Dell C1048P Port Extender, C9000 Series Line Cards, C9010 Modular Chassis Switch User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell C1048P Port Extender User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Networking Configuration Guide for the
C9000 Series
Version 9.9(0.0)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2015 - 10
Rev. A00
Contents
1 About this Guide................................................................................................. 36
Audience..............................................................................................................................................36
Conventions........................................................................................................................................ 36
Related Documents............................................................................................................................ 36
2 Configuration Fundamentals............................................................................37
Accessing the Command Line............................................................................................................37
CLI Modes............................................................................................................................................37
Navigating CLI Modes................................................................................................................... 39
The do Command...............................................................................................................................42
Undoing Commands...........................................................................................................................43
Obtaining Help....................................................................................................................................44
Entering and Editing Commands....................................................................................................... 44
Command History...............................................................................................................................45
Filtering show Command Outputs.....................................................................................................46
Multiple Users in Configuration Mode............................................................................................... 47
3 Getting Started....................................................................................................49
Console Access...................................................................................................................................49
Serial Console................................................................................................................................49
Mounting an NFS File System.............................................................................................................50
Important Points to Remember.................................................................................................... 51
Default Configuration......................................................................................................................... 52
Configuring a Host Name...................................................................................................................52
Accessing the System Remotely.........................................................................................................52
Accessing the System Remotely...................................................................................................53
Configure the Management Port IP Address............................................................................... 53
Configure a Management Route.................................................................................................. 53
Configuring a Username and Password.......................................................................................54
Configuring the Enable Password......................................................................................................54
Manage Configuration Files................................................................................................................54
File Storage.................................................................................................................................... 55
Copy Files to and from the System.............................................................................................. 55
Save the Running-Configuration..................................................................................................56
Configure the Overload Bit for a Startup Scenario...................................................................... 57
Viewing Files.................................................................................................................................. 57
Changes in Configuration Files.....................................................................................................58
Viewing Command History.................................................................................................................58
3
Upgrading the Dell Networking OS....................................................................................................59
4 Switch Management..........................................................................................60
Configuring Privilege Levels............................................................................................................... 60
Creating a Custom Privilege Level............................................................................................... 60
Removing a Command from EXEC Mode................................................................................... 60
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................60
Allowing Access to CONFIGURATION Mode Commands...........................................................61
Allowing Access to the Following Modes.....................................................................................61
Applying a Privilege Level to a Username.................................................................................... 63
Applying a Privilege Level to a Terminal Line...............................................................................63
Configuring Logging...........................................................................................................................63
Audit and Security Logs................................................................................................................ 64
Configuring Logging Format ...................................................................................................... 65
Setting Up a Secure Connection to a Syslog Server....................................................................66
Track Login Activity............................................................................................................................. 67
Restrictions for Tracking Login Activity........................................................................................67
Configuring Login Activity Tracking............................................................................................. 67
Display Login Statistics..................................................................................................................68
Limit Concurrent Login Sessions....................................................................................................... 69
Restrictions for Limiting the Number of Concurrent Sessions................................................... 69
Configuring Concurrent Session Limit.........................................................................................69
Enabling the System to Clear Existing Sessions...........................................................................69
Log Messages in the Internal Buffer...................................................................................................70
Configuration Task List for System Log Management.................................................................70
Disabling System Logging................................................................................................................... 71
Sending System Messages to a Syslog Server.................................................................................... 71
Configuring a UNIX System as a Syslog Server.............................................................................71
Display the Logging Buffer and the Logging Configuration..............................................................72
Changing System Logging Settings....................................................................................................72
Configuring a UNIX Logging Facility Level.........................................................................................73
Synchronizing Log Messages..............................................................................................................74
Enabling Timestamp on Syslog Messages..........................................................................................75
File Transfer Services...........................................................................................................................75
Configuration Task List for File Transfer Services........................................................................ 76
Enabling the FTP Server................................................................................................................ 76
Configuring FTP Server Parameters..............................................................................................76
Configuring FTP Client Parameters.............................................................................................. 77
Terminal Lines......................................................................................................................................77
Denying and Permitting Access to a Terminal Line..................................................................... 77
Configuring Login Authentication for Terminal Lines................................................................. 78
Setting Time Out of EXEC Privilege Mode......................................................................................... 79
4
Using Telnet to Access Another Network Device..............................................................................79
Lock CONFIGURATION Mode........................................................................................................... 80
Viewing the Configuration Lock Status........................................................................................ 81
Recovering from a Forgotten Password ............................................................................................81
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration............ 82
Recovering from a Failed Start........................................................................................................... 82
Restoring Factory-Default Settings.................................................................................................... 83
Important Point to Remember..................................................................................................... 83
Restoring Factory-Default Boot Environment Variables............................................................. 83
Using Hashes to Verify Software Images Before Installation............................................................ 85
Verifying System Images on C9010 Components............................................................................ 86
When System Images on C9010 Components Do Not Match................................................... 87
Manually Resetting the System Image on a C9010 Component................................................88
Logging in to the Virtual Console of a C9010 Component........................................................88
Booting the C9010 from an Image on a Network Server........................................................... 88
Configuring C9010 Components to Boot from the RPM CP Image..........................................89
5 802.1X...................................................................................................................90
The Port-Authentication Process....................................................................................................... 91
EAP over RADIUS...........................................................................................................................93
Configuring 802.1X............................................................................................................................. 93
Related Configuration Tasks.........................................................................................................93
Important Points to Remember......................................................................................................... 94
Enabling 802.1X...................................................................................................................................95
Configuring dot1x Profile ...................................................................................................................97
Configuring MAC addresses for a do1x Profile..................................................................................98
Configuring the Static MAB and MAB Profile ....................................................................................98
Configuring Critical VLAN ..................................................................................................................99
Configuring Request Identity Re-Transmissions.............................................................................100
Configuring a Quiet Period after a Failed Authentication................................................................101
Forcibly Authorizing or Unauthorizing a Port..................................................................................102
Re-Authenticating a Port.................................................................................................................. 103
Configuring Dynamic VLAN Assignment with Port Authentication................................................104
Guest and Authentication-Fail VLANs..............................................................................................105
Configuring a Guest VLAN..........................................................................................................106
Configuring an Authentication-Fail VLAN..................................................................................107
Configuring Timeouts.................................................................................................................108
Multi-Host Authentication................................................................................................................109
Configuring Multi-Host AuthenticationConfiguring Single-Host Authentication.....................111
Multi-Supplicant Authentication....................................................................................................... 112
Configuring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication..... 113
MAC Authentication Bypass..............................................................................................................114
5
MAB in Single-host and Multi-Host Mode..................................................................................114
MAB in Multi-Supplicant Authentication Mode..........................................................................114
Configuring MAC Authentication Bypass....................................................................................115
Dynamic CoS with 802.1X.................................................................................................................116
6 Access Control Lists (ACLs).............................................................................118
IP Access Control Lists (ACLs)...........................................................................................................118
CAM Usage...................................................................................................................................119
User-Configurable CAM Allocation............................................................................................120
Allocating CAM for Ingress ACLs on the Port Extender.............................................................120
Allocating CAM for Egress ACLs on the Port Extender..............................................................122
Implementing ACLs .................................................................................................................... 123
IP Fragment Handling....................................................................................................................... 124
IP Fragments ACL Examples....................................................................................................... 125
Layer 4 ACL Rules Examples....................................................................................................... 125
Configure a Standard IP ACL............................................................................................................ 126
Configuring a Standard IP ACL Filter.......................................................................................... 127
Configure an Extended IP ACL......................................................................................................... 128
Configuring Filters with a Sequence Number............................................................................128
Configuring Filters Without a Sequence Number......................................................................130
Configure Layer 2 and Layer 3 ACLs.................................................................................................131
Using ACL VLAN Groups................................................................................................................... 131
Guidelines for Configuring ACL VLAN Groups...........................................................................132
Configuring an ACL VLAN Group............................................................................................... 132
Allocating ACL VLAN CAM.......................................................................................................... 133
Applying an IP ACL to an Interface...................................................................................................134
Applying Ingress ACLs on the Port Extender..............................................................................135
Applying Egress ACLs.................................................................................................................. 135
Applying Layer 3 Egress ACLs on Control-Plane Traffic............................................................136
Counting ACL Hits....................................................................................................................... 137
IP Prefix Lists...................................................................................................................................... 137
Implementation Information.......................................................................................................137
Configuration Task List for Prefix Lists....................................................................................... 138
ACL Resequencing............................................................................................................................ 141
Resequencing an ACL or Prefix List............................................................................................142
Route Maps........................................................................................................................................143
Implementation Information...................................................................................................... 144
Important Points to Remember........................................................................................................144
Configuration Task List for Route Maps.....................................................................................144
Configuring Match Routes..........................................................................................................146
Configuring Set Conditions........................................................................................................ 148
Configure a Route Map for Route Redistribution...................................................................... 149
6
Configure a Route Map for Route Tagging................................................................................150
Continue Clause..........................................................................................................................150
Configuring a UDF ACL.....................................................................................................................150
Hot-Lock Behavior............................................................................................................................152
7 Bidirectional Forwarding Detection (BFD)...................................................153
How BFD Works................................................................................................................................ 153
BFD Packet Format......................................................................................................................154
BFD Sessions................................................................................................................................156
BFD Three-Way Handshake........................................................................................................156
Session State Changes.................................................................................................................157
Important Points to Remember........................................................................................................158
Configure BFD...................................................................................................................................158
Configure BFD for Static Routes.................................................................................................159
Configure BFD for OSPF............................................................................................................. 160
Configure BFD for OSPFv3......................................................................................................... 164
Configure BFD for IS-IS...............................................................................................................165
Configure BFD for BGP...............................................................................................................168
Configure BFD for VRRP..............................................................................................................174
Configuring Protocol Liveness....................................................................................................177
8 Border Gateway Protocol IPv4 (BGPv4).......................................................178
Autonomous Systems (AS)................................................................................................................178
Sessions and Peers............................................................................................................................180
Establish a Session....................................................................................................................... 181
Route Reflectors................................................................................................................................181
Communities............................................................................................................................... 182
BGP Attributes................................................................................................................................... 182
Best Path Selection Criteria.........................................................................................................183
Weight..........................................................................................................................................185
Local Preference......................................................................................................................... 185
Multi-Exit Discriminators (MEDs)................................................................................................186
Origin........................................................................................................................................... 187
AS Path.........................................................................................................................................188
Next Hop..................................................................................................................................... 188
Multiprotocol BGP............................................................................................................................ 188
Implement BGP ................................................................................................................................189
Additional Path (Add-Path) Support........................................................................................... 189
Advertise IGP Cost as MED for Redistributed Routes................................................................ 189
Ignore Router-ID for Some Best-Path Calculations..................................................................190
Four-Byte AS Numbers............................................................................................................... 190
AS4 Number Representation...................................................................................................... 190
7
AS Number Migration..................................................................................................................192
BGP4 Management Information Base (MIB).............................................................................. 194
Important Points to Remember..................................................................................................194
Configuration Information................................................................................................................195
BGP Configuration............................................................................................................................ 195
Enabling BGP...............................................................................................................................196
Configuring AS4 Number Representations............................................................................... 200
Configuring Peer Groups............................................................................................................201
Configuring BGP Fast Fail-Over.................................................................................................204
Configuring Passive Peering.......................................................................................................206
Maintaining Existing AS Numbers During an AS Migration........................................................207
Allowing an AS Number to Appear in its Own AS Path............................................................. 208
Enabling Neighbor Graceful Restart.......................................................................................... 208
Filtering on an AS-Path Attribute............................................................................................... 209
Regular Expressions as Filters......................................................................................................211
Redistributing Routes.................................................................................................................. 212
Enabling Additional Paths............................................................................................................213
Configuring IP Community Lists.................................................................................................213
Configuring an IP Extended Community List.............................................................................215
Filtering Routes with Community Lists.......................................................................................216
Manipulating the COMMUNITY Attribute...................................................................................216
Changing MED Attributes............................................................................................................218
Changing the LOCAL_PREFERENCE Attribute...........................................................................218
Changing the NEXT_HOP Attribute............................................................................................219
Changing the WEIGHT Attribute................................................................................................ 220
Enabling Multipath...................................................................................................................... 220
Filtering BGP Routes...................................................................................................................220
Filtering BGP Routes Using Route Maps.................................................................................... 222
Filtering BGP Routes Using AS-PATH Information....................................................................222
Configuring BGP Route Reflectors.............................................................................................223
Aggregating Routes.................................................................................................................... 224
Configuring BGP Confederations.............................................................................................. 224
Enabling Route Flap Dampening................................................................................................225
Changing BGP Timers.................................................................................................................228
Enabling BGP Neighbor Soft-Reconfiguration..........................................................................228
Route Map Continue...................................................................................................................229
Enabling MBGP Configurations........................................................................................................230
BGP Regular Expression Optimization............................................................................................. 231
Debugging BGP.................................................................................................................................231
Storing Last and Bad PDUs......................................................................................................... 232
Capturing PDUs...........................................................................................................................233
PDU Counters............................................................................................................................. 234
8
Sample Configurations..................................................................................................................... 234
9 Content Addressable Memory (CAM)...........................................................244
CAM Allocation................................................................................................................................. 244
Test CAM Usage................................................................................................................................246
View CAM-ACL Settings................................................................................................................... 246
View CAM Usage...............................................................................................................................247
Return to the Default CAM Configuration.......................................................................................248
CAM Optimization............................................................................................................................ 248
Applications for CAM Profiling......................................................................................................... 248
LAG HashingLAG Hashing Based on Bidirectional Flow........................................................... 248
Unified Forwarding Table (UFT) Modes........................................................................................... 249
Configuring UFT Modes............................................................................................................. 249
10 Control Plane Policing (CoPP)..................................................................... 251
CoPP Implementation.......................................................................................................................251
Protocol-based Control Plane Policing......................................................................................251
Queue-based Control Plane Policing.........................................................................................251
CoPP Example...................................................................................................................................253
Configure Control Plane Policing.................................................................................................... 254
Configuring CoPP for Protocols................................................................................................ 254
Examples of Configuring CoPP for Protocols........................................................................... 256
Configuring CoPP for CPU Queues........................................................................................... 257
Examples of Configuring CoPP for CPU Queues...................................................................... 257
Displaying CoPP Configuration..................................................................................................258
Troubleshooting CoPP Operation................................................................................................... 263
Enabling CPU Traffic Statistics................................................................................................... 263
Viewing CPU Traffic Statistics.....................................................................................................263
Troubleshooting CPU Packet Loss.............................................................................................264
Viewing Per-Protocol CoPP Counters.......................................................................................265
Viewing Per-Queue CoPP Counters..........................................................................................270
11 Data Center Bridging (DCB)..........................................................................272
Enabling Data Center Bridging......................................................................................................... 272
Ethernet Enhancements in Data Center Bridging........................................................................... 272
Priority-Based Flow Control....................................................................................................... 274
Enhanced Transmission Selection..............................................................................................275
Data Center Bridging Exchange Protocol (DCBx)..................................................................... 276
Data Center Bridging in a Traffic Flow....................................................................................... 277
QoS dot1p Traffic Classification and Queue Assignment................................................................277
SNMP Support for PFC and Buffer Statistics Tracking.....................................................................278
DCB Maps and its Attributes.............................................................................................................279
9
DCB Map: Configuration Procedure.......................................................................................... 279
Important Points to Remember..................................................................................................279
Applying a DCB Map on a Port...................................................................................................280
Configuring PFC without a DCB Map.........................................................................................281
Configuring Lossless Queues..................................................................................................... 281
Applying a DCB Map on a Line Card..........................................................................................282
Data Center Bridging: Default Configuration..................................................................................283
Configuration Notes: PFC and ETS in a DCB Map.......................................................................... 283
PFC Configuration Notes............................................................................................................283
ETS Configuration Notes............................................................................................................284
ETS Prerequisites and Restrictions............................................................................................. 285
Priority-Group Configuration Notes..........................................................................................286
Configuring Priority-Based Flow Control........................................................................................286
Configuring Lossless Queues..................................................................................................... 287
Configuring Enhanced Transmission Selection.............................................................................. 288
Creating an ETS Priority Group.................................................................................................. 288
ETS Operation with DCBx.......................................................................................................... 289
Configure a DCBx Operation...........................................................................................................290
DCBx Operation..........................................................................................................................290
DCBx Port Roles......................................................................................................................... 290
DCB Configuration Exchange.................................................................................................... 292
Configuration Source Election...................................................................................................292
Propagation of DCB Information............................................................................................... 293
Auto-Detection and Manual Configuration of the DCBx Version............................................ 293
Behavior of Tagged Packets.......................................................................................................294
Configuration Example for DSCP and PFC Priorities................................................................ 294
DCBx Example.............................................................................................................................295
DCBx Prerequisites and Restrictions..........................................................................................296
Configuring DCBx....................................................................................................................... 297
Verifying the DCB Configuration......................................................................................................301
Performing PFC Using DSCP Bits Instead of 802.1p Bits.................................................................312
PFC and ETS Configuration Examples..............................................................................................312
Using PFC and ETS to Manage Data Center Traffic.........................................................................313
PFC and ETS Configuration Command Examples.....................................................................314
Using PFC and ETS to Manage Converged Ethernet Traffic......................................................315
Hierarchical Scheduling in ETS Output Policies.........................................................................315
Priority-Based Flow Control Using Dynamic Buffer Method.......................................................... 315
Pause and Resume of Traffic...................................................................................................... 316
Buffer Sizes for Lossless or PFC Packets....................................................................................316
Configuring the Dynamic Buffer Method.........................................................................................317
12 Debugging and Diagnostics......................................................................... 319
10
Offline Diagnostics............................................................................................................................319
Running Port Extender Offline Diagnostics on the Switch........................................................319
Running Offline Diagnostics on a Standalone Switch...............................................................326
TRACE Logs.......................................................................................................................................349
Auto Save on Reload, Crash, or Rollover...................................................................................349
Uploading Trace Logs.................................................................................................................349
Last Restart Reason...........................................................................................................................350
show hardware Commands.............................................................................................................350
Environmental Monitoring................................................................................................................353
Displaying Port Extender Environment Information .................................................................354
Display Power Supply Status...................................................................................................... 354
Display Fan Status....................................................................................................................... 355
Display Transceiver Type............................................................................................................ 355
Recognize an Over-Temperature Condition.............................................................................357
Troubleshoot an Over-Temperature Condition........................................................................358
Troubleshooting Packet Loss...........................................................................................................360
Displaying Drop Counters...........................................................................................................361
Displaying Dataplane Statistics...................................................................................................362
Displaying Line-Card Counters..................................................................................................364
Accessing Application Core Dumps................................................................................................ 364
Mini Core Dumps..............................................................................................................................365
Full Kernel Core Dumps................................................................................................................... 366
Enabling TCP Dumps........................................................................................................................367
Accessing Port Extender Core and Mini Core Dumps.................................................................... 367
13 Dynamic Host Configuration Protocol (DHCP)........................................368
DHCP Packet Format and Options.................................................................................................. 368
Assign an IP Address using DHCP.................................................................................................... 370
Implementation Information.............................................................................................................371
Configure the System to be a DHCP Server.................................................................................... 372
Configuring the Server for Automatic Address Allocation........................................................ 372
Specifying a Default Gateway.....................................................................................................374
Configure a Method of Hostname Resolution...........................................................................374
Using DNS for Address Resolution............................................................................................. 374
Using NetBIOS WINS for Address Resolution............................................................................ 374
Creating Manual Binding Entries................................................................................................ 374
Debugging the DHCP Server...................................................................................................... 375
Using DHCP Clear Commands...................................................................................................375
Configure the System to be a Relay Agent...................................................................................... 375
Configure the System to be a DHCP Client.....................................................................................377
DHCP Client on a Management Interface..................................................................................377
DHCP Client Operation with Other Features.............................................................................378
11
Configure Secure DHCP...................................................................................................................378
Option 82.................................................................................................................................... 379
DHCP Snooping.......................................................................................................................... 379
Drop DHCP Packets on Snooped VLANs Only.......................................................................... 381
Dynamic ARP Inspection............................................................................................................ 382
Configuring Dynamic ARP Inspection........................................................................................383
Source Address Validation................................................................................................................384
Enabling IP Source Address Validation...................................................................................... 384
DHCP MAC Source Address Validation......................................................................................385
Enabling IP+MAC Source Address Validation............................................................................385
Viewing the Number of SAV Dropped Packets..........................................................................386
Clearing the Number of SAV Dropped Packets.........................................................................386
14 Equal Cost Multi-Path (ECMP)..................................................................... 387
ECMP for Flow-Based Affinity.......................................................................................................... 387
Enabling Deterministic ECMP Next Hop....................................................................................387
Configuring the Hash Algorithm Seed....................................................................................... 387
Link Bundle Monitoring.............................................................................................................. 388
Managing ECMP Group Paths..........................................................................................................388
Creating an ECMP Group Bundle.................................................................................................... 389
Modifying the ECMP Group Threshold............................................................................................389
BGP Multipath Operation with Link Bankwidth...............................................................................390
Dynamic Re-calculation of Link Bankwidth.................................................................................... 392
Weighted ECMP for Static Routes....................................................................................................392
ECMP Support in L3 Host and LPM Tables...................................................................................... 393
15 FCoE Transit.................................................................................................... 394
Fibre Channel over Ethernet............................................................................................................ 394
Ensure Robustness in a Converged Ethernet Network...................................................................394
FIP Snooping on Ethernet Bridges................................................................................................... 396
FIP Snooping in a Switch Stack........................................................................................................ 398
Using FIP Snooping...........................................................................................................................398
FIP Snooping Prerequisites.........................................................................................................398
Important Points to Remember................................................................................................. 399
Enabling the FCoE Transit Feature.............................................................................................399
Enable FIP Snooping on VLANs................................................................................................. 400
Configure the FC-MAP Value.....................................................................................................400
Configure a Port for a Bridge-to-Bridge Link........................................................................... 400
Configure a Port for a Bridge-to-FCF Link................................................................................400
Impact on Other Software Features.......................................................................................... 400
FIP Snooping Restrictions...........................................................................................................401
Configuring FIP Snooping................................................................................................................ 401
12
Displaying FIP Snooping Information.............................................................................................. 402
FCoE Transit Configuration Example.............................................................................................. 408
16 FIPS Cryptography......................................................................................... 410
Configuration Tasks..........................................................................................................................410
Preparing the System........................................................................................................................410
Enabling FIPS Mode...........................................................................................................................411
Generating Host-Keys....................................................................................................................... 411
Monitoring FIPS Mode Status............................................................................................................412
Disabling FIPS Mode..........................................................................................................................412
17 Flex Hash and Optimized Boot-Up............................................................. 414
Flex Hash Capability Overview......................................................................................................... 414
Configuring the Flex Hash Mechanism............................................................................................414
LACP Fast Switchover....................................................................................................................... 415
Configuring LACP Fast Switchover...................................................................................................415
LACP.................................................................................................................................................. 415
LACP Fast Switchover..................................................................................................................415
RDMA Over Converged Ethernet (RoCE) Overview........................................................................ 416
Sample Configurations......................................................................................................................417
......................................................................................................................................................417
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.............................................................420
18 Force10 Resilient Ring Protocol (FRRP).....................................................422
Protocol Overview............................................................................................................................422
Ring Status...................................................................................................................................423
Multiple FRRP Rings.................................................................................................................... 424
Important FRRP Points................................................................................................................424
Implementing FRRP.................................................................................................................... 424
Important FRRP Concepts..........................................................................................................425
FRRP Configuration.......................................................................................................................... 426
Creating the FRRP Group........................................................................................................... 426
Configuring the Control VLAN................................................................................................... 427
Configuring and Adding the Member VLANs............................................................................ 428
Setting the FRRP Timers............................................................................................................. 429
Clearing the FRRP Counters.......................................................................................................429
Viewing the FRRP Configuration................................................................................................430
Viewing the FRRP Information................................................................................................... 430
Troubleshooting FRRP......................................................................................................................430
Configuration Checks.................................................................................................................430
Sample Configuration and Topology.............................................................................................. 430
13
19 GARP VLAN Registration Protocol (GVRP)................................................ 433
Important Points to Remember....................................................................................................... 433
Configure GVRP................................................................................................................................434
Related Configuration Tasks...................................................................................................... 434
Enabling GVRP Globally....................................................................................................................435
Enabling GVRP on a Layer 2 Interface............................................................................................. 435
Configure GVRP Registration........................................................................................................... 435
Configure a GARP Timer.................................................................................................................. 436
20 High Availability (HA).................................................................................... 438
High Availability on Chassis..............................................................................................................438
High Availability in a PE Stack...........................................................................................................438
Online Insertion and Removal..........................................................................................................438
RPM Online Insertion..................................................................................................................439
Line Card Online Insertion..........................................................................................................439
Pre-configuring a Slot for a Line-Card Type............................................................................. 439
Replacing a Line Card.................................................................................................................440
Hitless Behavior................................................................................................................................ 440
Graceful Restart.................................................................................................................................441
Software Resiliency...........................................................................................................................441
System Health Monitoring.......................................................................................................... 441
Failure and Event Logging.......................................................................................................... 442
Trace Log.................................................................................................................................... 442
Core Dumps................................................................................................................................442
System Log..................................................................................................................................442
Control Plane Redundancy.............................................................................................................. 442
Control-Plane Failover............................................................................................................... 443
RPM Synchronization................................................................................................................. 444
Forcing an RPM Failover.............................................................................................................444
Specifying an Auto-Failover Limit.............................................................................................. 444
Disabling Auto-Reboot...............................................................................................................444
21 Internet Group Management Protocol (IGMP).........................................446
IGMP Implementation Information..................................................................................................446
IGMP Protocol Overview..................................................................................................................446
IGMP Version 2........................................................................................................................... 446
IGMP Version 3........................................................................................................................... 448
Configure IGMP.................................................................................................................................451
Related Configuration Tasks.......................................................................................................451
Viewing IGMP Enabled Interfaces.................................................................................................... 452
Selecting an IGMP Version............................................................................................................... 452
14
Viewing IGMP Groups.......................................................................................................................453
Enabling IGMP Immediate-Leave.....................................................................................................453
IGMP Snooping................................................................................................................................. 453
IGMP Snooping Implementation Information...........................................................................454
Configuring IGMP Snooping...................................................................................................... 454
Removing a Group-Port Association......................................................................................... 454
Disabling Multicast Flooding...................................................................................................... 455
Specifying a Port as Connected to a Multicast Router..............................................................455
Configuring the Switch as Querier.............................................................................................455
Fast Convergence after MSTP Topology Changes......................................................................... 456
Designating a Multicast Router Interface........................................................................................ 456
22 Interfaces.........................................................................................................458
Basic Interface Configuration.......................................................................................................... 458
Advanced Interface Configuration...................................................................................................458
Port Numbering................................................................................................................................ 459
Interface Types..................................................................................................................................461
View Basic Interface Information.....................................................................................................462
Resetting an Interface to its Factory Default State..........................................................................468
Enabling a Physical Interface........................................................................................................... 469
Physical Interfaces............................................................................................................................469
Port Pipes.................................................................................................................................... 470
Configuration Task List for Physical Interfaces..........................................................................470
Overview of Layer Modes...........................................................................................................470
Configuring Layer 2 (Data Link) Mode........................................................................................471
Configuring Layer 2 (Interface) Mode.........................................................................................471
Configuring Layer 3 (Network) Mode......................................................................................... 471
Configuring Layer 3 (Interface) Mode........................................................................................ 472
Egress Interface Selection (EIS)........................................................................................................ 473
Important Points to Remember..................................................................................................473
Configuring EIS............................................................................................................................473
Management Interfaces....................................................................................................................474
Configuring a Dedicated Management Interface .....................................................................474
Configuring a Management Interface on an Ethernet Port.......................................................475
Port Extender Interfaces...................................................................................................................476
VLAN Interfaces.................................................................................................................................477
Loopback Interfaces..........................................................................................................................477
Null Interfaces...................................................................................................................................478
Port Channel Interfaces....................................................................................................................478
Port Channel Definition and Standards......................................................................................478
Port Channel Benefits.................................................................................................................479
Port Channel Implementation....................................................................................................479
15
10/40 Gbps Interfaces in Port Channels....................................................................................479
Configuration Tasks for Port Channel Interfaces......................................................................480
Creating a Port Channel.............................................................................................................480
Adding a Physical Interface to a Port Channel..........................................................................480
Reassigning an Interface to a New Port Channel......................................................................483
Configuring the Minimum Oper Up Links in a Port Channel....................................................483
Adding or Removing a Port Channel from a VLAN................................................................... 484
Assigning an IP Address to a Port Channel................................................................................484
Deleting or Disabling a Port Channel.........................................................................................485
Load Balancing Through Port Channels....................................................................................485
Changing the Hash Algorithm....................................................................................................485
Bulk Configuration............................................................................................................................486
Interface Range...........................................................................................................................486
Bulk Configuration Examples.....................................................................................................486
Defining Interface Range Macros.................................................................................................... 488
Define the Interface Range........................................................................................................ 488
Choosing an Interface-Range Macro........................................................................................ 488
Monitoring and Maintaining Interfaces............................................................................................489
Maintenance Using TDR.............................................................................................................490
Displaying Traffic Statistics on HiGig Ports......................................................................................491
Link Bundle Monitoring.....................................................................................................................491
Monitoring HiGig Link Bundles........................................................................................................ 492
Guidelines for Monitoring HiGig Link-Bundles .........................................................................493
Enabling HiGig Link-Bundle Monitoring....................................................................................494
Non Dell-Qualified Transceivers......................................................................................................494
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 495
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port......................................................496
Link Dampening................................................................................................................................497
Important Points to Remember................................................................................................. 497
Enabling Link Dampening...........................................................................................................498
Using Ethernet Pause Frames for Flow Control..............................................................................499
Threshold Settings......................................................................................................................500
Enabling Pause Frames...............................................................................................................500
Configure the MTU Size on an Interface..........................................................................................501
Auto-Negotiation on Ethernet Interfaces........................................................................................502
Set Auto-Negotiation Options................................................................................................... 502
View Advanced Interface Information............................................................................................. 503
Configuring the Interface Sampling Size...................................................................................504
Dynamic Counters............................................................................................................................505
Clearing Interface Counters....................................................................................................... 505
23 Internet Protocol Security (IPSec).............................................................. 507
16
Configuring IPSec ............................................................................................................................508
24 IPv4 Routing................................................................................................... 509
IP Addresses......................................................................................................................................509
Implementation Information......................................................................................................509
Configuration Tasks for IP Addresses.............................................................................................. 509
Assigning IP Addresses to an Interface............................................................................................ 510
Configuring Static Routes................................................................................................................. 511
Configure Static Routes for the Management Interface................................................................. 512
Enabling Directed Broadcast............................................................................................................ 512
Resolution of Host Names................................................................................................................513
Enabling Dynamic Resolution of Host Names.................................................................................513
Specifying the Local System Domain and a List of Domains.......................................................... 514
Configuring DNS with Traceroute....................................................................................................514
ARP.....................................................................................................................................................515
Configuration Tasks for ARP....................................................................................................... 515
Configuring Static ARP Entries....................................................................................................516
Configuring ARP Inspection Trust.............................................................................................. 516
Configuring ARP Timeout........................................................................................................... 517
Enabling Proxy ARP......................................................................................................................517
Clearing ARP Cache.....................................................................................................................517
ARP Learning via Gratuitous ARP................................................................................................518
Enabling ARP Learning via Gratuitous ARP.................................................................................518
ARP Learning via ARP Request....................................................................................................518
Configuring ARP Retries..............................................................................................................519
ICMP..................................................................................................................................................520
Configuration Tasks for ICMP.................................................................................................... 520
Enabling ICMP Unreachable Messages......................................................................................520
25 IPv6 Routing.................................................................................................... 521
Protocol Overview.............................................................................................................................521
Extended Address Space............................................................................................................. 521
Stateless Autoconfiguration........................................................................................................521
IPv6 Headers............................................................................................................................... 522
IPv6 Header Fields.......................................................................................................................523
Extension Header Fields..............................................................................................................524
IPv6 Addressing...........................................................................................................................525
IPv6 Implementation on the Dell Networking OS...........................................................................526
Configuring the LPM Table for IPv6 Extended Prefixes.................................................................. 528
ICMPv6.............................................................................................................................................. 529
Path MTU Discovery......................................................................................................................... 529
IPv6 Neighbor Discovery..................................................................................................................530
17
IPv6 Neighbor Discovery of MTU Packets..................................................................................531
Configuring the IPv6 Recursive DNS Server...............................................................................531
Secure Shell (SSH) Over an IPv6 Transport......................................................................................533
Configuration Tasks for IPv6............................................................................................................ 533
Adjusting Your CAM Profile........................................................................................................ 534
Assigning an IPv6 Address to an Interface.................................................................................534
Assigning a Static IPv6 Route......................................................................................................535
Configuring Telnet with IPv6......................................................................................................536
SNMP over IPv6...........................................................................................................................536
Displaying IPv6 Information....................................................................................................... 536
Displaying an IPv6 Configuration............................................................................................... 537
Displaying IPv6 Routes................................................................................................................538
Displaying the Running Configuration for an Interface............................................................ 539
Clearing IPv6 Routes...................................................................................................................539
Configuring IPv6 RA Guard.............................................................................................................. 540
26 Intermediate System to Intermediate System..........................................542
IS-IS Protocol Overview................................................................................................................... 542
IS-IS Addressing................................................................................................................................ 542
Multi-Topology IS-IS........................................................................................................................ 543
Transition Mode.......................................................................................................................... 543
Interface Support........................................................................................................................ 544
Adjacencies................................................................................................................................. 544
Graceful Restart................................................................................................................................ 544
Timers..........................................................................................................................................544
Implementation Information............................................................................................................545
Configuration Information............................................................................................................... 546
Configuration Tasks for IS-IS......................................................................................................546
Configuring the Distance of a Route..........................................................................................555
Changing the IS-Type.................................................................................................................555
Redistributing IPv4 Routes..........................................................................................................558
Redistributing IPv6 Routes..........................................................................................................559
Configuring Authentication Passwords......................................................................................559
Setting the Overload Bit............................................................................................................. 560
Debugging IS-IS...........................................................................................................................561
IS-IS Metric Styles............................................................................................................................. 562
Configure Metric Values................................................................................................................... 562
Maximum Values in the Routing Table...................................................................................... 563
Change the IS-IS Metric Style in One Level Only...................................................................... 563
Leaks from One Level to Another.............................................................................................. 564
Sample Configurations..................................................................................................................... 565
18
27 iSCSI Optimization.........................................................................................568
iSCSI Optimization Overview........................................................................................................... 568
Default iSCSI Optimization Values................................................................................................... 570
iSCSI Optimization Prerequisites......................................................................................................570
Configuring iSCSI Optimization....................................................................................................... 570
Displaying iSCSI Optimization Information......................................................................................573
Enable and Disable iSCSI Optimization............................................................................................574
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.............................................. 575
Monitoring iSCSI Traffic Flows..........................................................................................................575
Information Monitored in iSCSI Traffic Flows..................................................................................575
Detection and Auto-Configuration for Dell EqualLogic Arrays...................................................... 576
Configuring Detection and Ports for Dell Compellent Arrays.........................................................577
Application of Quality of Service to iSCSI Traffic Flows.................................................................. 577
28 Link Aggregation Control Protocol (LACP)...............................................579
Introduction to Dynamic LAGs and LACP........................................................................................579
Important Points to Remember..................................................................................................579
LACP Modes................................................................................................................................580
Configuring LACP Commands...................................................................................................580
LACP Configuration Tasks................................................................................................................ 581
Creating a LAG.............................................................................................................................581
Configuring the LAG Interfaces as Dynamic..............................................................................581
Setting the LACP Long Timeout.................................................................................................582
Monitoring and Debugging LACP.............................................................................................. 583
Shared LAG State Tracking............................................................................................................... 583
Configuring Shared LAG State Tracking.................................................................................... 584
Important Points about Shared LAG State Tracking..................................................................585
LACP Basic Configuration Example................................................................................................. 586
Configure a LAG on ALPHA........................................................................................................586
29 Layer 2..............................................................................................................594
Manage the MAC Address Table...................................................................................................... 594
Clearing the MAC Address Table................................................................................................594
Setting the Aging Time for Dynamic Entries..............................................................................594
Configuring a Static MAC Address............................................................................................. 595
Displaying the MAC Address Table.............................................................................................595
MAC Learning Limit...........................................................................................................................595
Setting the MAC Learning Limit..................................................................................................596
mac learning-limit Dynamic.......................................................................................................596
mac learning-limit mac-address-sticky.....................................................................................596
mac learning-limit station-move............................................................................................... 597
19
mac learning-limit no-station-move......................................................................................... 597
Learning Limit Violation Actions.................................................................................................597
Setting Station Move Violation Actions......................................................................................598
Recovering from Learning Limit and Station Move Violations..................................................598
NIC Teaming.....................................................................................................................................599
Configure Redundant Pairs..............................................................................................................600
Important Points about Configuring Redundant Pairs..............................................................602
Far-End Failure Detection................................................................................................................ 603
FEFD State Changes................................................................................................................... 604
Configuring FEFD........................................................................................................................605
Enabling FEFD on an Interface...................................................................................................606
Debugging FEFD......................................................................................................................... 607
30 Link Layer Discovery Protocol (LLDP)........................................................609
802.1AB (LLDP) Overview.................................................................................................................609
Protocol Data Units.................................................................................................................... 609
Optional TLVs....................................................................................................................................610
Management TLVs...................................................................................................................... 610
TIA-1057 (LLDP-MED) Overview...................................................................................................... 612
TIA Organizationally Specific TLVs............................................................................................. 613
Configure LLDP................................................................................................................................. 617
Related Configuration Tasks....................................................................................................... 617
Important Points to Remember..................................................................................................617
LLDP Compatibility......................................................................................................................618
CONFIGURATION versus INTERFACE Configurations....................................................................618
Enabling LLDP................................................................................................................................... 619
Disabling and Undoing LLDP...................................................................................................... 619
Enabling LLDP on Management Ports............................................................................................. 619
Disabling and Undoing LLDP on Management Ports................................................................ 619
Advertising TLVs................................................................................................................................620
Viewing the LLDP Configuration...................................................................................................... 621
Viewing Information Advertised by Adjacent LLDP Agents............................................................ 622
Configuring LLDPDU Intervals......................................................................................................... 623
Configuring Transmit and Receive Mode........................................................................................ 623
Configuring a Time to Live...............................................................................................................624
Debugging LLDP...............................................................................................................................625
Relevant Management Objects........................................................................................................626
31 Multicast Source Discovery Protocol (MSDP)...........................................632
Protocol Overview............................................................................................................................632
Anycast RP........................................................................................................................................ 634
Implementation Information............................................................................................................634
20
/