Dell PowerSwitch S4810P User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4810P User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S4810 System
9.9(0.0)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell
and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be
trademarks of their respective companies.
2015 - 09
Rev. A00
Contents
1 About this Guide............................................................................................................ 33
Audience.......................................................................................................................................................................... 33
Conventions..................................................................................................................................................................... 33
Related Documents.......................................................................................................................................................... 33
2 Conguration Fundamentals..........................................................................................34
Accessing the Command Line.......................................................................................................................................... 34
CLI Modes........................................................................................................................................................................34
Navigating CLI Modes................................................................................................................................................ 36
The do Command.............................................................................................................................................................38
Undoing Commands.........................................................................................................................................................39
Obtaining Help..................................................................................................................................................................39
Entering and Editing Commands...................................................................................................................................... 40
Command History............................................................................................................................................................. 41
Filtering show Command Outputs.....................................................................................................................................41
Example of the grep Keyword..................................................................................................................................... 41
Multiple Users in Conguration Mode...............................................................................................................................42
3 Getting Started............................................................................................................. 43
Console Access................................................................................................................................................................ 43
Serial Console.............................................................................................................................................................43
Accessing the CLI Interface and Running Scripts Using SSH........................................................................................... 44
Entering CLI commands Using an SSH Connection....................................................................................................44
Executing Local CLI Scripts Using an SSH Connection.............................................................................................. 44
Default Conguration....................................................................................................................................................... 45
Conguring a Host Name.................................................................................................................................................45
Accessing the System Remotely...................................................................................................................................... 45
Accessing the System Remotely................................................................................................................................ 45
Congure the Management Port IP Address.............................................................................................................. 46
Congure a Management Route.................................................................................................................................46
Conguring a Username and Password...................................................................................................................... 46
Conguring the Enable Password.....................................................................................................................................46
Conguration File Management........................................................................................................................................47
Copy Files to and from the System.............................................................................................................................47
Mounting an NFS File System.................................................................................................................................... 48
Save the Running-Conguration................................................................................................................................ 49
Congure the Overload Bit for a Startup Scenario.....................................................................................................50
Viewing Files.............................................................................................................................................................. 50
Compressing Conguration Files................................................................................................................................. 51
Managing the File System................................................................................................................................................ 53
Enabling Software Features on Devices Using a Command Option.................................................................................. 54
View Command History....................................................................................................................................................54
3
Upgrading Dell Networking OS.........................................................................................................................................55
Using Hashes to Verify Software Images Before Installation.............................................................................................55
Using HTTP for File Transfers.......................................................................................................................................... 56
4 Management................................................................................................................. 57
Conguring Privilege Levels..............................................................................................................................................57
Creating a Custom Privilege Level.............................................................................................................................. 57
Removing a Command from EXEC Mode...................................................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................................................ 57
Allowing Access to CONFIGURATION Mode Commands........................................................................................... 57
Allowing Access to Dierent Modes...........................................................................................................................58
Applying a Privilege Level to a Username................................................................................................................... 59
Applying a Privilege Level to a Terminal Line...............................................................................................................60
Conguring Logging......................................................................................................................................................... 60
Audit and Security Logs............................................................................................................................................. 60
Conguring Logging Format .....................................................................................................................................62
Display the Logging Buer and the Logging Conguration......................................................................................... 62
Setting Up a Secure Connection to a Syslog Server...................................................................................................63
Sending System Messages to a Syslog Server........................................................................................................... 64
Track Login Activity.......................................................................................................................................................... 64
Restrictions for Tracking Login Activity...................................................................................................................... 64
Conguring Login Activity Tracking............................................................................................................................ 64
Display Login Statistics...............................................................................................................................................65
Limit Concurrent Login Sessions...................................................................................................................................... 66
Restrictions for Limiting the Number of Concurrent Sessions.................................................................................... 66
Conguring Concurrent Session Limit........................................................................................................................ 66
Enabling the System to Clear Existing Sessions......................................................................................................... 66
Log Messages in the Internal Buer................................................................................................................................. 67
Conguration Task List for System Log Management.................................................................................................67
Disabling System Logging................................................................................................................................................. 67
Sending System Messages to a Syslog Server................................................................................................................. 68
Conguring a UNIX System as a Syslog Server..........................................................................................................68
Changing System Logging Settings..................................................................................................................................68
Display the Logging Buer and the Logging Conguration............................................................................................... 69
Conguring a UNIX Logging Facility Level........................................................................................................................ 70
Synchronizing Log Messages............................................................................................................................................ 71
Enabling Timestamp on Syslog Messages......................................................................................................................... 71
File Transfer Services........................................................................................................................................................72
Conguration Task List for File Transfer Services........................................................................................................72
Enabling the FTP Server.............................................................................................................................................72
Conguring FTP Server Parameters........................................................................................................................... 72
Conguring FTP Client Parameters............................................................................................................................ 73
Terminal Lines...................................................................................................................................................................73
Denying and Permitting Access to a Terminal Line......................................................................................................73
Conguring Login Authentication for Terminal Lines................................................................................................... 74
Setting Timeout for EXEC Privilege Mode........................................................................................................................75
4
Using Telnet to get to Another Network Device............................................................................................................... 76
Lock CONFIGURATION Mode..........................................................................................................................................76
Viewing the Conguration Lock Status.......................................................................................................................77
Recovering from a Forgotten Password............................................................................................................................77
Recovering from a Forgotten Enable Password.......................................................................................................... 78
Recovering from a Failed Start......................................................................................................................................... 79
Restoring the Factory Default Settings.............................................................................................................................79
Important Points to Remember.................................................................................................................................. 79
Restoring Factory Default Environment Variables.......................................................................................................80
5 802.1ag..........................................................................................................................82
Ethernet CFM.................................................................................................................................................................. 82
Maintenance Domains...................................................................................................................................................... 83
Maintenance Points..........................................................................................................................................................83
Maintenance End Points...................................................................................................................................................84
Implementation Information..............................................................................................................................................84
Conguring the CFM....................................................................................................................................................... 85
Related Conguration Tasks....................................................................................................................................... 85
Enable Ethernet CFM.......................................................................................................................................................85
Creating a Maintenance Domain.......................................................................................................................................85
Creating a Maintenance Association.................................................................................................................................86
Create Maintenance Points.............................................................................................................................................. 86
Creating a Maintenance End Point............................................................................................................................. 86
Creating a Maintenance Intermediate Point................................................................................................................ 87
Displaying the MP Databases......................................................................................................................................87
Continuity Check Messages.............................................................................................................................................88
Enabling CCM............................................................................................................................................................ 89
Enabling Cross-Checking........................................................................................................................................... 89
Sending Loopback Messages and Responses...................................................................................................................89
Sending Linktrace Messages and Responses................................................................................................................... 89
Caching Link Trace.....................................................................................................................................................90
Enabling CFM SNMP Traps...............................................................................................................................................91
Displaying Ethernet CFM Statistics.................................................................................................................................. 92
6 802.1X........................................................................................................................... 94
Port-Authentication Process............................................................................................................................................ 95
EAP over RADIUS...................................................................................................................................................... 96
Conguring 802.1X............................................................................................................................................................97
Related Conguration Tasks....................................................................................................................................... 97
Important Points to Remember.........................................................................................................................................97
Enabling 802.1X................................................................................................................................................................ 98
Conguring Request Identity Re-Transmissions................................................................................................................99
Conguring a Quiet Period after a Failed Authentication...........................................................................................100
Forcibly Authorizing or Unauthorizing a Port................................................................................................................... 101
Re-Authenticating a Port.................................................................................................................................................101
Conguring Timeouts......................................................................................................................................................102
5
Conguring Dynamic VLAN Assignment with Port Authentication..................................................................................103
Guest and Authentication-Fail VLANs.............................................................................................................................104
Conguring a Guest VLAN....................................................................................................................................... 105
Conguring an Authentication-Fail VLAN................................................................................................................. 105
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 107
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...........................................................................107
Guidelines for Conguring ACL VLAN Groups................................................................................................................ 108
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters..........................................................108
Conguring ACL VLAN Groups.................................................................................................................................108
Conguring FP Blocks for VLAN Parameters............................................................................................................109
Viewing CAM Usage........................................................................................................................................................110
Allocating FP Blocks for VLAN Processes........................................................................................................................ 111
8 Access Control Lists (ACLs)......................................................................................... 113
IP Access Control Lists (ACLs)........................................................................................................................................ 114
CAM Usage............................................................................................................................................................... 114
Implementing ACLs on Dell Networking OS............................................................................................................... 115
Important Points to Remember........................................................................................................................................116
Conguration Task List for Route Maps.....................................................................................................................116
Conguring Match Routes.........................................................................................................................................118
Conguring Set Conditions.......................................................................................................................................120
Congure a Route Map for Route Redistribution....................................................................................................... 121
Congure a Route Map for Route Tagging.................................................................................................................121
Continue Clause.........................................................................................................................................................121
IP Fragment Handling..................................................................................................................................................... 122
IP Fragments ACL Examples.....................................................................................................................................122
Layer 4 ACL Rules Examples.....................................................................................................................................122
Congure a Standard IP ACL.......................................................................................................................................... 123
Conguring a Standard IP ACL Filter.........................................................................................................................124
Congure an Extended IP ACL........................................................................................................................................125
Conguring Filters with a Sequence Number............................................................................................................125
Conguring Filters Without a Sequence Number...................................................................................................... 126
Congure Layer 2 and Layer 3 ACLs............................................................................................................................... 127
Assign an IP ACL to an Interface.....................................................................................................................................127
Applying an IP ACL..........................................................................................................................................................128
Counting ACL Hits.................................................................................................................................................... 128
Congure Ingress ACLs...................................................................................................................................................129
Congure Egress ACLs................................................................................................................................................... 129
Applying Egress Layer 3 ACLs (Control-Plane)......................................................................................................... 130
IP Prex Lists...................................................................................................................................................................131
Implementation Information....................................................................................................................................... 131
Conguration Task List for Prex Lists.......................................................................................................................131
ACL Resequencing..........................................................................................................................................................134
Resequencing an ACL or Prex List..........................................................................................................................135
Route Maps.................................................................................................................................................................... 136
6
Implementation Information...................................................................................................................................... 136
Logging of ACL Processes.............................................................................................................................................. 137
Guidelines for Conguring ACL Logging.................................................................................................................... 137
Conguring ACL Logging.......................................................................................................................................... 138
Flow-Based Monitoring Support for ACLs.......................................................................................................................138
Behavior of Flow-Based Monitoring..........................................................................................................................139
Enabling Flow-Based Monitoring...............................................................................................................................140
9 Bidirectional Forwarding Detection (BFD)....................................................................142
How BFD Works............................................................................................................................................................. 142
BFD Packet Format.................................................................................................................................................. 143
BFD Sessions............................................................................................................................................................144
BFD Three-Way Handshake......................................................................................................................................145
Session State Changes............................................................................................................................................. 147
Important Points to Remember.......................................................................................................................................147
Congure BFD................................................................................................................................................................ 147
Congure BFD for Physical Ports..............................................................................................................................148
Congure BFD for Static Routes............................................................................................................................... 151
Congure BFD for OSPF.......................................................................................................................................... 152
Congure BFD for OSPFv3.......................................................................................................................................154
Congure BFD for IS-IS............................................................................................................................................ 156
Congure BFD for BGP............................................................................................................................................ 158
Congure BFD for VRRP.......................................................................................................................................... 164
Conguring Protocol Liveness...................................................................................................................................167
Troubleshooting BFD.................................................................................................................................................167
10 Border Gateway Protocol IPv4 (BGPv4).................................................................... 169
Autonomous Systems (AS).............................................................................................................................................169
Sessions and Peers..........................................................................................................................................................171
Establish a Session.....................................................................................................................................................171
Route Reectors............................................................................................................................................................. 172
BGP Attributes................................................................................................................................................................173
Best Path Selection Criteria...................................................................................................................................... 173
Weight...................................................................................................................................................................... 175
Local Preference.......................................................................................................................................................175
Multi-Exit Discriminators (MEDs)..............................................................................................................................176
Origin........................................................................................................................................................................ 177
AS Path.....................................................................................................................................................................177
Next Hop.................................................................................................................................................................. 178
Multiprotocol BGP...........................................................................................................................................................178
Implement BGP with Dell Networking OS....................................................................................................................... 179
Additional Path (Add-Path) Support......................................................................................................................... 179
Advertise IGP Cost as MED for Redistributed Routes...............................................................................................179
Ignore Router-ID in Best-Path Calculation.................................................................................................................180
Four-Byte AS Numbers.............................................................................................................................................180
AS4 Number Representation.................................................................................................................................... 180
7
AS Number Migration............................................................................................................................................... 182
BGP4 Management Information Base (MIB).............................................................................................................183
Important Points to Remember.................................................................................................................................183
Conguration Information............................................................................................................................................... 184
BGP Conguration..........................................................................................................................................................184
Enabling BGP............................................................................................................................................................185
Conguring AS4 Number Representations................................................................................................................188
Conguring Peer Groups...........................................................................................................................................189
Conguring BGP Fast Fall-Over................................................................................................................................192
Conguring Passive Peering..................................................................................................................................... 194
Maintaining Existing AS Numbers During an AS Migration........................................................................................ 194
Allowing an AS Number to Appear in its Own AS Path..............................................................................................195
Enabling Graceful Restart......................................................................................................................................... 196
Enabling Neighbor Graceful Restart.......................................................................................................................... 197
Filtering on an AS-Path Attribute.............................................................................................................................. 197
Regular Expressions as Filters...................................................................................................................................198
Redistributing Routes...............................................................................................................................................200
Enabling Additional Paths.........................................................................................................................................200
Conguring IP Community Lists................................................................................................................................201
Conguring an IP Extended Community List............................................................................................................ 202
Filtering Routes with Community Lists..................................................................................................................... 203
Manipulating the COMMUNITY Attribute................................................................................................................ 203
Changing MED Attributes........................................................................................................................................ 205
Changing the LOCAL_PREFERENCE Attribute....................................................................................................... 205
Changing the NEXT_HOP Attribute.........................................................................................................................206
Changing the WEIGHT Attribute..............................................................................................................................206
Enabling Multipath................................................................................................................................................... 206
Filtering BGP Routes................................................................................................................................................207
Filtering BGP Routes Using Route Maps..................................................................................................................208
Filtering BGP Routes Using AS-PATH Information................................................................................................... 209
Conguring BGP Route Reectors...........................................................................................................................209
Aggregating Routes.................................................................................................................................................. 210
Conguring BGP Confederations..............................................................................................................................210
Enabling Route Flap Dampening................................................................................................................................ 211
Changing BGP Timers...............................................................................................................................................213
Enabling BGP Neighbor Soft-Reconguration...........................................................................................................213
Route Map Continue.................................................................................................................................................214
Enabling MBGP Congurations.......................................................................................................................................215
BGP Regular Expression Optimization............................................................................................................................ 216
Debugging BGP.............................................................................................................................................................. 216
Storing Last and Bad PDUs.......................................................................................................................................217
Capturing PDUs........................................................................................................................................................218
PDU Counters...........................................................................................................................................................219
Sample Congurations....................................................................................................................................................219
11 Content Addressable Memory (CAM).........................................................................225
8
CAM Allocation.............................................................................................................................................................. 225
Test CAM Usage............................................................................................................................................................ 227
View CAM-ACL Settings................................................................................................................................................ 227
View CAM Usage...........................................................................................................................................................229
CAM Optimization..........................................................................................................................................................229
Troubleshoot CAM Proling............................................................................................................................................229
CAM Prole Mismatches..........................................................................................................................................229
QoS CAM Region Limitation.....................................................................................................................................230
12 Control Plane Policing (CoPP)....................................................................................231
Congure Control Plane Policing.................................................................................................................................... 232
Conguring CoPP for Protocols............................................................................................................................... 233
Conguring CoPP for CPU Queues..........................................................................................................................235
CoPP for OSPFv3 Packets...................................................................................................................................... 236
Conguring CoPP for OSPFv3.................................................................................................................................238
Displaying CoPP Conguration ................................................................................................................................239
13 Data Center Bridging (DCB)....................................................................................... 241
Ethernet Enhancements in Data Center Bridging............................................................................................................241
Priority-Based Flow Control..................................................................................................................................... 242
Enhanced Transmission Selection.............................................................................................................................243
Data Center Bridging Exchange Protocol (DCBx).....................................................................................................244
Data Center Bridging in a Trac Flow...................................................................................................................... 244
Enabling Data Center Bridging........................................................................................................................................245
DCB Maps and its Attributes....................................................................................................................................245
QoS dot1p Trac Classication and Queue Assignment.................................................................................................246
Data Center Bridging: Default Conguration...................................................................................................................247
Conguring Priority-Based Flow Control........................................................................................................................ 247
Conguring Lossless Queues....................................................................................................................................248
Conguring PFC in a DCB Map......................................................................................................................................249
PFC Conguration Notes......................................................................................................................................... 249
PFC Prerequisites and Restrictions.......................................................................................................................... 250
Applying a DCB Map on a Port........................................................................................................................................251
Priority-Based Flow Control Using Dynamic Buer Method............................................................................................251
Pause and Resume of Trac.....................................................................................................................................251
Buer Sizes for Lossless or PFC Packets.................................................................................................................252
Conguring PFC without a DCB Map............................................................................................................................ 252
Conguring Lossless QueuesExample:..................................................................................................................... 253
Behavior of Tagged Packets...........................................................................................................................................254
Conguration Example for DSCP and PFC Priorities......................................................................................................255
Using PFC to Manage Converged Ethernet Trac........................................................................................................ 255
Congure Enhanced Transmission Selection.................................................................................................................. 255
ETS Prerequisites and Restrictions...........................................................................................................................256
Creating an ETS Priority Group................................................................................................................................ 256
ETS Operation with DCBx........................................................................................................................................257
Conguring Bandwidth Allocation for DCBx CIN...................................................................................................... 257
9
Conguring ETS in a DCB Map................................................................................................................................ 258
Hierarchical Scheduling in ETS Output Policies........................................................................................................ 259
Using ETS to Manage Converged Ethernet Trac...................................................................................................260
Applying DCB Policies in a Switch Stack........................................................................................................................ 260
Congure a DCBx Operation..........................................................................................................................................260
DCBx Operation.......................................................................................................................................................260
DCBx Port Roles.......................................................................................................................................................261
DCB Conguration Exchange...................................................................................................................................262
Conguration Source Election..................................................................................................................................262
Propagation of DCB Information.............................................................................................................................. 263
Auto-Detection and Manual Conguration of the DCBx Version.............................................................................. 263
DCBx Example......................................................................................................................................................... 264
DCBx Prerequisites and Restrictions........................................................................................................................ 264
Conguring DCBx.................................................................................................................................................... 264
Verifying the DCB Conguration.................................................................................................................................... 268
QoS dot1p Trac Classication and Queue Assignment................................................................................................. 277
Conguring the Dynamic Buer Method........................................................................................................................278
Sample DCB Conguration.............................................................................................................................................279
PFC and ETS Conguration Command Examples..................................................................................................... 281
14 Dynamic Host Conguration Protocol (DHCP).......................................................... 282
DHCP Packet Format and Options.................................................................................................................................282
Assign an IP Address using DHCP.................................................................................................................................. 284
Implementation Information............................................................................................................................................284
Congure the System to be a DHCP Server.................................................................................................................. 285
Conguring the Server for Automatic Address Allocation.........................................................................................285
Specifying a Default Gateway...................................................................................................................................287
Congure a Method of Hostname Resolution...........................................................................................................287
Using DNS for Address Resolution........................................................................................................................... 287
Using NetBIOS WINS for Address Resolution...........................................................................................................287
Creating Manual Binding Entries...............................................................................................................................287
Debugging the DHCP Server................................................................................................................................... 288
Using DHCP Clear Commands................................................................................................................................. 288
Congure the System to be a Relay Agent.....................................................................................................................288
Congure the System to be a DHCP Client....................................................................................................................290
Conguring the DHCP Client System.......................................................................................................................290
DHCP Client on a Management Interface................................................................................................................. 291
DHCP Client Operation with Other Features............................................................................................................292
Congure the System for User Port Stacking (Option 230)...........................................................................................293
Congure Secure DHCP.................................................................................................................................................293
Option 82.................................................................................................................................................................293
DHCP Snooping.......................................................................................................................................................294
Conguring the DHCP secondary-subnet................................................................................................................ 297
Drop DHCP Packets on Snooped VLANs Only......................................................................................................... 297
Dynamic ARP Inspection..........................................................................................................................................298
Conguring Dynamic ARP Inspection.......................................................................................................................298
10
Source Address Validation..............................................................................................................................................299
Enabling IP Source Address Validation......................................................................................................................299
DHCP MAC Source Address Validation....................................................................................................................300
Enabling IP+MAC Source Address Validation........................................................................................................... 300
Viewing the Number of SAV Dropped Packets......................................................................................................... 301
Clearing the Number of SAV Dropped Packets.........................................................................................................301
15 Equal Cost Multi-Path (ECMP)................................................................................. 302
Conguring the Hash Algorithm.....................................................................................................................................302
Enabling Deterministic ECMP Next Hop........................................................................................................................ 302
Conguring the Hash Algorithm Seed............................................................................................................................ 302
Link Bundle Monitoring...................................................................................................................................................303
Managing ECMP Group Paths................................................................................................................................. 303
Creating an ECMP Group Bundle.............................................................................................................................304
Modifying the ECMP Group Threshold.................................................................................................................... 304
16 FCoE Transit..............................................................................................................306
Fibre Channel over Ethernet.......................................................................................................................................... 306
Ensure Robustness in a Converged Ethernet Network.................................................................................................. 306
FIP Snooping on Ethernet Bridges................................................................................................................................. 307
FIP Snooping in a Switch Stack..................................................................................................................................... 309
Using FIP Snooping........................................................................................................................................................309
FIP Snooping Prerequisites...................................................................................................................................... 309
Important Points to Remember.................................................................................................................................310
Enabling the FCoE Transit Feature............................................................................................................................310
Enable FIP Snooping on VLANs................................................................................................................................. 311
Congure the FC-MAP Value.................................................................................................................................... 311
Congure a Port for a Bridge-to-Bridge Link............................................................................................................. 311
Congure a Port for a Bridge-to-FCF Link.................................................................................................................311
Impact on Other Software Features.......................................................................................................................... 311
FIP Snooping Restrictions.........................................................................................................................................312
Conguring FIP Snooping......................................................................................................................................... 312
Displaying FIP Snooping Information............................................................................................................................... 313
FCoE Transit Conguration Example...............................................................................................................................318
17 FIPS Cryptography.................................................................................................... 320
Conguration Tasks........................................................................................................................................................320
Preparing the System.....................................................................................................................................................320
Enabling FIPS Mode.......................................................................................................................................................320
Generating Host-Keys.....................................................................................................................................................321
Monitoring FIPS Mode Status.........................................................................................................................................321
Disabling FIPS Mode...................................................................................................................................................... 322
18 Force10 Resilient Ring Protocol (FRRP).....................................................................323
Protocol Overview..........................................................................................................................................................323
Ring Status.............................................................................................................................................................. 323
11
Multiple FRRP Rings................................................................................................................................................ 324
Important FRRP Points............................................................................................................................................ 325
Important FRRP Concepts.......................................................................................................................................326
Implementing FRRP........................................................................................................................................................327
FRRP Conguration........................................................................................................................................................327
Creating the FRRP Group.........................................................................................................................................327
Conguring the Control VLAN..................................................................................................................................327
Conguring and Adding the Member VLANs............................................................................................................328
Setting the FRRP Timers......................................................................................................................................... 329
Clearing the FRRP Counters....................................................................................................................................330
Viewing the FRRP Conguration..............................................................................................................................330
Viewing the FRRP Information................................................................................................................................. 330
Troubleshooting FRRP................................................................................................................................................... 330
Conguration Checks...............................................................................................................................................330
Sample Conguration and Topology................................................................................................................................ 331
19 GARP VLAN Registration Protocol (GVRP)............................................................... 333
Important Points to Remember...................................................................................................................................... 333
Congure GVRP.............................................................................................................................................................334
Related Conguration Tasks..................................................................................................................................... 334
Enabling GVRP Globally..................................................................................................................................................334
Enabling GVRP on a Layer 2 Interface............................................................................................................................335
Congure GVRP Registration.........................................................................................................................................335
Congure a GARP Timer................................................................................................................................................336
RPM Redundancy.......................................................................................................................................................... 336
20 High Availability (HA)................................................................................................ 337
Component Redundancy................................................................................................................................................337
Automatic and Manual Stack Unit Failover............................................................................................................... 337
Synchronization between Management and Standby Units..................................................................................... 338
Forcing an Stack Unit Failover..................................................................................................................................338
Specifying an Auto-Failover Limit.............................................................................................................................338
Disabling Auto-Reboot............................................................................................................................................. 339
Manually Synchronizing Management and Standby Units........................................................................................ 339
Pre-Conguring a Stack Unit Slot.................................................................................................................................. 339
Removing a Provisioned Logical Stack Unit....................................................................................................................340
Hitless Behavior............................................................................................................................................................. 340
Graceful Restart.............................................................................................................................................................340
Software Resiliency.........................................................................................................................................................341
Software Component Health Monitoring.................................................................................................................. 341
System Health Monitoring........................................................................................................................................ 341
Failure and Event Logging......................................................................................................................................... 341
Hot-Lock Behavior......................................................................................................................................................... 342
21 Internet Group Management Protocol (IGMP)...........................................................343
IGMP Implementation Information..................................................................................................................................343
12
IGMP Protocol Overview............................................................................................................................................... 343
IGMP Version 2........................................................................................................................................................ 343
IGMP Version 3........................................................................................................................................................ 344
Congure IGMP............................................................................................................................................................. 347
Related Conguration Tasks..................................................................................................................................... 347
Viewing IGMP Enabled Interfaces.................................................................................................................................. 348
Selecting an IGMP Version.............................................................................................................................................348
Viewing IGMP Groups.................................................................................................................................................... 348
Adjusting Timers.............................................................................................................................................................349
Adjusting Query and Response Timers.....................................................................................................................349
Preventing a Host from Joining a Group........................................................................................................................ 350
Enabling IGMP Immediate-Leave................................................................................................................................... 352
IGMP Snooping..............................................................................................................................................................353
IGMP Snooping Implementation Information............................................................................................................353
Conguring IGMP Snooping.....................................................................................................................................353
Removing a Group-Port Association........................................................................................................................ 354
Disabling Multicast Flooding.....................................................................................................................................354
Specifying a Port as Connected to a Multicast Router.............................................................................................354
Conguring the Switch as Querier........................................................................................................................... 354
Fast Convergence after MSTP Topology Changes.........................................................................................................355
Egress Interface Selection (EIS) for HTTP and IGMP Applications................................................................................ 355
Protocol Separation..................................................................................................................................................356
Enabling and Disabling Management Egress Interface Selection.............................................................................. 357
Handling of Management Route Conguration.........................................................................................................357
Handling of Switch-Initiated Trac.......................................................................................................................... 358
Handling of Switch-Destined Trac.........................................................................................................................358
Handling of Transit Trac (Trac Separation)......................................................................................................... 359
Mapping of Management Applications and Trac Type........................................................................................... 359
Behavior of Various Applications for Switch-Initiated Trac ....................................................................................360
Behavior of Various Applications for Switch-Destined Trac ...................................................................................361
Interworking of EIS With Various Applications..........................................................................................................362
Designating a Multicast Router Interface....................................................................................................................... 362
22 Interfaces..................................................................................................................363
Basic Interface Conguration......................................................................................................................................... 363
Advanced Interface Conguration..................................................................................................................................363
Interface Types...............................................................................................................................................................363
View Basic Interface Information....................................................................................................................................364
Resetting an Interface to its Factory Default State........................................................................................................ 365
Enabling a Physical Interface..........................................................................................................................................366
Physical Interfaces......................................................................................................................................................... 366
Conguration Task List for Physical Interfaces......................................................................................................... 367
Overview of Layer Modes........................................................................................................................................ 367
Conguring Layer 2 (Data Link) Mode......................................................................................................................367
Conguring Layer 2 (Interface) Mode...................................................................................................................... 368
Conguring Layer 3 (Network) Mode...................................................................................................................... 368
13
Conguring Layer 3 (Interface) Mode...................................................................................................................... 368
Egress Interface Selection (EIS).....................................................................................................................................369
Important Points to Remember................................................................................................................................369
Conguring EIS........................................................................................................................................................ 369
Management Interfaces................................................................................................................................................. 370
Conguring Management Interfaces........................................................................................................................ 370
Conguring a Management Interface on an Ethernet Port........................................................................................371
VLAN Interfaces.............................................................................................................................................................372
Loopback Interfaces....................................................................................................................................................... 373
Null Interfaces................................................................................................................................................................ 373
Port Channel Interfaces..................................................................................................................................................373
Port Channel Denition and Standards..................................................................................................................... 374
Port Channel Benets...............................................................................................................................................374
Port Channel Implementation................................................................................................................................... 374
Interfaces in Port Channels.......................................................................................................................................374
Conguration Tasks for Port Channel Interfaces...................................................................................................... 375
Creating a Port Channel........................................................................................................................................... 375
Adding a Physical Interface to a Port Channel..........................................................................................................375
Reassigning an Interface to a New Port Channel...................................................................................................... 377
Conguring the Minimum Oper Up Links in a Port Channel...................................................................................... 378
Adding or Removing a Port Channel from a VLAN................................................................................................... 378
Assigning an IP Address to a Port Channel...............................................................................................................379
Deleting or Disabling a Port Channel.........................................................................................................................379
Load Balancing Through Port Channels....................................................................................................................380
Changing the Hash Algorithm.................................................................................................................................. 380
Bulk Conguration...........................................................................................................................................................381
Interface Range........................................................................................................................................................ 381
Bulk Conguration Examples.....................................................................................................................................381
Dening Interface Range Macros................................................................................................................................... 382
Dene the Interface Range...................................................................................................................................... 383
Choosing an Interface-Range Macro........................................................................................................................383
Monitoring and Maintaining Interfaces........................................................................................................................... 383
Maintenance Using TDR...........................................................................................................................................384
Splitting QSFP Ports to SFP+ Ports...............................................................................................................................385
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port......................................................................................... 385
Important Points to Remember................................................................................................................................386
Example Scenarios...................................................................................................................................................386
Link Dampening............................................................................................................................................................. 390
Important Points to Remember................................................................................................................................390
Enabling Link Dampening......................................................................................................................................... 390
Link Bundle Monitoring................................................................................................................................................... 391
Using Ethernet Pause Frames for Flow Control..............................................................................................................392
Enabling Pause Frames............................................................................................................................................ 393
Congure the MTU Size on an Interface........................................................................................................................ 393
Port-Pipes......................................................................................................................................................................394
14
Auto-Negotiation on Ethernet Interfaces....................................................................................................................... 394
Setting the Speed and Duplex Mode of Ethernet Interfaces.................................................................................... 394
Set Auto-Negotiation Options..................................................................................................................................396
View Advanced Interface Information.............................................................................................................................397
Conguring the Interface Sampling Size...................................................................................................................397
Dynamic Counters..........................................................................................................................................................398
Clearing Interface Counters..................................................................................................................................... 399
23 Internet Protocol Security (IPSec)............................................................................400
Conguring IPSec ......................................................................................................................................................... 400
24 IPv4 Routing............................................................................................................. 402
IP Addresses.................................................................................................................................................................. 402
Implementation Information......................................................................................................................................402
Conguration Tasks for IP Addresses............................................................................................................................. 402
Assigning IP Addresses to an Interface...........................................................................................................................403
Conguring Static Routes.............................................................................................................................................. 403
Congure Static Routes for the Management Interface.................................................................................................404
IPv4 Path MTU Discovery Overview..............................................................................................................................405
Using the Congured Source IP Address in ICMP Messages......................................................................................... 405
Conguring the ICMP Source Interface................................................................................................................... 405
Conguring the Duration to Establish a TCP Connection............................................................................................... 406
Enabling Directed Broadcast.......................................................................................................................................... 406
Resolution of Host Names............................................................................................................................................. 406
Enabling Dynamic Resolution of Host Names................................................................................................................. 407
Specifying the Local System Domain and a List of Domains...........................................................................................407
Conguring DNS with Traceroute.................................................................................................................................. 408
ARP............................................................................................................................................................................... 408
Conguration Tasks for ARP.......................................................................................................................................... 409
Conguring Static ARP Entries...................................................................................................................................... 409
Enabling Proxy ARP....................................................................................................................................................... 409
Clearing ARP Cache....................................................................................................................................................... 410
ARP Learning via Gratuitous ARP................................................................................................................................... 410
Enabling ARP Learning via Gratuitous ARP.....................................................................................................................410
ARP Learning via ARP Request.......................................................................................................................................410
Conguring ARP Retries..................................................................................................................................................411
ICMP.............................................................................................................................................................................. 412
Conguration Tasks for ICMP......................................................................................................................................... 412
Enabling ICMP Unreachable Messages...........................................................................................................................412
UDP Helper.....................................................................................................................................................................412
Congure UDP Helper.............................................................................................................................................. 412
Important Points to Remember.................................................................................................................................412
Enabling UDP Helper.......................................................................................................................................................413
Congurations Using UDP Helper................................................................................................................................... 413
UDP Helper with Broadcast-All Addresses......................................................................................................................413
UDP Helper with Subnet Broadcast Addresses...............................................................................................................414
15
UDP Helper with Congured Broadcast Addresses.........................................................................................................414
UDP Helper with No Congured Broadcast Addresses................................................................................................... 415
Troubleshooting UDP Helper...........................................................................................................................................415
25 IPv6 Routing..............................................................................................................416
Protocol Overview.......................................................................................................................................................... 416
Extended Address Space.......................................................................................................................................... 416
Stateless Autoconguration......................................................................................................................................416
IPv6 Headers............................................................................................................................................................ 417
IPv6 Header Fields.................................................................................................................................................... 417
Extension Header Fields............................................................................................................................................419
Addressing............................................................................................................................................................... 420
Implementing IPv6 with Dell Networking OS...................................................................................................................421
ICMPv6..........................................................................................................................................................................422
Path MTU Discovery......................................................................................................................................................423
IPv6 Neighbor Discovery................................................................................................................................................423
IPv6 Neighbor Discovery of MTU Packets............................................................................................................... 424
Conguration Task List for IPv6 RDNSS.........................................................................................................................424
Conguring the IPv6 Recursive DNS Server............................................................................................................ 424
Debugging IPv6 RDNSS Information Sent to the Host ............................................................................................425
Displaying IPv6 RDNSS Information......................................................................................................................... 425
Secure Shell (SSH) Over an IPv6 Transport...................................................................................................................426
Conguration Tasks for IPv6.......................................................................................................................................... 426
Adjusting Your CAM-Prole......................................................................................................................................426
Assigning an IPv6 Address to an Interface................................................................................................................427
Assigning a Static IPv6 Route.................................................................................................................................. 428
Conguring Telnet with IPv6.................................................................................................................................... 428
SNMP over IPv6...................................................................................................................................................... 428
Displaying IPv6 Information...................................................................................................................................... 429
Displaying an IPv6 Interface Information.................................................................................................................. 429
Showing IPv6 Routes...............................................................................................................................................430
Showing the Running-Conguration for an Interface................................................................................................ 431
Clearing IPv6 Routes.................................................................................................................................................431
Conguring IPv6 RA Guard............................................................................................................................................ 432
Conguring IPv6 RA Guard on an Interface..............................................................................................................433
Monitoring IPv6 RA Guard....................................................................................................................................... 434
26 iSCSI Optimization.................................................................................................... 435
iSCSI Optimization Overview......................................................................................................................................... 435
Monitoring iSCSI Trac Flows................................................................................................................................. 436
Application of Quality of Service to iSCSI Trac Flows............................................................................................436
Information Monitored in iSCSI Trac Flows............................................................................................................ 437
Detection and Auto-Conguration for Dell EqualLogic Arrays................................................................................... 437
Conguring Detection and Ports for Dell Compellent Arrays.................................................................................... 438
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer..........................................................................438
Enable and Disable iSCSI Optimization.....................................................................................................................439
16
Default iSCSI Optimization Values..................................................................................................................................439
iSCSI Optimization Prerequisites.................................................................................................................................... 440
Conguring iSCSI Optimization...................................................................................................................................... 440
Displaying iSCSI Optimization Information...................................................................................................................... 442
27 Intermediate System to Intermediate System............................................................ 444
IS-IS Protocol Overview.................................................................................................................................................444
IS-IS Addressing.............................................................................................................................................................444
Multi-Topology IS-IS....................................................................................................................................................... 445
Transition Mode....................................................................................................................................................... 445
Interface Support.....................................................................................................................................................445
Adjacencies..............................................................................................................................................................445
Graceful Restart.............................................................................................................................................................446
Timers......................................................................................................................................................................446
Implementation Information............................................................................................................................................446
Conguration Information...............................................................................................................................................447
Conguration Tasks for IS-IS.................................................................................................................................... 447
Conguring the Distance of a Route........................................................................................................................ 455
Changing the IS-Type...............................................................................................................................................455
Redistributing IPv4 Routes.......................................................................................................................................458
Redistributing IPv6 Routes.......................................................................................................................................458
Conguring Authentication Passwords.....................................................................................................................459
Setting the Overload Bit.......................................................................................................................................... 460
Debugging IS-IS....................................................................................................................................................... 460
IS-IS Metric Styles..........................................................................................................................................................461
Congure Metric Values..................................................................................................................................................461
Maximum Values in the Routing Table...................................................................................................................... 462
Change the IS-IS Metric Style in One Level Only..................................................................................................... 462
Leaks from One Level to Another.............................................................................................................................463
Sample Congurations................................................................................................................................................... 464
28 Link Aggregation Control Protocol (LACP)................................................................ 467
Introduction to Dynamic LAGs and LACP.......................................................................................................................467
Important Points to Remember................................................................................................................................ 467
LACP Modes............................................................................................................................................................468
Conguring LACP Commands................................................................................................................................. 468
LACP Conguration Tasks..............................................................................................................................................469
Creating a LAG.........................................................................................................................................................469
Conguring the LAG Interfaces as Dynamic.............................................................................................................469
Setting the LACP Long Timeout...............................................................................................................................470
Monitoring and Debugging LACP............................................................................................................................. 470
Shared LAG State Tracking............................................................................................................................................. 471
Conguring Shared LAG State Tracking....................................................................................................................471
Important Points about Shared LAG State Tracking................................................................................................. 472
LACP Basic Conguration Example................................................................................................................................473
Congure a LAG on ALPHA......................................................................................................................................473
17
29 Layer 2.......................................................................................................................481
Manage the MAC Address Table..................................................................................................................................... 481
Clearing the MAC Address Table...............................................................................................................................481
Setting the Aging Time for Dynamic Entries..............................................................................................................481
Conguring a Static MAC Address............................................................................................................................481
Displaying the MAC Address Table........................................................................................................................... 482
MAC Learning Limit........................................................................................................................................................482
Setting the MAC Learning Limit............................................................................................................................... 483
mac learning-limit Dynamic...................................................................................................................................... 483
mac learning-limit mac-address-sticky..................................................................................................................... 483
mac learning-limit station-move............................................................................................................................... 483
mac learning-limit no-station-move..........................................................................................................................484
Learning Limit Violation Actions................................................................................................................................484
Setting Station Move Violation Actions.................................................................................................................... 484
Recovering from Learning Limit and Station Move Violations...................................................................................485
NIC Teaming.................................................................................................................................................................. 485
Congure Redundant Pairs............................................................................................................................................ 486
Important Points about Conguring Redundant Pairs...............................................................................................488
Far-End Failure Detection...............................................................................................................................................489
FEFD State Changes................................................................................................................................................490
Conguring FEFD.....................................................................................................................................................490
Enabling FEFD on an Interface..................................................................................................................................491
Debugging FEFD......................................................................................................................................................492
30 Link Layer Discovery Protocol (LLDP).......................................................................494
802.1AB (LLDP) Overview............................................................................................................................................. 494
Protocol Data Units..................................................................................................................................................494
Optional TLVs.................................................................................................................................................................495
Management TLVs...................................................................................................................................................495
TIA-1057 (LLDP-MED) Overview....................................................................................................................................497
TIA Organizationally Specic TLVs............................................................................................................................497
Congure LLDP.............................................................................................................................................................. 501
Related Conguration Tasks......................................................................................................................................501
Important Points to Remember.................................................................................................................................501
LLDP Compatibility................................................................................................................................................... 501
CONFIGURATION versus INTERFACE Congurations................................................................................................... 501
Enabling LLDP................................................................................................................................................................502
Disabling and Undoing LLDP.................................................................................................................................... 502
Enabling LLDP on Management Ports........................................................................................................................... 502
Disabling and Undoing LLDP on Management Ports................................................................................................ 503
Advertising TLVs............................................................................................................................................................ 503
Viewing the LLDP Conguration.................................................................................................................................... 504
Viewing Information Advertised by Adjacent LLDP Agents............................................................................................ 505
Conguring LLDPDU Intervals....................................................................................................................................... 506
Conguring Transmit and Receive Mode........................................................................................................................506
18
Conguring the Time to Live Value.................................................................................................................................507
Debugging LLDP............................................................................................................................................................508
Relevant Management Objects......................................................................................................................................508
31 Microsoft Network Load Balancing.............................................................................514
NLB Unicast Mode Scenario...........................................................................................................................................514
NLB Multicast Mode Scenario........................................................................................................................................ 514
Limitations of the NLB Feature....................................................................................................................................... 515
Microsoft Clustering....................................................................................................................................................... 515
Enable and Disable VLAN Flooding ................................................................................................................................ 515
Conguring a Switch for NLB ........................................................................................................................................ 516
Enabling a Switch for Multicast NLB.........................................................................................................................516
32 Multicast Source Discovery Protocol (MSDP)........................................................... 517
Protocol Overview.......................................................................................................................................................... 517
Anycast RP.....................................................................................................................................................................518
Implementation Information............................................................................................................................................ 518
Congure Multicast Source Discovery Protocol..............................................................................................................518
Related Conguration Tasks......................................................................................................................................519
Enable MSDP.................................................................................................................................................................523
Manage the Source-Active Cache................................................................................................................................. 524
Viewing the Source-Active Cache............................................................................................................................524
Limiting the Source-Active Cache............................................................................................................................524
Clearing the Source-Active Cache........................................................................................................................... 525
Enabling the Rejected Source-Active Cache............................................................................................................525
Accept Source-Active Messages that Fail the RFP Check.............................................................................................525
Specifying Source-Active Messages.............................................................................................................................. 529
Limiting the Source-Active Messages from a Peer.........................................................................................................530
Preventing MSDP from Caching a Local Source............................................................................................................ 530
Preventing MSDP from Caching a Remote Source.........................................................................................................531
Preventing MSDP from Advertising a Local Source........................................................................................................ 531
Logging Changes in Peership States.............................................................................................................................. 532
Terminating a Peership...................................................................................................................................................532
Clearing Peer Statistics..................................................................................................................................................533
Debugging MSDP.......................................................................................................................................................... 533
MSDP with Anycast RP................................................................................................................................................. 534
Conguring Anycast RP.................................................................................................................................................535
Reducing Source-Active Message Flooding............................................................................................................. 536
Specifying the RP Address Used in SA Messages....................................................................................................536
MSDP Sample Congurations........................................................................................................................................539
33 Multiple Spanning Tree Protocol (MSTP).................................................................. 542
Protocol Overview......................................................................................................................................................... 542
Spanning Tree Variations................................................................................................................................................543
Implementation Information......................................................................................................................................543
Congure Multiple Spanning Tree Protocol.................................................................................................................... 543
19
Related Conguration Tasks.....................................................................................................................................543
Enable Multiple Spanning Tree Globally.......................................................................................................................... 544
Adding and Removing Interfaces....................................................................................................................................544
Creating Multiple Spanning Tree Instances.....................................................................................................................544
Inuencing MSTP Root Selection...................................................................................................................................545
Interoperate with Non-Dell Bridges................................................................................................................................ 546
Changing the Region Name or Revision......................................................................................................................... 546
Modifying Global Parameters..........................................................................................................................................547
Modifying the Interface Parameters...............................................................................................................................548
Conguring an EdgePort................................................................................................................................................549
Flush MAC Addresses after a Topology Change.............................................................................................................549
MSTP Sample Congurations........................................................................................................................................ 550
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-CongurationSFTOS
Example Running-Conguration...............................................................................................................................550
Debugging and Verifying MSTP Congurations............................................................................................................. 553
34 Multicast Features.................................................................................................... 555
Enabling IP Multicast..................................................................................................................................................... 555
Implementation Information........................................................................................................................................... 555
Multicast Policies...........................................................................................................................................................556
IPv4 Multicast Policies.............................................................................................................................................556
35 Object Tracking.........................................................................................................563
Object Tracking Overview..............................................................................................................................................563
Track Layer 2 Interfaces...........................................................................................................................................564
Track Layer 3 Interfaces...........................................................................................................................................564
Track IPv4 and IPv6 Routes..................................................................................................................................... 564
Set Tracking Delays..................................................................................................................................................565
VRRP Object Tracking............................................................................................................................................. 566
Object Tracking Conguration........................................................................................................................................566
Tracking a Layer 2 Interface..................................................................................................................................... 566
Tracking a Layer 3 Interface..................................................................................................................................... 567
Track an IPv4/IPv6 Route........................................................................................................................................568
Displaying Tracked Objects.............................................................................................................................................572
36 Open Shortest Path First (OSPFv2 and OSPFv3)..................................................... 574
Protocol Overview..........................................................................................................................................................574
Autonomous System (AS) Areas...............................................................................................................................574
Area Types............................................................................................................................................................... 575
Networks and Neighbors..........................................................................................................................................576
Router Types............................................................................................................................................................ 576
Designated and Backup Designated Routers............................................................................................................ 578
Link-State Advertisements (LSAs)........................................................................................................................... 578
Router Priority and Cost...........................................................................................................................................579
OSPF with Dell Networking OS..................................................................................................................................... 580
Graceful Restart....................................................................................................................................................... 581
20
/