................... 448
802.1AB (LLDP) Overview............................................................................................................................................448
Protocol Data Units................................................................................................................................................. 448
Optional TLVs................................................................................................................................................................. 449
Management TLVs.................................................................................................................................................. 449
TIA-1057 (LLDP-MED) Overview................................................................................................................................. 451
TIA Organizationally Specic TLVs......................................................................................................................... 451
Congure LLDP............................................................................................................................................................. 455
Related Conguration Tasks...................................................................................................................................455
Important Points to Remember............................................................................................................................. 455
LLDP Compatibility..................................................................................................................................................456
CONFIGURATION versus INTERFACE Congurations............................................................................................ 456
Enabling LLDP................................................................................................................................................................456
Disabling and Undoing LLDP.................................................................................................................................. 457
Enabling LLDP on Management Ports........................................................................................................................ 457
Disabling and Undoing LLDP on Management Ports.......................................................................................... 457
Advertising TLVs............................................................................................................................................................ 457
Viewing the LLDP Conguration................................................................................................................................. 459
Viewing Information Advertised by Adjacent LLDP Agents..................................................................................... 459
Conguring LLDPDU Intervals.....................................................................................................................................460
Conguring Transmit and Receive Mode.................................................................................................................... 461
Conguring the Time to Live Value.............................................................................................................................. 461
Debugging LLDP............................................................................................................................................................462
Relevant Management Objects................................................................................................................................... 463
16
Contents
27 Microsoft Network Load Balancing.......................................................................................................... 468
NLB Unicast Mode Scenario........................................................................................................................................468
NLB Multicast Mode Scenario.....................................................................................................................................468
Limitations of the NLB Feature....................................................................................................................................469
Microsoft Clustering......................................................................................................................................................469
Enable and Disable VLAN Flooding ............................................................................................................................ 469
Conguring a Switch for NLB .....................................................................................................................................469
Enabling a Switch for Multicast NLB.....................................................................................................................470
28 Multicast Source Discovery Protocol (MSDP)..........................................................................................471
Protocol Overview..........................................................................................................................................................471
Anycast RP..................................................................................................................................................................... 472
Implementation Information..........................................................................................................................................473
Congure Multicast Source Discovery Protocol........................................................................................................ 473
Related Conguration Tasks................................................................................................................................... 473
Enable MSDP..................................................................................................................................................................477
Manage the Source-Active Cache.............................................................................................................................. 478
Viewing the Source-Active Cache.........................................................................................................................478
Limiting the Source-Active Cache.........................................................................................................................478
Clearing the Source-Active Cache........................................................................................................................ 479
Enabling the Rejected Source-Active Cache....................................................................................................... 479
Accept Source-Active Messages that Fail the RFP Check......................................................................................479
Specifying Source-Active Messages...........................................................................................................................482
Limiting the Source-Active Messages from a Peer...................................................................................................483
Preventing MSDP from Caching a Local Source.......................................................................................................483
Preventing MSDP from Caching a Remote Source.................................................................................................. 484
Preventing MSDP from Advertising a Local Source..................................................................................................484
Logging Changes in Peership States...........................................................................................................................485
Terminating a Peership..................................................................................................................................................485
Clearing Peer Statistics.................................................................................................................................................486
Debugging MSDP.......................................................................................................................................................... 486
MSDP with Anycast RP................................................................................................................................................ 487
Conguring Anycast RP................................................................................................................................................488
Reducing Source-Active Message Flooding.........................................................................................................489
Specifying the RP Address Used in SA Messages.............................................................................................. 489
MSDP Sample Congurations...................................................................................................................................... 491
29 Multiple Spanning Tree Protocol (MSTP)................................................................................................ 494
Protocol Overview.........................................................................................................................................................494
Spanning Tree Variations.............................................................................................................................................. 495
Implementation Information................................................................................................................................... 495
Congure Multiple Spanning Tree Protocol................................................................................................................495
Related Conguration Tasks...................................................................................................................................496
Enable Multiple Spanning Tree Globally...................................................................................................................... 496
Adding and Removing Interfaces.................................................................................................................................496
Contents
17
Creating Multiple Spanning Tree Instances.................................................................................................................497
Inuencing MSTP Root Selection................................................................................................................................498
Interoperate with Non-Dell Bridges.............................................................................................................................498
Changing the Region Name or Revision..................................................................................................................... 499
Modifying Global Parameters.......................................................................................................................................499
Modifying the Interface Parameters........................................................................................................................... 500
Conguring an EdgePort...............................................................................................................................................501
Flush MAC Addresses after a Topology Change....................................................................................................... 502
MSTP Sample Congurations......................................................................................................................................502
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................503
Debugging and Verifying MSTP Congurations........................................................................................................ 506
30 Multicast Features...................................................................................................................................508
Enabling IP Multicast.....................................................................................................................................................508
Implementation Information......................................................................................................................................... 508
Multicast Policies...........................................................................................................................................................509
IPv4 Multicast Policies............................................................................................................................................509
Understanding Multicast Traceroute (mtrace)........................................................................................................... 516
Important Points to Remember.............................................................................................................................. 517
Printing Multicast Traceroute (mtrace) Paths............................................................................................................ 517
Supported Error Codes..................................................................................................................................................518
mtrace Scenarios............................................................................................................................................................519
31 Object Tracking........................................................................................................................................ 525
Object Tracking Overview............................................................................................................................................ 525
Track Layer 2 Interfaces..........................................................................................................................................526
Track Layer 3 Interfaces..........................................................................................................................................526
Track IPv4 and IPv6 Routes................................................................................................................................... 527
Set Tracking Delays................................................................................................................................................. 528
VRRP Object Tracking............................................................................................................................................ 528
Object Tracking Conguration......................................................................................................................................528
Tracking a Layer 2 Interface................................................................................................................................... 528
Tracking a Layer 3 Interface................................................................................................................................... 529
Track an IPv4/IPv6 Route.......................................................................................................................................531
Displaying Tracked Objects...........................................................................................................................................534
32 Open Shortest Path First (OSPFv2 and OSPFv3)....................................................................................536
Protocol Overview.........................................................................................................................................................536
Autonomous System (AS) Areas........................................................................................................................... 536
Area Types................................................................................................................................................................ 537
Networks and Neighbors........................................................................................................................................538
Router Types............................................................................................................................................................ 538
Designated and Backup Designated Routers.......................................................................................................540
Link-State Advertisements (LSAs)........................................................................................................................540
Router Priority and Cost..........................................................................................................................................541
18
Contents
OSPF with Dell Networking OS...................................................................................................................................542
Graceful Restart.......................................................................................................................................................543
Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................544
Multi-Process OSPFv2 with VRF..........................................................................................................................544
OSPF ACK Packing................................................................................................................................................. 544
Setting OSPF Adjacency with Cisco Routers...................................................................................................... 544
Conguration Information.............................................................................................................................................545
Conguration Task List for OSPFv2 (OSPF for IPv4)........................................................................................ 545
Conguration Task List for OSPFv3 (OSPF for IPv6).............................................................................................. 559
Enabling IPv6 Unicast Routing.............................................................................................................................. 560
Applying cost for OSPFv3......................................................................................................................................560
Assigning IPv6 Addresses on an Interface............................................................................................................ 561
Assigning Area ID on an Interface.......................................................................................................................... 561
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................ 561
Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................562
Conguring Stub Areas...........................................................................................................................................562
Conguring Passive-Interface................................................................................................................................563
Redistributing Routes..............................................................................................................................................563
Conguring a Default Route...................................................................................................................................563
Enabling OSPFv3 Graceful Restart.......................................................................................................................564
OSPFv3 Authentication Using IPsec.....................................................................................................................566
Troubleshooting OSPFv3........................................................................................................................................ 572
33 Policy-based Routing (PBR).................................................................................................................... 574
Overview.........................................................................................................................................................................574
Implementing PBR.........................................................................................................................................................575
Conguration Task List for Policy-based Routing......................................................................................................575
PBR Exceptions (Permit)........................................................................................................................................575
Create a Redirect List..............................................................................................................................................576
Create a Rule for a Redirect-list.............................................................................................................................576
Apply a Redirect-list to an Interface using a Redirect-group..............................................................................578
Sample Conguration....................................................................................................................................................580
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD...... 581
34 PIM Sparse-Mode (PIM-SM).................................................................................................................. 584
Implementation Information..........................................................................................................................................584
Protocol Overview.........................................................................................................................................................584
Requesting Multicast Trac...................................................................................................................................584
Refuse Multicast Trac..........................................................................................................................................585
Send Multicast Trac.............................................................................................................................................585
Conguring PIM-SM.....................................................................................................................................................585
Related Conguration Tasks...................................................................................................................................586
Enable PIM-SM..............................................................................................................................................................586
Conguring S,G Expiry Timers..................................................................................................................................... 587
Conguring a Static Rendezvous Point...................................................................................................................... 588
Overriding Bootstrap Router Updates.................................................................................................................. 588
Contents
19
Conguring a Designated Router................................................................................................................................ 588
Creating Multicast Boundaries and Domains............................................................................................................. 589
35 PIM Source-Specic Mode (PIM-SSM).................................................................................................. 590
Implementation Information......................................................................................................................................... 590
Important Points to Remember............................................................................................................................. 590
Congure PIM-SSM.......................................................................................................................................................591
Related Conguration Tasks....................................................................................................................................591
Enabling PIM-SSM.........................................................................................................................................................591
Use PIM-SSM with IGMP Version 2 Hosts.................................................................................................................591
Conguring PIM-SSM with IGMPv2.....................................................................................................................592
Electing an RP using the BSR Mechanism.................................................................................................................593
Enabling RP to Server Specic Multicast Groups...............................................................................................593
36 Port Monitoring....................................................................................................................................... 595
Important Points to Remember................................................................................................................................... 595
Port Monitoring..............................................................................................................................................................596
Conguring Port Monitoring........................................................................................................................................ 598
Conguring Monitor Multicast Queue........................................................................................................................ 599
Enabling Flow-Based Monitoring.................................................................................................................................600
Remote Port Mirroring...................................................................................................................................................601
Remote Port Mirroring Example.............................................................................................................................601
Conguring Remote Port Mirroring.......................................................................................................................602
Displaying Remote-Port Mirroring Congurations...............................................................................................604
Conguring the Sample Remote Port Mirroring..................................................................................................604
Encapsulated Remote Port Monitoring.......................................................................................................................607
ERPM Behavior on a typical Dell Networking OS .................................................................................................... 609
Decapsulation of ERPM packets at the Destination IP/ Analyzer.....................................................................609
Port Monitoring on VLT................................................................................................................................................. 610
VLT Non-fail over Scenario..................................................................................................................................... 610
VLT Fail-over Scenario..............................................................................................................................................611
RPM over VLT Scenarios......................................................................................................................................... 611
37 Private VLANs (PVLAN)...........................................................................................................................613
Private VLAN Concepts................................................................................................................................................ 613
Using the Private VLAN Commands............................................................................................................................614
Conguration Task List.................................................................................................................................................. 615
Creating PVLAN ports.............................................................................................................................................615
Creating a Primary VLAN........................................................................................................................................ 616
Creating a Community VLAN..................................................................................................................................617
Creating an Isolated VLAN...................................................................................................................................... 617
Private VLAN Conguration Example..........................................................................................................................619
Inspecting the Private VLAN Conguration...............................................................................................................620
38 Per-VLAN Spanning Tree Plus (PVST+)................................................................................................... 622
Protocol Overview.........................................................................................................................................................622
20
Contents
/