PowerSwitch Z9100-ON

Dell PowerSwitch Z9100-ON User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch Z9100-ON User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Networking OS Configuration Guide
for the Z9100–ON System
9.14.2.4
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Other trademarks may be trademarks of their respective owners.
2019 - 11
Rev. A00
1 About this Guide......................................................................................................................... 32
Audience............................................................................................................................................................................... 32
Conventions......................................................................................................................................................................... 32
Related Documents.............................................................................................................................................................32
2 Configuration Fundamentals....................................................................................................... 33
Accessing the Command Line............................................................................................................................................33
CLI Modes............................................................................................................................................................................ 33
Navigating CLI Modes...................................................................................................................................................35
The do Command................................................................................................................................................................ 37
Undoing Commands............................................................................................................................................................38
Obtaining Help..................................................................................................................................................................... 38
Entering and Editing Commands....................................................................................................................................... 38
Command History................................................................................................................................................................39
Filtering show Command Outputs.................................................................................................................................... 39
Multiple Users in Configuration Mode.............................................................................................................................. 40
Configuring alias command................................................................................................................................................. 41
Viewing alias configuration............................................................................................................................................41
3 Getting Started..........................................................................................................................43
Console Access....................................................................................................................................................................43
Serial Console.................................................................................................................................................................43
Micro USB-B Access.....................................................................................................................................................44
Default Configuration..........................................................................................................................................................45
Configuring a Host Name...................................................................................................................................................45
Accessing the System Remotely.......................................................................................................................................45
Configure the Management Port IP Address............................................................................................................ 45
Configure a Management Route................................................................................................................................. 46
Configuring a Username and Password......................................................................................................................46
Configuring the Enable Password..................................................................................................................................... 46
Configuration File Management.........................................................................................................................................47
Copy Files to and from the System.............................................................................................................................47
Mounting an NFS File System..................................................................................................................................... 48
Save the Running-Configuration................................................................................................................................. 49
Configure the Overload Bit for a Startup Scenario...................................................................................................50
Viewing Files...................................................................................................................................................................50
Managing the File System...................................................................................................................................................51
View Command History.......................................................................................................................................................51
Upgrading Dell EMC Networking OS................................................................................................................................53
Using HTTP for File Transfers........................................................................................................................................... 53
Verify Software Images Before Installation......................................................................................................................53
4 Management..............................................................................................................................55
Configuring Privilege Levels...............................................................................................................................................55
Contents
Contents 3
Removing a Command from EXEC Mode..................................................................................................................56
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................... 56
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 56
Allowing Access to Different Modes...........................................................................................................................56
Applying a Privilege Level to a Username...................................................................................................................57
Applying a Privilege Level to a Terminal Line............................................................................................................. 57
Configuring Logging............................................................................................................................................................58
Audit and Security Logs................................................................................................................................................58
Configuring Logging Format ................................................................................................................................ 59
Setting Up a Secure Connection to a Syslog Server.......................................................................................60
Log Messages in the Internal Buffer..................................................................................................................................61
Disabling System Logging................................................................................................................................................... 61
Sending System Messages to a Syslog Server................................................................................................................ 61
Configuring a UNIX System as a Syslog Server.........................................................................................................61
Track Login Activity............................................................................................................................................................ 62
Restrictions for Tracking Login Activity......................................................................................................................62
Configuring Login Activity Tracking............................................................................................................................ 62
Display Login Statistics................................................................................................................................................. 62
Limit Concurrent Login Sessions.......................................................................................................................................64
Restrictions for Limiting the Number of Concurrent Sessions................................................................................64
Configuring Concurrent Session Limit........................................................................................................................ 64
Enabling the System to Clear Existing Sessions........................................................................................................64
Enabling Secured CLI Mode...............................................................................................................................................65
Changing System Logging Settings..................................................................................................................................65
Display the Logging Buffer and the Logging Configuration...........................................................................................66
Configuring a UNIX Logging Facility Level....................................................................................................................... 67
Synchronizing Log Messages.............................................................................................................................................67
Enabling Timestamp on Syslog Messages........................................................................................................................68
File Transfer Services..........................................................................................................................................................70
Enabling the FTP Server................................................................................................................................................71
Configuring FTP Server Parameters............................................................................................................................71
Configuring FTP Client Parameters............................................................................................................................. 71
Terminal Lines...................................................................................................................................................................... 72
Denying and Permitting Access to a Terminal Line................................................................................................... 72
Configuring Login Authentication for Terminal Lines................................................................................................73
Setting Timeout for EXEC Privilege Mode.......................................................................................................................74
Using Telnet to get to Another Network Device.............................................................................................................74
Lock CONFIGURATION Mode.......................................................................................................................................... 75
LPC Bus Quality Degradation.............................................................................................................................................75
Reloading the system..........................................................................................................................................................76
Restoring the Factory Default Settings............................................................................................................................ 77
Restoring Factory Default Environment Variables.....................................................................................................77
Viewing the Reason for Last System Reboot..................................................................................................................78
Disabling Syslog Messages for SNMP Authentication Failure Events..........................................................................78
5 802.1X....................................................................................................................................... 79
Port-Authentication Process............................................................................................................................................. 80
EAP over RADIUS.......................................................................................................................................................... 81
Configuring 802.1X...............................................................................................................................................................81
Important Points to Remember.........................................................................................................................................82
4
Contents
Enabling 802.1X....................................................................................................................................................................82
Configuring dot1x Profile ................................................................................................................................................... 83
Configuring the Static MAB and MAB Profile ................................................................................................................ 84
Configuring Critical VLAN ................................................................................................................................................. 85
Configuring MAC addresses for a do1x Profile................................................................................................................85
Configuring Request Identity Re-Transmissions............................................................................................................. 86
Configuring a Quiet Period after a Failed Authentication.........................................................................................86
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................87
Re-Authenticating a Port....................................................................................................................................................87
Configuring Timeouts..........................................................................................................................................................88
Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................89
Guest and Authentication-Fail VLANs..............................................................................................................................90
Configuring a Guest VLAN............................................................................................................................................91
Configuring an Authentication-Fail VLAN................................................................................................................... 91
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)..........................93
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................................................93
Guidelines for Configuring ACL VLAN Groups................................................................................................................ 93
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters................................................... 94
Configuring ACL VLAN Groups................................................................................................................................... 94
Configuring FP Blocks for VLAN Parameters............................................................................................................95
Viewing CAM Usage........................................................................................................................................................... 95
Allocating FP Blocks for VLAN Processes....................................................................................................................... 96
ACL Optimization to Increase Number of Supported IPv4 ACLs..................................................................................97
Optimizing ACL for More Number of IPv4 ACL Rules..............................................................................................97
7 Access Control Lists (ACLs)........................................................................................................98
IP Access Control Lists (ACLs)......................................................................................................................................... 99
CAM Usage.................................................................................................................................................................... 99
Implementing ACLs on Dell EMC Networking OS................................................................................................... 100
Configure ACL Range Profiles.......................................................................................................................................... 101
Important Points to Remember....................................................................................................................................... 102
Configuration Task List for Route Maps...................................................................................................................102
Configuring Match Routes..........................................................................................................................................104
Configuring Set Conditions.........................................................................................................................................105
Configure a Route Map for Route Redistribution....................................................................................................106
Configure a Route Map for Route Tagging.............................................................................................................. 107
Continue Clause............................................................................................................................................................107
IP Fragment Handling........................................................................................................................................................ 107
IP Fragments ACL Examples...................................................................................................................................... 108
Layer 4 ACL Rules Examples...................................................................................................................................... 108
Configure a Standard IP ACL........................................................................................................................................... 109
Configuring a Standard IP ACL Filter......................................................................................................................... 110
Configure an Extended IP ACL......................................................................................................................................... 110
Configuring Filters with a Sequence Number........................................................................................................... 110
Configuring Filters Without a Sequence Number.....................................................................................................113
Configure Layer 2 and Layer 3 ACLs............................................................................................................................... 113
Assign an IP ACL to an Interface......................................................................................................................................114
Applying an IP ACL............................................................................................................................................................. 114
Contents
5
Counting ACL Hits........................................................................................................................................................ 115
Configure Ingress ACLs..................................................................................................................................................... 115
Configure Egress ACLs......................................................................................................................................................115
Applying Egress Layer 3 ACLs (Control-Plane)........................................................................................................116
Configuring UDF ACL.........................................................................................................................................................117
IP Prefix Lists...................................................................................................................................................................... 119
Configuration Task List for Prefix Lists......................................................................................................................119
ACL Remarks......................................................................................................................................................................122
Configuring a Remark.................................................................................................................................................. 122
Deleting a Remark........................................................................................................................................................ 123
ACL Resequencing.............................................................................................................................................................123
Resequencing an ACL or Prefix List.......................................................................................................................... 124
Route Maps........................................................................................................................................................................ 125
8 Bidirectional Forwarding Detection (BFD)................................................................................... 126
How BFD Works.................................................................................................................................................................126
BFD Packet Format..................................................................................................................................................... 127
BFD Sessions................................................................................................................................................................ 128
BFD Three-Way Handshake....................................................................................................................................... 129
Session State Changes................................................................................................................................................130
Important Points to Remember....................................................................................................................................... 130
Configure BFD....................................................................................................................................................................130
Configure BFD for Physical Ports...............................................................................................................................131
Configure BFD for Static Routes............................................................................................................................... 132
Configure BFD for IPv6 Static Routes......................................................................................................................135
Configure BFD for OSPF.............................................................................................................................................137
Configure BFD for OSPFv3........................................................................................................................................ 142
Configure BFD for IS-IS...............................................................................................................................................144
Configure BFD for BGP...............................................................................................................................................146
Configure BFD for VRRP............................................................................................................................................ 153
Configuring Protocol Liveness................................................................................................................................... 155
9 Border Gateway Protocol (BGP)................................................................................................ 156
BGP IP version 4 (BGPv4) Overview............................................................................................................................. 156
BGP Autonomous Systems........................................................................................................................................ 156
AS4 Number Representation......................................................................................................................................158
Four-Byte AS Numbers...............................................................................................................................................160
BGP router ID............................................................................................................................................................... 160
Sessions and Peers...................................................................................................................................................... 160
Establish a Session.......................................................................................................................................................160
BGP Attributes for selecting Best Path.....................................................................................................................161
Multiprotocol BGP....................................................................................................................................................... 166
BGP global and address family configuration........................................................................................................... 167
Implement BGP with Dell EMC Networking OS...................................................................................................... 168
Configuration Information............................................................................................................................................ 171
Basic BGP configuration tasks..........................................................................................................................................171
Prerequisite for configuring a BGP network..............................................................................................................171
Restrictions.................................................................................................................................................................... 171
Enabling BGP.................................................................................................................................................................171
6
Contents
Enabling four-byte autonomous system numbers................................................................................................... 173
Changing a BGP router ID...........................................................................................................................................174
Configuring AS4 Number Representations...............................................................................................................174
Configuring a BGP peer...............................................................................................................................................175
Example-Configuring BGP routing between peers..................................................................................................176
BGP peer group............................................................................................................................................................ 177
Advanced BGP configuration tasks.................................................................................................................................184
Route-refresh and Soft-reconfiguration...................................................................................................................184
Aggregating Routes..................................................................................................................................................... 186
Filtering BGP.................................................................................................................................................................188
Configuring BGP Fast Fall-Over.................................................................................................................................193
Configuring Passive Peering.......................................................................................................................................194
Enabling Graceful Restart........................................................................................................................................... 195
Redistributing Routes.................................................................................................................................................. 196
Enabling Additional Paths............................................................................................................................................196
Configuring IP Community Lists.................................................................................................................................197
Configuring an IP Extended Community List............................................................................................................198
Configure BGP attributes........................................................................................................................................... 199
Enabling Multipath.......................................................................................................................................................202
Route Reflectors......................................................................................................................................................... 203
Enabling Route Flap Dampening................................................................................................................................204
Changing BGP keepalive and hold timers................................................................................................................ 206
Setting the extended timer........................................................................................................................................206
Enabling or disabling BGP neighbors.........................................................................................................................207
Route Map Continue...................................................................................................................................................208
Configuring BGP Confederations..............................................................................................................................208
Configuring a BGP VRF address family....................................................................................................................209
Maintaining Existing AS Numbers During an AS Migration.....................................................................................210
Allowing an AS Number to Appear in its Own AS Path........................................................................................... 211
Enabling MBGP Configurations..................................................................................................................................212
MBGP support for IPv6...............................................................................................................................................212
Configuring IPv6 MBGP between peers...................................................................................................................212
Example-Configuring IPv4 and IPv6 neighbors........................................................................................................213
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor............................................. 215
BGP Regular Expression Optimization...................................................................................................................... 216
Debugging BGP............................................................................................................................................................ 217
10 Content Addressable Memory (CAM)........................................................................................ 219
CAM Allocation...................................................................................................................................................................219
Test CAM Usage...............................................................................................................................................................220
View CAM-ACL Settings.................................................................................................................................................. 221
View CAM Usage.............................................................................................................................................................. 222
Configuring CAM Threshold and Silence Period........................................................................................................... 223
CAM Optimization.............................................................................................................................................................224
Troubleshoot CAM Profiling.............................................................................................................................................224
QoS CAM Region Limitation...................................................................................................................................... 224
Syslog Error When the Table is Full.......................................................................................................................... 224
Syslog Warning Upon 90 Percent Utilization of CAM............................................................................................225
Syslog Warning for Discrepancies Between Configured Extended Prefixes.......................................................225
Unified Forwarding Table (UFT) Modes........................................................................................................................ 225
Contents
7
Configuring UFT Modes............................................................................................................................................. 225
IPv6 CAM ACL Region..................................................................................................................................................... 226
Important Points to Remember.................................................................................................................................226
Convert the IPv6 ACL CAM to Double-Wide..........................................................................................................226
Sharing CAM space between IPv4 QoS and IPv6 ACLs........................................................................................226
11 Control Plane Policing (CoPP).................................................................................................. 228
Configure Control Plane Policing.....................................................................................................................................229
Configuring CoPP for Protocols................................................................................................................................230
Configuring CoPP for CPU Queues...........................................................................................................................231
Protocol to CPU Queue Mapping..............................................................................................................................232
Configuring Protocol to CPU Queue Mapping........................................................................................................ 233
Displaying CoPP Configuration .................................................................................................................................233
12 Data Center Bridging (DCB)..................................................................................................... 236
Ethernet Enhancements in Data Center Bridging.........................................................................................................236
Priority-Based Flow Control.......................................................................................................................................237
Enhanced Transmission Selection.............................................................................................................................238
Data Center Bridging Exchange Protocol (DCBx)..................................................................................................239
Data Center Bridging in a Traffic Flow..................................................................................................................... 239
Buffer Organization.....................................................................................................................................................240
Enabling Data Center Bridging......................................................................................................................................... 241
DCB Maps and its Attributes..................................................................................................................................... 242
Data Center Bridging: Default Configuration.................................................................................................................242
Configuring Priority-Based Flow Control....................................................................................................................... 243
Configuring Lossless Queues..................................................................................................................................... 243
Configuring PFC in a DCB Map.......................................................................................................................................245
Applying a DCB Map on a Port........................................................................................................................................246
Configuring PFC without a DCB Map............................................................................................................................ 246
Configuring PFC Asymmetric.......................................................................................................................................... 246
Priority-Based Flow Control Using Dynamic Buffer Method.......................................................................................247
Shared headroom for lossless or PFC packets..............................................................................................................248
Configuring Shared Head Room Buffer....................................................................................................................249
Viewing Shared Head Room Usage.......................................................................................................................... 249
Monitoring Buffer Statistics for Tracking Purposes...............................................................................................250
Behavior of Tagged Packets........................................................................................................................................... 250
Configuration Example for DSCP and PFC Priorities...................................................................................................250
SNMP Support for PFC and Buffer Statistics Tracking...............................................................................................251
Performing PFC Using DSCP Bits Instead of 802.1p Bits............................................................................................ 251
PFC and ETS Configuration Examples...........................................................................................................................252
Using PFC to Manage Converged Ethernet Traffic.....................................................................................................252
Operations on Untagged Packets...................................................................................................................................252
Generation of PFC for a Priority for Untagged Packets..............................................................................................253
Configure Enhanced Transmission Selection................................................................................................................ 253
Creating an ETS Priority Group.................................................................................................................................253
ETS Operation with DCBx..........................................................................................................................................254
Configuring ETS in a DCB Map................................................................................................................................. 254
Hierarchical Scheduling in ETS Output Policies............................................................................................................ 255
Using ETS to Manage Converged Ethernet Traffic..................................................................................................... 256
8
Contents
Applying DCB Policies in a Switch Stack....................................................................................................................... 256
Configure a DCBx Operation........................................................................................................................................... 256
DCBx Operation...........................................................................................................................................................256
DCBx Port Roles..........................................................................................................................................................256
DCB Configuration Exchange....................................................................................................................................258
Configuration Source Election...................................................................................................................................258
Propagation of DCB Information...............................................................................................................................258
Auto-Detection and Manual Configuration of the DCBx Version......................................................................... 259
DCBx Example............................................................................................................................................................. 259
DCBx Prerequisites and Restrictions........................................................................................................................260
Configuring DCBx........................................................................................................................................................260
Verifying the DCB Configuration.....................................................................................................................................262
QoS dot1p Traffic Classification and Queue Assignment.............................................................................................269
Configuring the Dynamic Buffer Method.......................................................................................................................269
Sample DCB Configuration.............................................................................................................................................. 270
13 Dynamic Host Configuration Protocol (DHCP)........................................................................... 273
DHCP Packet Format and Options.................................................................................................................................273
Assign an IP Address using DHCP...................................................................................................................................274
Implementation Information............................................................................................................................................. 275
Configure the System to be a DHCP Server.................................................................................................................276
Configuring the Server for Automatic Address Allocation..................................................................................... 276
Specifying a Default Gateway....................................................................................................................................277
Configure a Method of Hostname Resolution......................................................................................................... 277
Using DNS for Address Resolution............................................................................................................................277
Using NetBIOS WINS for Address Resolution......................................................................................................... 278
Creating Manual Binding Entries............................................................................................................................... 278
Debugging the DHCP Server..................................................................................................................................... 278
Using DHCP Clear Commands...................................................................................................................................278
Configure the System to be a DHCP Client.................................................................................................................. 279
Configuring the DHCP Client System.......................................................................................................................279
DHCP Client on a Management Interface............................................................................................................... 280
DHCP Client Operation with Other Features........................................................................................................... 281
DHCP Relay When DHCP Server and Client are in Different VRFs............................................................................281
Configuring Route Leaking between VRFs on DHCP Relay Agent...................................................................... 282
Non-default VRF configuration for DHCPv6 helper address...................................................................................... 283
Configuring DHCP relay source interface......................................................................................................................283
Global DHCP relay source IPv4 or IPv6 configuration ...........................................................................................283
Interface level DHCP relay source IPv4 or IPv6 configuration .............................................................................284
Configure Secure DHCP.................................................................................................................................................. 285
Option 82 (DHCPv4 relay options)...........................................................................................................................285
DHCPv6 relay agent options..................................................................................................................................... 286
DHCP Snooping...........................................................................................................................................................286
Drop DHCP Packets on Snooped VLANs Only....................................................................................................... 290
Dynamic ARP Inspection............................................................................................................................................ 290
Configuring Dynamic ARP Inspection........................................................................................................................291
Source Address Validation............................................................................................................................................... 292
Enabling IP Source Address Validation..................................................................................................................... 292
DHCP MAC Source Address Validation................................................................................................................... 292
Enabling IP+MAC Source Address Validation..........................................................................................................293
Contents
9
Viewing the Number of SAV Dropped Packets.......................................................................................................293
Clearing the Number of SAV Dropped Packets...................................................................................................... 294
14 Equal Cost Multi-Path (ECMP).................................................................................................295
ECMP for Flow-Based Affinity........................................................................................................................................295
Configuring the Hash Algorithm................................................................................................................................295
Enabling Deterministic ECMP Next Hop..................................................................................................................295
Configuring the Hash Algorithm Seed...................................................................................................................... 295
Link Bundle Monitoring.....................................................................................................................................................296
Managing ECMP Group Paths.................................................................................................................................. 296
Creating an ECMP Group Bundle..............................................................................................................................297
Modifying the ECMP Group Threshold.................................................................................................................... 297
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table........................................298
Support for ECMP in host table................................................................................................................................298
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ........................................................................... 298
15 FIP Snooping.......................................................................................................................... 299
Fibre Channel over Ethernet............................................................................................................................................299
Ensure Robustness in a Converged Ethernet Network............................................................................................... 299
FIP Snooping on Ethernet Bridges..................................................................................................................................300
Using FIP Snooping...........................................................................................................................................................302
FIP Snooping Prerequisites........................................................................................................................................ 302
Important Points to Remember.................................................................................................................................302
Enabling the FCoE Transit Feature...........................................................................................................................303
Enable FIP Snooping on VLANs.................................................................................................................................303
Configure the FC-MAP Value....................................................................................................................................304
Configure a Port for a Bridge-to-Bridge Link.......................................................................................................... 304
Configure a Port for a Bridge-to-FCF Link.............................................................................................................. 304
Impact on Other Software Features.........................................................................................................................304
FIP Snooping Restrictions.......................................................................................................................................... 304
Configuring FIP Snooping.......................................................................................................................................... 305
Displaying FIP Snooping Information.............................................................................................................................. 305
FCoE Transit Configuration Example.............................................................................................................................. 310
16 Flex Hash and Optimized Boot-Up............................................................................................. 312
Flex Hash Capability Overview.........................................................................................................................................312
Configuring the Flex Hash Mechanism........................................................................................................................... 312
Configuring Fast Boot and LACP Fast Switchover.......................................................................................................313
Optimizing the Boot Time................................................................................................................................................. 313
Interoperation of Applications with Fast Boot and System States............................................................................. 314
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................... 316
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces......................................................................................... 317
17 Force10 Resilient Ring Protocol (FRRP).....................................................................................318
Protocol Overview............................................................................................................................................................. 318
Ring Status....................................................................................................................................................................319
Multiple FRRP Rings.................................................................................................................................................... 319
Important FRRP Points...............................................................................................................................................320
Important FRRP Concepts..........................................................................................................................................321
10
Contents
Implementing FRRP........................................................................................................................................................... 321
FRRP Configuration.......................................................................................................................................................... 322
Creating the FRRP Group.......................................................................................................................................... 322
Configuring the Control VLAN...................................................................................................................................322
Configuring and Adding the Member VLANs.......................................................................................................... 323
Setting the FRRP Timers........................................................................................................................................... 324
Clearing the FRRP Counters......................................................................................................................................324
Viewing the FRRP Configuration...............................................................................................................................324
Viewing the FRRP Information.................................................................................................................................. 324
Troubleshooting FRRP..................................................................................................................................................... 325
Sample Configuration and Topology...............................................................................................................................325
FRRP Support on VLT......................................................................................................................................................326
18 GARP VLAN Registration Protocol (GVRP)................................................................................329
Configure GVRP................................................................................................................................................................329
Enabling GVRP Globally....................................................................................................................................................330
Enabling GVRP on a Layer 2 Interface............................................................................................................................331
Configure GVRP Registration...........................................................................................................................................331
Configure a GARP Timer...................................................................................................................................................331
19 Internet Group Management Protocol (IGMP)........................................................................... 333
IGMP Protocol Overview................................................................................................................................................. 333
IGMP Version 2............................................................................................................................................................333
IGMP Version 3............................................................................................................................................................334
Configure IGMP.................................................................................................................................................................337
Viewing IGMP Enabled Interfaces...................................................................................................................................337
Selecting an IGMP Version.............................................................................................................................................. 338
Viewing IGMP Groups...................................................................................................................................................... 339
Adjusting Timers................................................................................................................................................................339
Adjusting Query and Response Timers.....................................................................................................................339
Enabling IGMP Immediate-Leave....................................................................................................................................340
IGMP Snooping................................................................................................................................................................. 340
Configuring IGMP Snooping...................................................................................................................................... 340
Removing a Group-Port Association......................................................................................................................... 341
Disabling Multicast Flooding........................................................................................................................................341
Specifying a Port as Connected to a Multicast Router...........................................................................................341
Configuring the Switch as Querier............................................................................................................................342
Fast Convergence after MSTP Topology Changes......................................................................................................342
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................... 342
Designating a Multicast Router Interface...................................................................................................................... 348
20 Interfaces.............................................................................................................................. 349
Interface Types................................................................................................................................................................. 350
View Basic Interface Information....................................................................................................................................350
Resetting an Interface to its Factory Default State..................................................................................................... 352
Enabling a Physical Interface........................................................................................................................................... 352
Physical Interfaces............................................................................................................................................................ 353
Configuration Task List for Physical Interfaces.......................................................................................................353
Overview of Layer Modes..........................................................................................................................................353
Contents
11
Configuring Layer 2 (Data Link) Mode.....................................................................................................................353
Configuring Layer 2 (Interface) Mode......................................................................................................................354
Configuring Layer 3 (Network) Mode...................................................................................................................... 354
Configuring Layer 3 (Interface) Mode......................................................................................................................354
Automatic recovery of an Err-disabled interface..........................................................................................................355
Configuring an automatic recovery for an Err-disabled interface.........................................................................355
Egress Interface Selection (EIS).....................................................................................................................................356
Configuring EIS............................................................................................................................................................356
Management Interfaces................................................................................................................................................... 357
Configuring Management Interfaces........................................................................................................................ 357
Configuring a Management Interface on an Ethernet Port................................................................................... 357
VLAN Interfaces................................................................................................................................................................358
Loopback Interfaces......................................................................................................................................................... 358
Null Interfaces....................................................................................................................................................................359
Configuring Port Delay..................................................................................................................................................... 359
Port Channel Interfaces................................................................................................................................................... 359
Port Channel Definition and Standards.................................................................................................................... 360
Port Channel Benefits.................................................................................................................................................360
Port Channel Implementation.................................................................................................................................... 360
Interfaces in Port Channels........................................................................................................................................360
Configuration Tasks for Port Channel Interfaces.................................................................................................... 361
Creating a Port Channel..............................................................................................................................................361
Adding a Physical Interface to a Port Channel.........................................................................................................361
Reassigning an Interface to a New Port Channel................................................................................................... 363
Configuring the Minimum Oper Up Links in a Port Channel..................................................................................363
Adding or Removing a Port Channel from a VLAN.................................................................................................363
Assigning an IP Address to a Port Channel..............................................................................................................364
Deleting or Disabling a Port Channel.........................................................................................................................365
Load Balancing Through Port Channels...................................................................................................................365
Load-Balancing Method............................................................................................................................................. 365
Changing the Hash Algorithm....................................................................................................................................365
Bulk Configuration.............................................................................................................................................................366
Interface Range........................................................................................................................................................... 366
Bulk Configuration Examples..................................................................................................................................... 367
Defining Interface Range Macros................................................................................................................................... 368
Define the Interface Range........................................................................................................................................369
Choosing an Interface-Range Macro........................................................................................................................369
Monitoring and Maintaining Interfaces...........................................................................................................................369
Maintenance Using TDR.............................................................................................................................................370
Non Dell-Qualified Transceivers...................................................................................................................................... 370
Splitting 100G Ports...........................................................................................................................................................371
Link Dampening................................................................................................................................................................. 372
Enabling Link Dampening............................................................................................................................................374
Link Bundle Monitoring.....................................................................................................................................................375
Using Ethernet Pause Frames for Flow Control............................................................................................................375
Enabling Pause Frames...............................................................................................................................................376
Configure the MTU Size on an Interface....................................................................................................................... 376
Configuring wavelength for 10–Gigabit SFP+ optics................................................................................................... 377
Port-Pipes...........................................................................................................................................................................377
CR4 Auto-Negotiation...................................................................................................................................................... 377
12
Contents
Setting the Speed of Ethernet Interfaces......................................................................................................................378
Syslog Warning Upon Connecting SFP28 Optics with QSA....................................................................................... 379
FEC Configuration.............................................................................................................................................................379
View interface information with FEC type.....................................................................................................................380
View Advanced Interface Information............................................................................................................................382
Configuring the Interface Sampling Size..................................................................................................................383
Configuring the Traffic Sampling Size Globally............................................................................................................. 384
Dynamic Counters.............................................................................................................................................................385
Clearing Interface Counters.......................................................................................................................................386
Enhanced Validation of Interface Ranges......................................................................................................................386
Compressing Configuration Files.....................................................................................................................................386
OUI on 25G and 50G Interfaces..................................................................................................................................... 388
Configuring OUI on 25G and 50G Interfaces.......................................................................................................... 388
21 IPv4 Routing...........................................................................................................................390
IP Addresses....................................................................................................................................................................... 391
Configuration Tasks for IP Addresses............................................................................................................................. 391
Assigning IP Addresses to an Interface...........................................................................................................................391
Configuring Static Routes................................................................................................................................................392
Adding description for IPv4 and IPv6 static routes................................................................................................ 393
Configure Static Routes for the Management Interface.............................................................................................393
IPv4 Path MTU Discovery Overview..............................................................................................................................394
Using the Configured Source IP Address in ICMP Messages.....................................................................................394
Configuring the Duration to Establish a TCP Connection........................................................................................... 395
Enabling Directed Broadcast........................................................................................................................................... 395
Resolution of Host Names............................................................................................................................................... 395
Enabling Dynamic Resolution of Host Names............................................................................................................... 396
Specifying the Local System Domain and a List of Domains.......................................................................................396
Configuring DNS with Traceroute.................................................................................................................................. 396
ARP..................................................................................................................................................................................... 397
Configuration Tasks for ARP........................................................................................................................................... 397
Configuring Static ARP Entries....................................................................................................................................... 397
Enabling Proxy ARP.......................................................................................................................................................... 398
Clearing ARP Cache..........................................................................................................................................................398
ARP Learning via Gratuitous ARP...................................................................................................................................398
Enabling ARP Learning via Gratuitous ARP...................................................................................................................399
ARP Learning via ARP Request.......................................................................................................................................399
Configuring ARP Retries.................................................................................................................................................. 400
ICMP...................................................................................................................................................................................400
Configuration Tasks for ICMP.........................................................................................................................................400
Enabling ICMP Unreachable Messages..........................................................................................................................400
ICMP Redirects................................................................................................................................................................. 400
UDP Helper.........................................................................................................................................................................401
Enabling UDP Helper.........................................................................................................................................................402
Configuring a Broadcast Address....................................................................................................................................402
Configurations Using UDP Helper...................................................................................................................................402
UDP Helper with Broadcast-All Addresses....................................................................................................................403
UDP Helper with Subnet Broadcast Addresses............................................................................................................403
UDP Helper with Configured Broadcast Addresses..................................................................................................... 404
UDP Helper with No Configured Broadcast Addresses...............................................................................................404
Contents
13
Troubleshooting UDP Helper...........................................................................................................................................405
22 IPv6 Routing.......................................................................................................................... 406
Protocol Overview............................................................................................................................................................ 406
Extended Address Space........................................................................................................................................... 406
Stateless Autoconfiguration.......................................................................................................................................406
IPv6 Headers................................................................................................................................................................407
Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support...................................................................... 407
IPv6 Header Fields...................................................................................................................................................... 408
Extension Header Fields............................................................................................................................................. 409
Addressing.....................................................................................................................................................................410
Implementing IPv6 with Dell EMC Networking OS........................................................................................................ 411
ICMPv6................................................................................................................................................................................ 411
Path MTU discovery...........................................................................................................................................................411
IPv6 Neighbor Discovery...................................................................................................................................................412
IPv6 Neighbor Discovery of MTU Packets...............................................................................................................413
Configuring the IPv6 Recursive DNS Server............................................................................................................413
Debugging IPv6 RDNSS Information Sent to the Host ......................................................................................... 414
Displaying IPv6 RDNSS Information.......................................................................................................................... 414
Secure Shell (SSH) Over an IPv6 Transport..................................................................................................................415
Configuration Tasks for IPv6............................................................................................................................................415
Adjusting Your CAM-Profile........................................................................................................................................415
Assigning an IPv6 Address to an Interface............................................................................................................... 416
Assigning a Static IPv6 Route.................................................................................................................................... 416
Configuring Telnet with IPv6...................................................................................................................................... 417
SNMP over IPv6...........................................................................................................................................................417
Displaying IPv6 Information.........................................................................................................................................417
Displaying an IPv6 Interface Information...................................................................................................................417
Showing IPv6 Routes.................................................................................................................................................. 418
Showing the Running-Configuration for an Interface............................................................................................. 419
Clearing IPv6 Routes.................................................................................................................................................. 420
Configuring IPv6 RA Guard..............................................................................................................................................420
23 iSCSI Optimization..................................................................................................................422
iSCSI Optimization Overview...........................................................................................................................................422
Monitoring iSCSI Traffic Flows..................................................................................................................................423
Application of Quality of Service to iSCSI Traffic Flows........................................................................................ 423
Information Monitored in iSCSI Traffic Flows..........................................................................................................424
Detection and Auto-Configuration for Dell EqualLogic Arrays.............................................................................. 424
Configuring Detection and Ports for Dell Compellent Arrays................................................................................ 425
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................. 425
Enable and Disable iSCSI Optimization.....................................................................................................................426
Default iSCSI Optimization Values.................................................................................................................................. 426
iSCSI Optimization Prerequisites.....................................................................................................................................426
Configuring iSCSI Optimization....................................................................................................................................... 427
Displaying iSCSI Optimization Information.....................................................................................................................428
24 Intermediate System to Intermediate System........................................................................... 430
IS-IS Protocol Overview...................................................................................................................................................430
14
Contents
IS-IS Addressing................................................................................................................................................................ 430
Multi-Topology IS-IS..........................................................................................................................................................431
Transition Mode............................................................................................................................................................431
Interface Support......................................................................................................................................................... 431
Adjacencies................................................................................................................................................................... 431
Graceful Restart................................................................................................................................................................ 432
Timers........................................................................................................................................................................... 432
Implementation Information............................................................................................................................................. 432
Configuration Information................................................................................................................................................ 433
Configuration Tasks for IS-IS.....................................................................................................................................433
Configuring the Distance of a Route........................................................................................................................ 440
Changing the IS-Type.................................................................................................................................................440
Redistributing IPv4 Routes.........................................................................................................................................442
Redistributing IPv6 Routes.........................................................................................................................................443
Configuring Authentication Passwords.................................................................................................................... 443
Setting the Overload Bit.............................................................................................................................................444
Debugging IS-IS........................................................................................................................................................... 444
IS-IS Metric Styles............................................................................................................................................................ 445
Configure Metric Values...................................................................................................................................................445
Maximum Values in the Routing Table..................................................................................................................... 445
Change the IS-IS Metric Style in One Level Only................................................................................................... 445
Leaks from One Level to Another............................................................................................................................. 447
Sample Configurations......................................................................................................................................................447
25 In-Service Software Upgrade...................................................................................................450
ISSU Introduction..............................................................................................................................................................450
Fastboot 2.0 (Zero Loss Upgrade).................................................................................................................................450
L2 ISSU...............................................................................................................................................................................450
L3 ISSU................................................................................................................................................................................451
CoPP....................................................................................................................................................................................451
Mirroring flow control packets........................................................................................................................................ 452
PFC..................................................................................................................................................................................... 452
QoS..................................................................................................................................................................................... 452
Tunnel Configuration........................................................................................................................................................ 452
26 Link Aggregation Control Protocol (LACP)................................................................................453
Introduction to Dynamic LAGs and LACP......................................................................................................................453
Important Points to Remember.................................................................................................................................453
LACP Modes................................................................................................................................................................453
Configuring LACP Commands...................................................................................................................................454
LACP Configuration Tasks...............................................................................................................................................454
Creating a LAG............................................................................................................................................................ 454
Configuring the LAG Interfaces as Dynamic............................................................................................................455
Setting the LACP Long Timeout...............................................................................................................................455
Monitoring and Debugging LACP..............................................................................................................................456
Shared LAG State Tracking.............................................................................................................................................456
Configuring Shared LAG State Tracking.................................................................................................................. 457
Important Points about Shared LAG State Tracking..............................................................................................458
LACP Basic Configuration Example................................................................................................................................458
Contents
15
Configure a LAG on ALPHA.......................................................................................................................................458
27 Layer 2...................................................................................................................................466
Manage the MAC Address Table.................................................................................................................................... 466
Clearing the MAC Address Table.............................................................................................................................. 466
Setting the Aging Time for Dynamic Entries........................................................................................................... 466
Configuring a Static MAC Address........................................................................................................................... 466
Displaying the MAC Address Table........................................................................................................................... 467
MAC Learning Limit...........................................................................................................................................................467
Setting the MAC Learning Limit................................................................................................................................ 467
mac learning-limit Dynamic........................................................................................................................................ 468
mac learning-limit mac-address-sticky.....................................................................................................................468
mac learning-limit station-move................................................................................................................................ 468
mac learning-limit no-station-move.......................................................................................................................... 468
Learning Limit Violation Actions................................................................................................................................ 469
Setting Station Move Violation Actions....................................................................................................................469
Recovering from Learning Limit and Station Move Violations.............................................................................. 469
Disabling MAC Address Learning on the System..........................................................................................................470
Enabling port security....................................................................................................................................................... 470
NIC Teaming...................................................................................................................................................................... 470
Configure Redundant Pairs...............................................................................................................................................471
Far-End Failure Detection................................................................................................................................................ 474
FEFD State Changes...................................................................................................................................................474
Configuring FEFD........................................................................................................................................................ 475
Enabling FEFD on an Interface.................................................................................................................................. 476
Debugging FEFD..........................................................................................................................................................476
28 Link Layer Discovery Protocol (LLDP).......................................................................................478
802.1AB (LLDP) Overview...............................................................................................................................................478
Protocol Data Units.....................................................................................................................................................478
Optional TLVs.................................................................................................................................................................... 479
Management TLVs......................................................................................................................................................479
TIA-1057 (LLDP-MED) Overview................................................................................................................................... 480
TIA Organizationally Specific TLVs............................................................................................................................ 481
Configure LLDP................................................................................................................................................................. 483
CONFIGURATION versus INTERFACE Configurations............................................................................................... 484
Enabling LLDP....................................................................................................................................................................484
Disabling and Undoing LLDP......................................................................................................................................485
Enabling LLDP on Management Ports........................................................................................................................... 485
Disabling and Undoing LLDP on Management Ports..............................................................................................485
Advertising TLVs............................................................................................................................................................... 485
Storing and Viewing Unrecognized LLDP TLVs............................................................................................................486
Viewing the LLDP Configuration..................................................................................................................................... 487
Viewing Information Advertised by Adjacent LLDP Neighbors...................................................................................488
Examples of Viewing Information Advertised by Neighbors..................................................................................488
Configuring LLDPDU Intervals........................................................................................................................................ 490
Configuring LLDP Notification Interval........................................................................................................................... 491
Configuring Transmit and Receive Mode....................................................................................................................... 491
Configuring the Time to Live Value.................................................................................................................................492
16
Contents
Debugging LLDP................................................................................................................................................................493
Relevant Management Objects.......................................................................................................................................494
29 Microsoft Network Load Balancing...........................................................................................498
Configuring a Switch for NLB ........................................................................................................................................ 499
Enabling a Switch for Multicast NLB........................................................................................................................499
30 Multicast Source Discovery Protocol (MSDP)............................................................................501
Anycast RP........................................................................................................................................................................ 502
Implementation Information.............................................................................................................................................503
Configure Multicast Source Discovery Protocol...........................................................................................................503
Related Configuration Tasks......................................................................................................................................503
Enable MSDP.....................................................................................................................................................................507
Manage the Source-Active Cache................................................................................................................................. 508
Viewing the Source-Active Cache............................................................................................................................508
Limiting the Source-Active Cache............................................................................................................................ 508
Clearing the Source-Active Cache........................................................................................................................... 508
Enabling the Rejected Source-Active Cache.......................................................................................................... 509
Accept Source-Active Messages that Fail the RFP Check.........................................................................................509
Specifying Source-Active Messages................................................................................................................................511
Limiting the Source-Active Messages from a Peer.......................................................................................................512
Preventing MSDP from Caching a Local Source...........................................................................................................512
Preventing MSDP from Caching a Remote Source......................................................................................................512
Preventing MSDP from Advertising a Local Source..................................................................................................... 513
Logging Changes in Peership States...............................................................................................................................514
Terminating a Peership......................................................................................................................................................514
Clearing Peer Statistics.....................................................................................................................................................514
Debugging MSDP.............................................................................................................................................................. 515
MSDP with Anycast RP....................................................................................................................................................515
Configuring Anycast RP....................................................................................................................................................516
Reducing Source-Active Message Flooding.............................................................................................................517
Specifying the RP Address Used in SA Messages...................................................................................................517
MSDP Sample Configurations..........................................................................................................................................519
31 Multiple Spanning Tree Protocol (MSTP).................................................................................. 522
Spanning Tree Variations................................................................................................................................................. 523
Implementation Information....................................................................................................................................... 523
Configure Multiple Spanning Tree Protocol...................................................................................................................523
Related Configuration Tasks......................................................................................................................................523
Enable Multiple Spanning Tree Globally..........................................................................................................................524
Adding and Removing Interfaces.................................................................................................................................... 524
Creating Multiple Spanning Tree Instances................................................................................................................... 524
Influencing MSTP Root Selection................................................................................................................................... 526
Interoperate with Non-Dell Bridges................................................................................................................................ 526
Changing the Region Name or Revision.........................................................................................................................526
Modifying Global Parameters...........................................................................................................................................527
Modifying the Interface Parameters...............................................................................................................................528
Setting STP path cost as constant.................................................................................................................................528
Configuring an EdgePort..................................................................................................................................................529
Contents
17
Flush MAC Addresses after a Topology Change.......................................................................................................... 529
MSTP Sample Configurations......................................................................................................................................... 530
Debugging and Verifying MSTP Configurations............................................................................................................534
32 Multicast Features..................................................................................................................536
Enabling IP Multicast........................................................................................................................................................ 536
Implementation Information.............................................................................................................................................536
Multicast Policies...............................................................................................................................................................537
IPv4 Multicast Policies................................................................................................................................................ 537
Understanding Multicast Traceroute (mtrace).............................................................................................................544
Printing Multicast Traceroute (mtrace) Paths..............................................................................................................544
Supported Error Codes.................................................................................................................................................... 546
mtrace Scenarios.............................................................................................................................................................. 546
33 Multicast Listener Discovery Protocol...................................................................................... 552
MLD timers........................................................................................................................................................................ 555
Reducing Host Response Burstiness........................................................................................................................555
Configuring MLD Version.................................................................................................................................................556
Clearing MLD groups........................................................................................................................................................556
Debugging MLD................................................................................................................................................................ 556
Explicit Tracking................................................................................................................................................................ 556
Reducing Leave Latency..................................................................................................................................................556
Displaying MLD groups table........................................................................................................................................... 556
Displaying MLD Interfaces............................................................................................................................................... 557
MLD Snooping................................................................................................................................................................... 557
Enable MLD Snooping.................................................................................................................................................557
Disable MLD Snooping................................................................................................................................................557
Configure the switch as a querier............................................................................................................................. 558
Specify port as connected to multicast router........................................................................................................558
Enable Snooping Explicit Tracking............................................................................................................................ 558
Display the MLD Snooping Table.............................................................................................................................. 558
34 Object Tracking......................................................................................................................559
Object Tracking Overview............................................................................................................................................... 559
Track Layer 2 Interfaces............................................................................................................................................ 560
Track Layer 3 Interfaces............................................................................................................................................ 560
Track IPv4 and IPv6 Routes...................................................................................................................................... 560
Set Tracking Delays..................................................................................................................................................... 561
VRRP Object Tracking................................................................................................................................................562
Object Tracking Configuration........................................................................................................................................ 562
Tracking a Layer 2 Interface...................................................................................................................................... 562
Tracking a Layer 3 Interface...................................................................................................................................... 563
Track an IPv4/IPv6 Route......................................................................................................................................... 564
Displaying Tracked Objects..............................................................................................................................................567
35 Open Shortest Path First (OSPFv2 and OSPFv3)...................................................................... 569
Protocol Overview............................................................................................................................................................ 569
Autonomous System (AS) Areas.............................................................................................................................. 569
Area Types................................................................................................................................................................... 570
18
Contents
Networks and Neighbors.............................................................................................................................................571
Router Types................................................................................................................................................................ 571
Designated and Backup Designated Routers...........................................................................................................572
Link-State Advertisements (LSAs)........................................................................................................................... 572
Router Priority and Cost.............................................................................................................................................573
OSPF with Dell EMC Networking OS.............................................................................................................................574
Graceful Restart.......................................................................................................................................................... 574
Fast Convergence (OSPFv2, IPv4 Only)................................................................................................................. 575
Multi-Process OSPFv2 with VRF..............................................................................................................................575
RFC-2328 Compliant OSPF Flooding.......................................................................................................................576
OSPF ACK Packing..................................................................................................................................................... 577
Setting OSPF Adjacency with Cisco Routers.......................................................................................................... 577
Configuration Information................................................................................................................................................ 577
Configuration Task List for OSPFv2 (OSPF for IPv4)........................................................................................... 578
OSPFv3 NSSA...................................................................................................................................................................589
Configuration Task List for OSPFv3 (OSPF for IPv6).................................................................................................590
Enabling IPv6 Unicast Routing.................................................................................................................................. 590
Assigning IPv6 Addresses on an Interface................................................................................................................591
Assigning Area ID on an Interface..............................................................................................................................591
Assigning OSPFv3 Process ID and Router ID Globally............................................................................................591
Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................... 592
Configuring Stub Areas.............................................................................................................................................. 592
Configuring Passive-Interface................................................................................................................................... 592
Redistributing Routes................................................................................................................................................. 593
Configuring a Default Route...................................................................................................................................... 593
Applying cost for OSPFv3..........................................................................................................................................593
Enabling OSPFv3 Graceful Restart...........................................................................................................................593
OSPFv3 Authentication Using IPsec........................................................................................................................ 595
Troubleshooting OSPFv3............................................................................................................................................601
MIB Support for OSPFv3.................................................................................................................................................602
Viewing the OSPFv3 MIB.......................................................................................................................................... 602
MIB Support for OSPFv3.................................................................................................................................................603
Viewing the OSPFv3 MIB.......................................................................................................................................... 603
36 Policy-based Routing (PBR).................................................................................................... 604
Overview............................................................................................................................................................................ 604
Implementing PBR............................................................................................................................................................ 605
Configuration Task List for Policy-based Routing........................................................................................................ 605
Create a Redirect List.................................................................................................................................................606
Create a Rule for a Redirect-list................................................................................................................................606
Apply a Redirect-list to an Interface using a Redirect-group................................................................................ 607
Sample Configuration....................................................................................................................................................... 609
37 PIM Sparse-Mode (PIM-SM)....................................................................................................614
Implementation Information..............................................................................................................................................614
Protocol Overview............................................................................................................................................................. 614
Requesting Multicast Traffic...................................................................................................................................... 614
Refuse Multicast Traffic..............................................................................................................................................614
Send Multicast Traffic.................................................................................................................................................615
Contents
19
Configuring PIM-SM......................................................................................................................................................... 615
Related Configuration Tasks.......................................................................................................................................615
Enable PIM-SM..................................................................................................................................................................615
Configuring S,G Expiry Timers..........................................................................................................................................617
Configuring a Static Rendezvous Point.......................................................................................................................... 618
Overriding Bootstrap Router Updates...................................................................................................................... 618
Configuring a Designated Router.....................................................................................................................................619
Creating Multicast Boundaries and Domains.................................................................................................................620
Electing an RP using the BSR Mechanism.................................................................................................................... 620
38 PIM Source-Specific Mode (PIM-SSM).................................................................................... 622
Implementation Information.............................................................................................................................................622
Configure PIM-SSM......................................................................................................................................................... 622
Enabling PIM-SSM............................................................................................................................................................623
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................... 623
Electing an RP using the BSR Mechanism.................................................................................................................... 624
Enabling RP to Server Specific Multicast Groups...................................................................................................625
39 Port Monitoring...................................................................................................................... 627
Important Points to Remember.......................................................................................................................................627
Port Monitoring................................................................................................................................................................. 627
Configuring Port Monitoring............................................................................................................................................629
Configuring Monitor Multicast Queue............................................................................................................................630
Flow-Based Monitoring.................................................................................................................................................... 630
Enabling Flow-Based Monitoring...............................................................................................................................632
Configuring IPv6 Flow-Based Mirroring................................................................................................................... 633
Remote Port Mirroring..................................................................................................................................................... 635
Remote Port Mirroring Example................................................................................................................................635
Configuring Remote Port Mirroring.......................................................................................................................... 636
Displaying Remote-Port Mirroring Configurations.................................................................................................. 637
Configuration procedure for Remote Port Mirroring..............................................................................................638
Encapsulated Remote Port Monitoring..........................................................................................................................642
ERPM Behavior on a typical Dell EMC Networking OS .............................................................................................. 644
Port Monitoring on VLT................................................................................................................................................... 645
40 Private VLANs (PVLAN).......................................................................................................... 648
Private VLAN Concepts................................................................................................................................................... 648
Using the Private VLAN Commands.............................................................................................................................. 649
Configuration Task List.................................................................................................................................................... 650
Creating PVLAN ports................................................................................................................................................650
Creating a Primary VLAN...........................................................................................................................................650
Creating a Community VLAN..................................................................................................................................... 651
Creating an Isolated VLAN.........................................................................................................................................652
Private VLAN Configuration Example............................................................................................................................ 653
Inspecting the Private VLAN Configuration.................................................................................................................. 654
41 Per-VLAN Spanning Tree Plus (PVST+).................................................................................... 656
Protocol Overview............................................................................................................................................................ 656
Implementation Information.............................................................................................................................................657
20
Contents
/