Dell PowerSwitch S6010-ON Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6010-ON Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S6010–ON
System
9.14.1.5
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2019 - 05
Rev. A00
Contents
1 About this Guide...........................................................................................................................................37
Audience............................................................................................................................................................................37
Conventions...................................................................................................................................................................... 37
Related Documents..........................................................................................................................................................37
2 Conguration Fundamentals........................................................................................................................ 38
Accessing the Command Line........................................................................................................................................38
CLI Modes.........................................................................................................................................................................38
Navigating CLI Modes...............................................................................................................................................40
The do Command............................................................................................................................................................ 43
Undoing Commands........................................................................................................................................................ 43
Obtaining Help..................................................................................................................................................................44
Entering and Editing Commands....................................................................................................................................44
Command History............................................................................................................................................................45
Filtering show Command Outputs.................................................................................................................................45
Example of the grep Keyword.................................................................................................................................. 45
Multiple Users in Conguration Mode...........................................................................................................................46
3 Getting Started............................................................................................................................................47
Console Access................................................................................................................................................................48
Serial Console.............................................................................................................................................................48
Default Conguration...................................................................................................................................................... 49
Conguring a Host Name............................................................................................................................................... 49
Accessing the System Remotely....................................................................................................................................49
Accessing the System Remotely............................................................................................................................. 50
Congure the Management Port IP Address.........................................................................................................50
Congure a Management Route..............................................................................................................................50
Conguring a Username and Password..................................................................................................................50
Conguring the Enable Password...................................................................................................................................51
Conguration File Management.....................................................................................................................................52
Copy Files to and from the System......................................................................................................................... 52
Mounting an NFS File System..................................................................................................................................53
Save the Running-Conguration..............................................................................................................................54
Congure the Overload Bit for a Startup Scenario............................................................................................... 55
Viewing Files...............................................................................................................................................................55
Managing the File System.............................................................................................................................................. 56
View Command History.................................................................................................................................................. 56
Upgrading Dell EMC Networking OS............................................................................................................................ 58
Using HTTP for File Transfers........................................................................................................................................ 58
Verify Software Images Before Installation...................................................................................................................59
4 Management................................................................................................................................................ 61
Contents
3
Conguring Privilege Levels............................................................................................................................................ 61
Creating a Custom Privilege Level...........................................................................................................................62
Removing a Command from EXEC Mode.............................................................................................................. 62
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................62
Allowing Access to CONFIGURATION Mode Commands....................................................................................62
Allowing Access to Dierent Modes........................................................................................................................62
Applying a Privilege Level to a Username............................................................................................................... 64
Applying a Privilege Level to a Terminal Line.......................................................................................................... 64
Conguring Logging........................................................................................................................................................ 64
Audit and Security Logs............................................................................................................................................65
Conguring Logging Format ...................................................................................................................................66
Setting Up a Secure Connection to a Syslog Server.............................................................................................66
Log Messages in the Internal Buer..............................................................................................................................68
Conguration Task List for System Log Management.......................................................................................... 68
Disabling System Logging............................................................................................................................................... 68
Sending System Messages to a Syslog Server............................................................................................................68
Conguring a UNIX System as a Syslog Server.....................................................................................................68
Track Login Activity......................................................................................................................................................... 69
Restrictions for Tracking Login Activity.................................................................................................................. 69
Conguring Login Activity Tracking.........................................................................................................................69
Display Login Statistics..............................................................................................................................................70
Limit Concurrent Login Sessions.....................................................................................................................................71
Restrictions for Limiting the Number of Concurrent Sessions............................................................................. 71
Conguring Concurrent Session Limit......................................................................................................................71
Enabling the System to Clear Existing Sessions.................................................................................................... 72
Enabling Secured CLI Mode............................................................................................................................................73
Changing System Logging Settings...............................................................................................................................73
Display the Logging Buer and the Logging Conguration........................................................................................ 74
Conguring a UNIX Logging Facility Level.................................................................................................................... 74
Synchronizing Log Messages......................................................................................................................................... 75
Enabling Timestamp on Syslog Messages.................................................................................................................... 76
File Transfer Services.......................................................................................................................................................79
Conguration Task List for File Transfer Services..................................................................................................79
Enabling the FTP Server........................................................................................................................................... 79
Conguring FTP Server Parameters........................................................................................................................79
Conguring FTP Client Parameters.........................................................................................................................80
Terminal Lines...................................................................................................................................................................80
Denying and Permitting Access to a Terminal Line.................................................................................................81
Conguring Login Authentication for Terminal Lines.............................................................................................82
Setting Timeout for EXEC Privilege Mode................................................................................................................... 83
Using Telnet to get to Another Network Device..........................................................................................................83
Lock CONFIGURATION Mode....................................................................................................................................... 84
Viewing the Conguration Lock Status...................................................................................................................84
Restoring the Factory Default Settings.........................................................................................................................84
Important Points to Remember................................................................................................................................85
4
Contents
Restoring Factory Default Environment Variables................................................................................................. 85
Viewing the Reason for Last System Reboot...............................................................................................................87
Disabling Syslog Messages for SNMP Authentication Failure Events.......................................................................87
5 802.1X..........................................................................................................................................................88
Port-Authentication Process..........................................................................................................................................90
EAP over RADIUS......................................................................................................................................................90
Conguring 802.1X........................................................................................................................................................... 91
Related Conguration Tasks......................................................................................................................................91
Important Points to Remember...................................................................................................................................... 91
Enabling 802.1X................................................................................................................................................................ 92
Conguring Request Identity Re-Transmissions...........................................................................................................93
Conguring a Quiet Period after a Failed Authentication..................................................................................... 94
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 95
Re-Authenticating a Port................................................................................................................................................95
Conguring Timeouts......................................................................................................................................................96
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................97
Guest and Authentication-Fail VLANs.......................................................................................................................... 98
Conguring a Guest VLAN....................................................................................................................................... 99
Conguring an Authentication-Fail VLAN...............................................................................................................99
6 Access Control Lists (ACLs)........................................................................................................................101
IP Access Control Lists (ACLs).....................................................................................................................................102
CAM Usage...............................................................................................................................................................103
Implementing ACLs on Dell EMC Networking OS................................................................................................103
Important Points to Remember....................................................................................................................................105
Conguration Task List for Route Maps................................................................................................................105
Conguring Match Routes...................................................................................................................................... 107
Conguring Set Conditions.....................................................................................................................................109
Congure a Route Map for Route Redistribution..................................................................................................110
Congure a Route Map for Route Tagging............................................................................................................ 110
Continue Clause......................................................................................................................................................... 111
IP Fragment Handling......................................................................................................................................................111
IP Fragments ACL Examples.................................................................................................................................... 111
Layer 4 ACL Rules Examples................................................................................................................................... 112
Congure a Standard IP ACL.........................................................................................................................................112
Conguring a Standard IP ACL Filter......................................................................................................................113
Congure an Extended IP ACL......................................................................................................................................114
Conguring Filters with a Sequence Number........................................................................................................114
Conguring Filters Without a Sequence Number................................................................................................. 116
Congure Layer 2 and Layer 3 ACLs.............................................................................................................................117
Assign an IP ACL to an Interface...................................................................................................................................117
Applying an IP ACL..........................................................................................................................................................117
Counting ACL Hits.................................................................................................................................................... 118
Congure Ingress ACLs.................................................................................................................................................. 118
Congure Egress ACLs...................................................................................................................................................119
Contents
5
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 120
IP Prex Lists.................................................................................................................................................................. 120
Implementation Information..................................................................................................................................... 121
Conguration Task List for Prex Lists...................................................................................................................121
ACL Remarks.................................................................................................................................................................. 124
Conguring a Remark.............................................................................................................................................. 125
Deleting a Remark.................................................................................................................................................... 125
ACL Resequencing......................................................................................................................................................... 126
Resequencing an ACL or Prex List.......................................................................................................................126
Route Maps.....................................................................................................................................................................128
Implementation Information.................................................................................................................................... 128
Flow-Based Monitoring..................................................................................................................................................128
Behavior of Flow-Based Monitoring.......................................................................................................................128
Enabling Flow-Based Monitoring............................................................................................................................130
Conguring IP Mirror Access Group............................................................................................................................. 131
Sample Conguration................................................................................................................................................131
Example of viewing IP mirror–access–group applied to an Interface................................................................132
7 Bidirectional Forwarding Detection (BFD).................................................................................................. 133
How BFD Works............................................................................................................................................................. 133
BFD Packet Format..................................................................................................................................................134
BFD Sessions............................................................................................................................................................ 135
BFD Three-Way Handshake.................................................................................................................................... 136
Session State Changes............................................................................................................................................138
Important Points to Remember.................................................................................................................................... 138
Congure BFD................................................................................................................................................................ 139
Congure BFD for Physical Ports...........................................................................................................................139
Congure BFD for Static Routes.............................................................................................................................141
Congure BFD for IPv6 Static Routes...................................................................................................................144
Congure BFD for OSPF......................................................................................................................................... 147
Congure BFD for OSPFv3.....................................................................................................................................153
Congure BFD for IS-IS...........................................................................................................................................156
Congure BFD for BGP...........................................................................................................................................158
Congure BFD for VRRP.........................................................................................................................................166
Conguring Protocol Liveness................................................................................................................................168
8 Border Gateway Protocol (BGP)................................................................................................................ 169
BGP IP version 4 (BGPv4) Overview..........................................................................................................................169
BGP Autonomous Systems.....................................................................................................................................169
AS4 Number Representation................................................................................................................................... 171
Four-Byte AS Numbers............................................................................................................................................173
BGP router ID............................................................................................................................................................173
Sessions and Peers...................................................................................................................................................173
Establish a Session....................................................................................................................................................174
BGP Attributes for selecting Best Path................................................................................................................. 174
Multiprotocol BGP....................................................................................................................................................179
6
Contents
BGP global and address family conguration........................................................................................................180
Implement BGP with Dell EMC Networking OS...................................................................................................182
Conguration Information........................................................................................................................................185
Basic BGP conguration tasks..................................................................................................................................... 185
Prerequisite for conguring a BGP network......................................................................................................... 185
Restrictions............................................................................................................................................................... 186
Enabling BGP............................................................................................................................................................ 186
Enabling four-byte autonomous system numbers................................................................................................188
Changing a BGP router ID.......................................................................................................................................189
Conguring AS4 Number Representations........................................................................................................... 189
Conguring a BGP peer........................................................................................................................................... 191
Example-Conguring BGP routing between peers.............................................................................................. 192
BGP peer group........................................................................................................................................................ 193
Advanced BGP conguration tasks............................................................................................................................. 199
Route-refresh and Soft-reconguration...............................................................................................................200
Aggregating Routes.................................................................................................................................................202
Filtering BGP............................................................................................................................................................ 204
Conguring BGP Fast Fall-Over..............................................................................................................................211
Conguring Passive Peering................................................................................................................................... 212
Enabling Graceful Restart........................................................................................................................................213
Redistributing Routes...............................................................................................................................................214
Enabling Additional Paths........................................................................................................................................ 215
Conguring IP Community Lists............................................................................................................................. 216
Conguring an IP Extended Community List........................................................................................................ 217
Congure BGP attributes........................................................................................................................................218
Enabling Multipath...................................................................................................................................................222
Route Reectors......................................................................................................................................................223
Enabling Route Flap Dampening............................................................................................................................ 224
Changing BGP keepalive and hold timers.............................................................................................................226
Setting the extended timer.....................................................................................................................................227
Enabling or disabling BGP neighbors.....................................................................................................................228
Route Map Continue............................................................................................................................................... 229
Conguring BGP Confederations.......................................................................................................................... 229
Conguring a BGP VRF address family................................................................................................................ 230
Maintaining Existing AS Numbers During an AS Migration................................................................................. 231
Allowing an AS Number to Appear in its Own AS Path.......................................................................................232
Enabling MBGP Congurations..............................................................................................................................233
MBGP support for IPv6..........................................................................................................................................233
Conguring IPv6 MBGP between peers...............................................................................................................234
Example-Conguring IPv4 and IPv6 neighbors................................................................................................... 235
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor..........................................237
BGP Regular Expression Optimization..................................................................................................................239
Debugging BGP....................................................................................................................................................... 239
9 Content Addressable Memory (CAM)........................................................................................................ 242
CAM Allocation...............................................................................................................................................................242
Contents
7
Test CAM Usage............................................................................................................................................................ 244
View CAM Proles.........................................................................................................................................................244
View CAM-ACL Settings.............................................................................................................................................. 245
View CAM Usage...........................................................................................................................................................246
Conguring CAM Threshold and Silence Period........................................................................................................ 247
Setting CAM Threshold and Silence Period..........................................................................................................247
CAM Optimization......................................................................................................................................................... 248
Troubleshoot CAM Proling..........................................................................................................................................248
QoS CAM Region Limitation...................................................................................................................................249
Syslog Error When the Table is Full....................................................................................................................... 249
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................249
Syslog Warning for Discrepancies Between Congured Extended Prexes....................................................249
Unied Forwarding Table (UFT) Modes......................................................................................................................249
Conguring UFT Modes......................................................................................................................................... 250
10 Control Plane Policing (CoPP).................................................................................................................. 251
Congure Control Plane Policing................................................................................................................................. 252
Conguring CoPP for Protocols............................................................................................................................ 253
Conguring CoPP for CPU Queues...................................................................................................................... 255
Displaying CoPP Conguration .............................................................................................................................256
11 Data Center Bridging (DCB)..................................................................................................................... 258
Ethernet Enhancements in Data Center Bridging..................................................................................................... 258
Priority-Based Flow Control................................................................................................................................... 259
Enhanced Transmission Selection..........................................................................................................................260
Data Center Bridging Exchange Protocol (DCBx)............................................................................................... 261
Data Center Bridging in a Trac Flow...................................................................................................................262
Enabling Data Center Bridging.....................................................................................................................................262
DCB Maps and its Attributes..................................................................................................................................263
Data Center Bridging: Default Conguration..............................................................................................................264
Conguring Priority-Based Flow Control....................................................................................................................264
Conguring Lossless Queues................................................................................................................................. 265
Conguring PFC in a DCB Map................................................................................................................................... 266
PFC Conguration Notes....................................................................................................................................... 266
PFC Prerequisites and Restrictions....................................................................................................................... 267
Applying a DCB Map on a Port.................................................................................................................................... 268
Conguring PFC without a DCB Map.........................................................................................................................268
Conguring Lossless QueuesExample:..................................................................................................................269
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................270
Pause and Resume of Trac..................................................................................................................................270
Buer Sizes for Lossless or PFC Packets.............................................................................................................270
Behavior of Tagged Packets..........................................................................................................................................271
Conguration Example for DSCP and PFC Priorities.................................................................................................271
SNMP Support for PFC and Buer Statistics Tracking............................................................................................272
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................273
PFC and ETS Conguration Examples........................................................................................................................ 274
8
Contents
Using PFC to Manage Converged Ethernet Trac................................................................................................... 274
Operations on Untagged Packets................................................................................................................................ 274
Generation of PFC for a Priority for Untagged Packets...........................................................................................275
Congure Enhanced Transmission Selection..............................................................................................................275
ETS Prerequisites and Restrictions........................................................................................................................275
Creating an ETS Priority Group..............................................................................................................................275
ETS Operation with DCBx...................................................................................................................................... 276
Conguring Bandwidth Allocation for DCBx CIN.................................................................................................277
Conguring ETS in a DCB Map..............................................................................................................................278
Hierarchical Scheduling in ETS Output Policies......................................................................................................... 279
Using ETS to Manage Converged Ethernet Trac................................................................................................... 279
Applying DCB Policies in a Switch Stack.................................................................................................................... 280
Congure a DCBx Operation........................................................................................................................................280
DCBx Operation.......................................................................................................................................................280
DCBx Port Roles......................................................................................................................................................280
DCB Conguration Exchange.................................................................................................................................282
Conguration Source Election................................................................................................................................282
Propagation of DCB Information............................................................................................................................283
Auto-Detection and Manual Conguration of the DCBx Version...................................................................... 283
DCBx Example..........................................................................................................................................................283
DCBx Prerequisites and Restrictions.....................................................................................................................284
Conguring DCBx....................................................................................................................................................284
Verifying the DCB Conguration................................................................................................................................. 288
QoS dot1p Trac Classication and Queue Assignment..........................................................................................296
Conguring the Dynamic Buer Method....................................................................................................................297
Sample DCB Conguration...........................................................................................................................................298
PFC and ETS Conguration Command Examples...............................................................................................299
12 Dynamic Host Conguration Protocol (DHCP).........................................................................................300
DHCP Packet Format and Options............................................................................................................................. 300
Assign an IP Address using DHCP...............................................................................................................................302
Implementation Information..........................................................................................................................................303
Congure the System to be a DHCP Server..............................................................................................................303
Conguring the Server for Automatic Address Allocation..................................................................................304
Specifying a Default Gateway................................................................................................................................305
Congure a Method of Hostname Resolution..................................................................................................... 306
Using DNS for Address Resolution........................................................................................................................306
Using NetBIOS WINS for Address Resolution..................................................................................................... 306
Creating Manual Binding Entries............................................................................................................................306
Debugging the DHCP Server................................................................................................................................. 307
Using DHCP Clear Commands...............................................................................................................................307
Congure the System to be a DHCP Client............................................................................................................... 307
Conguring the DHCP Client System...................................................................................................................308
DHCP Client on a Management Interface............................................................................................................309
DHCP Client Operation with Other Features........................................................................................................310
DHCP Relay When DHCP Server and Client are in Dierent VRFs..........................................................................311
Contents
9
Conguring Route Leaking between VRFs on DHCP Relay Agent.....................................................................311
Non-default VRF conguration for DHCPv6 helper address....................................................................................312
Conguring DHCP relay source interface....................................................................................................................312
Global DHCP relay source IPv4 or IPv6 conguration ........................................................................................312
Interface level DHCP relay source IPv4 or IPv6 conguration ...........................................................................313
Congure the System for User Port Stacking (Option 230).................................................................................... 314
Congure Secure DHCP................................................................................................................................................314
Option 82...................................................................................................................................................................315
DHCPv6 relay agent options...................................................................................................................................316
DHCP Snooping........................................................................................................................................................316
Drop DHCP Packets on Snooped VLANs Only....................................................................................................320
Dynamic ARP Inspection......................................................................................................................................... 321
Conguring Dynamic ARP Inspection....................................................................................................................321
Source Address Validation............................................................................................................................................ 323
Enabling IP Source Address Validation.................................................................................................................. 323
DHCP MAC Source Address Validation................................................................................................................ 324
Enabling IP+MAC Source Address Validation.......................................................................................................324
Viewing the Number of SAV Dropped Packets....................................................................................................325
Clearing the Number of SAV Dropped Packets................................................................................................... 325
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 326
ECMP for Flow-Based Anity.....................................................................................................................................326
Conguring the Hash Algorithm............................................................................................................................ 326
Enabling Deterministic ECMP Next Hop.............................................................................................................. 326
Conguring the Hash Algorithm Seed...................................................................................................................327
Link Bundle Monitoring..................................................................................................................................................327
Managing ECMP Group Paths...............................................................................................................................328
Creating an ECMP Group Bundle.......................................................................................................................... 328
Modifying the ECMP Group Threshold.................................................................................................................328
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................329
Support for ECMP in host table............................................................................................................................ 330
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 330
14 FIP Snooping.............................................................................................................................................331
Fibre Channel over Ethernet.........................................................................................................................................331
Ensure Robustness in a Converged Ethernet Network.............................................................................................331
FIP Snooping on Ethernet Bridges.............................................................................................................................. 333
FIP Snooping in a Switch Stack...................................................................................................................................335
Using FIP Snooping....................................................................................................................................................... 335
FIP Snooping Prerequisites.....................................................................................................................................335
Important Points to Remember............................................................................................................................. 335
Enabling the FCoE Transit Feature........................................................................................................................336
Enable FIP Snooping on VLANs............................................................................................................................. 337
Congure the FC-MAP Value.................................................................................................................................337
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 337
Congure a Port for a Bridge-to-FCF Link........................................................................................................... 337
10
Contents
Impact on Other Software Features......................................................................................................................337
FIP Snooping Restrictions...................................................................................................................................... 338
Conguring FIP Snooping.......................................................................................................................................338
Displaying FIP Snooping Information...........................................................................................................................339
FCoE Transit Conguration Example...........................................................................................................................344
15 Flex Hash and Optimized Boot-Up............................................................................................................346
Flex Hash Capability Overview.....................................................................................................................................346
Conguring the Flex Hash Mechanism.......................................................................................................................346
Conguring Fast Boot and LACP Fast Switchover................................................................................................... 347
Optimizing the Boot Time.............................................................................................................................................347
Booting Process When Optimized Boot Time Mechanism is Enabled.............................................................. 347
Guidelines for Conguring Optimized Booting Mechanism................................................................................348
Interoperation of Applications with Fast Boot and System States..........................................................................349
LACP and IPv4 Routing.......................................................................................................................................... 349
LACP and IPv6 Routing.......................................................................................................................................... 349
BGP Graceful Restart............................................................................................................................................. 350
Cold Boot Caused by Power Cycling the System............................................................................................... 350
Unexpected Reload of the System........................................................................................................................350
Software Upgrade................................................................................................................................................... 350
LACP Fast Switchover............................................................................................................................................350
Changes to BGP Multipath..................................................................................................................................... 351
Delayed Installation of ECMP Routes Into BGP....................................................................................................351
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................ 351
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 352
16 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 353
Protocol Overview.........................................................................................................................................................353
Ring Status............................................................................................................................................................... 354
Multiple FRRP Rings............................................................................................................................................... 354
Important FRRP Points...........................................................................................................................................355
Important FRRP Concepts.....................................................................................................................................356
Implementing FRRP.......................................................................................................................................................357
FRRP Conguration.......................................................................................................................................................357
Creating the FRRP Group.......................................................................................................................................357
Conguring the Control VLAN............................................................................................................................... 357
Conguring and Adding the Member VLANs...................................................................................................... 359
Setting the FRRP Timers........................................................................................................................................360
Clearing the FRRP Counters..................................................................................................................................360
Viewing the FRRP Conguration...........................................................................................................................360
Viewing the FRRP Information.............................................................................................................................. 360
Troubleshooting FRRP................................................................................................................................................... 361
Conguration Checks.............................................................................................................................................. 361
Sample Conguration and Topology.............................................................................................................................361
FRRP Support on VLT...................................................................................................................................................362
Example Scenario.................................................................................................................................................... 363
Contents
11
Important Points to Remember............................................................................................................................. 364
17 GARP VLAN Registration Protocol (GVRP)..............................................................................................365
Important Points to Remember................................................................................................................................... 365
Congure GVRP............................................................................................................................................................ 366
Related Conguration Tasks...................................................................................................................................366
Enabling GVRP Globally................................................................................................................................................ 367
Enabling GVRP on a Layer 2 Interface........................................................................................................................367
Congure GVRP Registration.......................................................................................................................................367
Congure a GARP Timer.............................................................................................................................................. 368
18 Internet Group Management Protocol (IGMP)......................................................................................... 369
IGMP Implementation Information.............................................................................................................................. 369
IGMP Protocol Overview..............................................................................................................................................369
IGMP Version 2........................................................................................................................................................369
IGMP Version 3......................................................................................................................................................... 371
Congure IGMP..............................................................................................................................................................374
Related Conguration Tasks................................................................................................................................... 374
Viewing IGMP Enabled Interfaces............................................................................................................................... 375
Selecting an IGMP Version........................................................................................................................................... 375
Viewing IGMP Groups................................................................................................................................................... 376
Adjusting Timers.............................................................................................................................................................376
Adjusting Query and Response Timers................................................................................................................. 376
Enabling IGMP Immediate-Leave.................................................................................................................................377
IGMP Snooping.............................................................................................................................................................. 378
IGMP Snooping Implementation Information....................................................................................................... 378
Conguring IGMP Snooping...................................................................................................................................378
Removing a Group-Port Association..................................................................................................................... 379
Disabling Multicast Flooding................................................................................................................................... 379
Specifying a Port as Connected to a Multicast Router.......................................................................................379
Conguring the Switch as Querier........................................................................................................................ 380
Fast Convergence after MSTP Topology Changes...................................................................................................380
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................380
Protocol Separation..................................................................................................................................................381
Enabling and Disabling Management Egress Interface Selection...................................................................... 382
Handling of Management Route Conguration................................................................................................... 383
Handling of Switch-Initiated Trac....................................................................................................................... 383
Handling of Switch-Destined Trac......................................................................................................................384
Handling of Transit Trac (Trac Separation).................................................................................................... 385
Mapping of Management Applications and Trac Type.....................................................................................385
Behavior of Various Applications for Switch-Initiated Trac ............................................................................ 386
Behavior of Various Applications for Switch-Destined Trac ...........................................................................387
Interworking of EIS With Various Applications..................................................................................................... 387
Designating a Multicast Router Interface...................................................................................................................388
19 Interfaces.................................................................................................................................................389
12
Contents
Basic Interface Conguration.......................................................................................................................................389
Advanced Interface Conguration...............................................................................................................................389
Interface Types...............................................................................................................................................................390
View Basic Interface Information.................................................................................................................................390
Resetting an Interface to its Factory Default State...................................................................................................392
Enabling a Physical Interface........................................................................................................................................393
Physical Interfaces.........................................................................................................................................................393
Conguration Task List for Physical Interfaces.................................................................................................... 393
40G to 1G Breakout Cable Adaptor....................................................................................................................... 393
Overview of Layer Modes...................................................................................................................................... 394
Conguring Layer 2 (Data Link) Mode..................................................................................................................395
Conguring Layer 2 (Interface) Mode.................................................................................................................. 395
Conguring Layer 3 (Network) Mode...................................................................................................................395
Conguring Layer 3 (Interface) Mode.................................................................................................................. 396
Automatic recovery of an Err-disabled interface....................................................................................................... 397
Conguring an automatic recovery for an Err-disabled interface......................................................................397
Egress Interface Selection (EIS)..................................................................................................................................398
Important Points to Remember............................................................................................................................. 398
Conguring EIS........................................................................................................................................................ 398
Management Interfaces................................................................................................................................................399
Conguring Management Interfaces.................................................................................................................... 399
Conguring a Management Interface on an Ethernet Port............................................................................... 400
VLAN Interfaces............................................................................................................................................................. 401
Loopback Interfaces......................................................................................................................................................402
Null Interfaces................................................................................................................................................................ 402
Port Channel Interfaces................................................................................................................................................402
Port Channel Denition and Standards.................................................................................................................403
Port Channel Benets.............................................................................................................................................403
Port Channel Implementation.................................................................................................................................403
Interfaces in Port Channels.................................................................................................................................... 404
Conguration Tasks for Port Channel Interfaces.................................................................................................404
Creating a Port Channel......................................................................................................................................... 404
Adding a Physical Interface to a Port Channel.....................................................................................................405
Reassigning an Interface to a New Port Channel................................................................................................406
Conguring the Minimum Oper Up Links in a Port Channel...............................................................................407
Adding or Removing a Port Channel from a VLAN............................................................................................. 407
Assigning an IP Address to a Port Channel.......................................................................................................... 408
Deleting or Disabling a Port Channel.....................................................................................................................409
Load Balancing Through Port Channels............................................................................................................... 409
Changing the Hash Algorithm................................................................................................................................409
Bulk Conguration..........................................................................................................................................................410
Interface Range........................................................................................................................................................ 410
Bulk Conguration Examples................................................................................................................................... 411
Dening Interface Range Macros................................................................................................................................. 412
Dene the Interface Range..................................................................................................................................... 413
Contents
13
Choosing an Interface-Range Macro.....................................................................................................................413
Monitoring and Maintaining Interfaces........................................................................................................................ 413
Maintenance Using TDR..........................................................................................................................................414
Non Dell-Qualied Transceivers....................................................................................................................................415
Splitting 40G Ports without Reload............................................................................................................................. 415
Splitting QSFP Ports to SFP+ Ports............................................................................................................................ 417
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port...................................................................................417
Important Points to Remember.............................................................................................................................. 418
Example Scenarios................................................................................................................................................... 418
Link Dampening.............................................................................................................................................................. 419
Important Points to Remember............................................................................................................................. 420
Conguration Example of Link Dampening...........................................................................................................420
Enabling Link Dampening........................................................................................................................................422
Link Bundle Monitoring................................................................................................................................................. 423
Using Ethernet Pause Frames for Flow Control........................................................................................................ 424
Enabling Pause Frames........................................................................................................................................... 424
Congure the MTU Size on an Interface....................................................................................................................425
Port-Pipes.......................................................................................................................................................................426
Auto-Negotiation on Ethernet Interfaces................................................................................................................... 426
Setting the Speed of Ethernet Interfaces............................................................................................................ 426
Set Auto-Negotiation Options................................................................................................................................427
View Advanced Interface Information.........................................................................................................................428
Conguring the Interface Sampling Size.............................................................................................................. 429
Conguring the Trac Sampling Size Globally...........................................................................................................430
Dynamic Counters.......................................................................................................................................................... 431
Clearing Interface Counters....................................................................................................................................432
Compressing Conguration Files................................................................................................................................. 432
Discard Counters........................................................................................................................................................... 435
Display discard counters......................................................................................................................................... 435
20 IPv4 Routing............................................................................................................................................438
IP Addresses...................................................................................................................................................................439
Implementation Information....................................................................................................................................439
Conguration Tasks for IP Addresses..........................................................................................................................439
Assigning IP Addresses to an Interface.......................................................................................................................439
Conguring Static Routes............................................................................................................................................ 440
Adding description for IPv4 and IPv6 static routes..............................................................................................441
Congure Static Routes for the Management Interface.......................................................................................... 442
IPv4 Path MTU Discovery Overview.......................................................................................................................... 442
Packet handling during MTU mismatch................................................................................................................443
Using the Congured Source IP Address in ICMP Messages..................................................................................443
Conguring the ICMP Source Interface............................................................................................................... 443
Conguring the Duration to Establish a TCP Connection........................................................................................ 443
Enabling Directed Broadcast........................................................................................................................................ 444
Resolution of Host Names............................................................................................................................................444
Enabling Dynamic Resolution of Host Names............................................................................................................445
14
Contents
Specifying the Local System Domain and a List of Domains................................................................................... 445
Conguring DNS with Traceroute................................................................................................................................446
ARP................................................................................................................................................................................. 446
Conguration Tasks for ARP........................................................................................................................................ 447
Conguring Static ARP Entries....................................................................................................................................447
Enabling Proxy ARP.......................................................................................................................................................447
Clearing ARP Cache......................................................................................................................................................448
ARP Learning via Gratuitous ARP................................................................................................................................448
Enabling ARP Learning via Gratuitous ARP................................................................................................................448
ARP Learning via ARP Request................................................................................................................................... 448
Conguring ARP Retries...............................................................................................................................................449
ICMP............................................................................................................................................................................... 450
Conguration Tasks for ICMP......................................................................................................................................450
Enabling ICMP Unreachable Messages...................................................................................................................... 450
ICMP Redirects..............................................................................................................................................................450
UDP Helper..................................................................................................................................................................... 451
Congure UDP Helper............................................................................................................................................. 451
Important Points to Remember............................................................................................................................. 452
Enabling UDP Helper.....................................................................................................................................................452
Congurations Using UDP Helper............................................................................................................................... 452
UDP Helper with Broadcast-All Addresses.................................................................................................................452
UDP Helper with Subnet Broadcast Addresses.........................................................................................................453
UDP Helper with Congured Broadcast Addresses..................................................................................................453
UDP Helper with No Congured Broadcast Addresses............................................................................................454
Troubleshooting UDP Helper........................................................................................................................................454
21 IPv6 Routing............................................................................................................................................ 455
Protocol Overview.........................................................................................................................................................455
Extended Address Space........................................................................................................................................456
Stateless Autoconguration................................................................................................................................... 456
IPv6 Headers............................................................................................................................................................456
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support....................................................................457
IPv6 Header Fields...................................................................................................................................................458
Extension Header Fields......................................................................................................................................... 460
Addressing.................................................................................................................................................................461
Implementing IPv6 with Dell EMC Networking OS................................................................................................... 462
ICMPv6...........................................................................................................................................................................463
Path MTU discovery......................................................................................................................................................464
IPv6 Neighbor Discovery.............................................................................................................................................. 464
IPv6 Neighbor Discovery of MTU Packets.......................................................................................................... 465
Conguring the IPv6 Recursive DNS Server....................................................................................................... 465
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................466
Displaying IPv6 RDNSS Information......................................................................................................................466
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 467
Conguration Tasks for IPv6........................................................................................................................................ 467
Adjusting Your CAM-Prole.................................................................................................................................... 467
Contents
15
Assigning an IPv6 Address to an Interface...........................................................................................................468
Assigning a Static IPv6 Route................................................................................................................................469
Conguring Telnet with IPv6..................................................................................................................................469
SNMP over IPv6......................................................................................................................................................470
Displaying IPv6 Information.................................................................................................................................... 470
Displaying an IPv6 Interface Information.............................................................................................................. 470
Showing IPv6 Routes...............................................................................................................................................471
Showing the Running-Conguration for an Interface......................................................................................... 472
Clearing IPv6 Routes............................................................................................................................................... 473
Disabling ND Entry Timeout................................................................................................................................... 473
Conguring IPv6 RA Guard.......................................................................................................................................... 473
Conguring IPv6 RA Guard on an Interface.........................................................................................................475
Monitoring IPv6 RA Guard......................................................................................................................................476
22 iSCSI Optimization...................................................................................................................................477
iSCSI Optimization Overview....................................................................................................................................... 477
Monitoring iSCSI Trac Flows...............................................................................................................................479
Application of Quality of Service to iSCSI Trac Flows......................................................................................479
Information Monitored in iSCSI Trac Flows....................................................................................................... 479
Detection and Auto-Conguration for Dell EqualLogic Arrays...........................................................................480
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................480
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer..................................................................481
Enable and Disable iSCSI Optimization..................................................................................................................481
Default iSCSI Optimization Values...............................................................................................................................482
iSCSI Optimization Prerequisites................................................................................................................................. 482
Conguring iSCSI Optimization....................................................................................................................................482
Displaying iSCSI Optimization Information..................................................................................................................484
23 Intermediate System to Intermediate System.......................................................................................... 486
IS-IS Protocol Overview............................................................................................................................................... 486
IS-IS Addressing.............................................................................................................................................................486
Multi-Topology IS-IS.......................................................................................................................................................487
Transition Mode........................................................................................................................................................487
Interface Support.....................................................................................................................................................488
Adjacencies...............................................................................................................................................................488
Graceful Restart.............................................................................................................................................................488
Timers........................................................................................................................................................................488
Implementation Information..........................................................................................................................................488
Conguration Information.............................................................................................................................................489
Conguration Tasks for IS-IS..................................................................................................................................490
Conguring the Distance of a Route.....................................................................................................................497
Changing the IS-Type.............................................................................................................................................. 498
Redistributing IPv4 Routes.....................................................................................................................................500
Redistributing IPv6 Routes..................................................................................................................................... 501
Conguring Authentication Passwords.................................................................................................................502
Setting the Overload Bit.........................................................................................................................................502
16
Contents
Debugging IS-IS.......................................................................................................................................................503
IS-IS Metric Styles.........................................................................................................................................................504
Congure Metric Values............................................................................................................................................... 504
Maximum Values in the Routing Table.................................................................................................................. 504
Change the IS-IS Metric Style in One Level Only................................................................................................504
Leaks from One Level to Another..........................................................................................................................506
Sample Congurations.................................................................................................................................................. 507
24 Link Aggregation Control Protocol (LACP).............................................................................................. 509
Introduction to Dynamic LAGs and LACP.................................................................................................................. 509
Important Points to Remember............................................................................................................................. 509
LACP Modes.............................................................................................................................................................510
Conguring LACP Commands................................................................................................................................510
LACP Conguration Tasks..............................................................................................................................................511
Creating a LAG.......................................................................................................................................................... 511
Conguring the LAG Interfaces as Dynamic..........................................................................................................511
Setting the LACP Long Timeout............................................................................................................................ 512
Monitoring and Debugging LACP...........................................................................................................................512
Shared LAG State Tracking........................................................................................................................................... 513
Conguring Shared LAG State Tracking................................................................................................................513
Important Points about Shared LAG State Tracking............................................................................................515
LACP Basic Conguration Example............................................................................................................................. 515
Congure a LAG on ALPHA....................................................................................................................................515
25 Layer 2.....................................................................................................................................................524
Manage the MAC Address Table................................................................................................................................. 524
Clearing the MAC Address Table........................................................................................................................... 524
Setting the Aging Time for Dynamic Entries........................................................................................................524
Conguring a Static MAC Address........................................................................................................................525
Displaying the MAC Address Table........................................................................................................................ 525
MAC Learning Limit.......................................................................................................................................................525
Setting the MAC Learning Limit............................................................................................................................ 526
mac learning-limit Dynamic.....................................................................................................................................526
mac learning-limit mac-address-sticky................................................................................................................. 526
mac learning-limit station-move.............................................................................................................................527
mac learning-limit no-station-move.......................................................................................................................527
Learning Limit Violation Actions............................................................................................................................. 527
Setting Station Move Violation Actions................................................................................................................ 528
Recovering from Learning Limit and Station Move Violations........................................................................... 528
Enabling port security............................................................................................................................................. 529
NIC Teaming................................................................................................................................................................... 529
Congure Redundant Pairs.......................................................................................................................................... 530
Important Points about Conguring Redundant Pairs........................................................................................ 532
Far-End Failure Detection.............................................................................................................................................533
FEFD State Changes...............................................................................................................................................534
Conguring FEFD.................................................................................................................................................... 535
Contents
17
Enabling FEFD on an Interface.............................................................................................................................. 535
Debugging FEFD......................................................................................................................................................536
26 Link Layer Discovery Protocol (LLDP)..................................................................................................... 538
802.1AB (LLDP) Overview............................................................................................................................................538
Protocol Data Units................................................................................................................................................. 538
Optional TLVs.................................................................................................................................................................539
Management TLVs.................................................................................................................................................. 539
TIA-1057 (LLDP-MED) Overview................................................................................................................................. 541
TIA Organizationally Specic TLVs.........................................................................................................................541
Congure LLDP............................................................................................................................................................. 545
Related Conguration Tasks...................................................................................................................................545
Important Points to Remember............................................................................................................................. 545
LLDP Compatibility..................................................................................................................................................546
CONFIGURATION versus INTERFACE Congurations............................................................................................ 546
Enabling LLDP................................................................................................................................................................546
Disabling and Undoing LLDP.................................................................................................................................. 547
Enabling LLDP on Management Ports........................................................................................................................547
Disabling and Undoing LLDP on Management Ports.......................................................................................... 547
Advertising TLVs............................................................................................................................................................ 547
Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................549
Reserved Unrecognized LLDP TLVs..................................................................................................................... 549
Organizational Specic Unrecognized LLDP TLVs..............................................................................................549
Viewing Unrecognized LLDP TLVs........................................................................................................................ 549
Viewing the LLDP Conguration................................................................................................................................. 550
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................550
Examples of Viewing Information Advertised by Neighbors.............................................................................. 550
Conguring LLDPDU Intervals.....................................................................................................................................552
Conguring LLDP Notication Interval....................................................................................................................... 553
Conguring LLDP Notication Interval....................................................................................................................... 553
Conguring Transmit and Receive Mode................................................................................................................... 553
Conguring the Time to Live Value............................................................................................................................. 554
Debugging LLDP............................................................................................................................................................555
Relevant Management Objects................................................................................................................................... 556
27 Microsoft Network Load Balancing...........................................................................................................561
NLB Unicast Mode Scenario.........................................................................................................................................561
NLB Multicast Mode Scenario......................................................................................................................................561
Limitations of the NLB Feature....................................................................................................................................562
Microsoft Clustering......................................................................................................................................................562
Enable and Disable VLAN Flooding ............................................................................................................................ 562
Conguring a Switch for NLB .....................................................................................................................................562
Enabling a Switch for Multicast NLB.................................................................................................................... 563
28 Multicast Source Discovery Protocol (MSDP)......................................................................................... 564
Protocol Overview.........................................................................................................................................................564
18
Contents
Anycast RP.....................................................................................................................................................................565
Implementation Information......................................................................................................................................... 566
Congure Multicast Source Discovery Protocol........................................................................................................566
Related Conguration Tasks...................................................................................................................................566
Enable MSDP................................................................................................................................................................. 570
Manage the Source-Active Cache............................................................................................................................... 571
Viewing the Source-Active Cache..........................................................................................................................571
Limiting the Source-Active Cache..........................................................................................................................571
Clearing the Source-Active Cache........................................................................................................................ 572
Enabling the Rejected Source-Active Cache....................................................................................................... 572
Accept Source-Active Messages that Fail the RFP Check......................................................................................572
Specifying Source-Active Messages...........................................................................................................................575
Limiting the Source-Active Messages from a Peer...................................................................................................576
Preventing MSDP from Caching a Local Source....................................................................................................... 576
Preventing MSDP from Caching a Remote Source...................................................................................................577
Preventing MSDP from Advertising a Local Source..................................................................................................577
Logging Changes in Peership States...........................................................................................................................578
Terminating a Peership..................................................................................................................................................578
Clearing Peer Statistics.................................................................................................................................................579
Debugging MSDP.......................................................................................................................................................... 579
MSDP with Anycast RP................................................................................................................................................580
Conguring Anycast RP................................................................................................................................................ 581
Reducing Source-Active Message Flooding.........................................................................................................582
Specifying the RP Address Used in SA Messages.............................................................................................. 582
MSDP Sample Congurations......................................................................................................................................584
32 Multicast Listener Discovery Protocol......................................................................................................587
MLD Version 1.................................................................................................................................................................587
MLD Querier Router...................................................................................................................................................... 587
Joining a Multicast Group.............................................................................................................................................588
Leaving a Multicast Group............................................................................................................................................588
MLD version 2................................................................................................................................................................588
MLD timers.....................................................................................................................................................................590
Reducing Host Response Burstiness.....................................................................................................................591
Conguring MLD Version.............................................................................................................................................. 591
Clearing MLD groups..................................................................................................................................................... 591
Debugging MLD..............................................................................................................................................................591
Explicit Tracking..............................................................................................................................................................591
Reducing Leave Latency...............................................................................................................................................592
Displaying MLD groups table........................................................................................................................................592
Displaying MLD Interfaces............................................................................................................................................592
30 Multiple Spanning Tree Protocol (MSTP)................................................................................................ 593
Protocol Overview.........................................................................................................................................................593
Spanning Tree Variations.............................................................................................................................................. 594
Implementation Information....................................................................................................................................594
Contents
19
Congure Multiple Spanning Tree Protocol................................................................................................................594
Related Conguration Tasks...................................................................................................................................595
Enable Multiple Spanning Tree Globally...................................................................................................................... 595
Adding and Removing Interfaces.................................................................................................................................595
Creating Multiple Spanning Tree Instances................................................................................................................ 596
Inuencing MSTP Root Selection................................................................................................................................597
Interoperate with Non-Dell Bridges.............................................................................................................................598
Changing the Region Name or Revision..................................................................................................................... 598
Modifying Global Parameters.......................................................................................................................................598
Modifying the Interface Parameters........................................................................................................................... 600
Setting STP path cost as constant..............................................................................................................................601
Conguring an EdgePort...............................................................................................................................................601
Flush MAC Addresses after a Topology Change....................................................................................................... 602
MSTP Sample Congurations......................................................................................................................................602
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................602
Debugging and Verifying MSTP Congurations........................................................................................................ 606
31 Multicast Features................................................................................................................................... 609
Enabling IP Multicast.....................................................................................................................................................609
Implementation Information......................................................................................................................................... 609
Multicast Policies............................................................................................................................................................610
IPv4 Multicast Policies.............................................................................................................................................610
Understanding Multicast Traceroute (mtrace)........................................................................................................... 617
Important Points to Remember.............................................................................................................................. 618
Printing Multicast Traceroute (mtrace) Paths............................................................................................................ 618
Supported Error Codes..................................................................................................................................................619
mtrace Scenarios...........................................................................................................................................................620
32 Multicast Listener Discovery Protocol..................................................................................................... 626
MLD Version 1................................................................................................................................................................ 626
MLD Querier Router......................................................................................................................................................626
Joining a Multicast Group............................................................................................................................................. 627
Leaving a Multicast Group............................................................................................................................................ 627
MLD version 2................................................................................................................................................................ 627
MLD timers.....................................................................................................................................................................629
Reducing Host Response Burstiness.................................................................................................................... 630
Clearing MLD groups.................................................................................................................................................... 630
Debugging MLD.............................................................................................................................................................630
Explicit Tracking............................................................................................................................................................. 630
Reducing Leave Latency...............................................................................................................................................630
Displaying MLD groups table.........................................................................................................................................631
Displaying MLD Interfaces.............................................................................................................................................631
MLD Snooping................................................................................................................................................................ 631
Enable MLD Snooping............................................................................................................................................. 631
Disable MLD Snooping............................................................................................................................................632
20
Contents
/