Dell PowerSwitch S6000 ON User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6000 ON User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S6000–ON
System
9.11(0.0)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 01
Rev. A00
Contents
1 About this Guide...........................................................................................................................................34
Audience............................................................................................................................................................................34
Conventions......................................................................................................................................................................34
Related Documents......................................................................................................................................................... 34
2 Configuration Fundamentals........................................................................................................................35
Accessing the Command Line........................................................................................................................................35
CLI Modes.........................................................................................................................................................................35
Navigating CLI Modes............................................................................................................................................... 37
The do Command............................................................................................................................................................ 39
Undoing Commands........................................................................................................................................................ 40
Obtaining Help..................................................................................................................................................................40
Entering and Editing Commands.................................................................................................................................... 41
Command History............................................................................................................................................................42
Filtering show Command Outputs.................................................................................................................................42
Example of the grep Keyword..................................................................................................................................42
Multiple Users in Configuration Mode...........................................................................................................................43
3 Getting Started........................................................................................................................................... 44
Console Access................................................................................................................................................................45
Serial Console.............................................................................................................................................................45
Default Configuration...................................................................................................................................................... 46
Configuring a Host Name............................................................................................................................................... 46
Accessing the System Remotely................................................................................................................................... 46
Accessing the System Remotely............................................................................................................................. 47
Configure the Management Port IP Address.........................................................................................................47
Configure a Management Route..............................................................................................................................47
Configuring a Username and Password..................................................................................................................47
Configuring the Enable Password................................................................................................................................. 48
Configuration File Management.....................................................................................................................................48
Copy Files to and from the System.........................................................................................................................48
Mounting an NFS File System..................................................................................................................................49
Save the Running-Configuration..............................................................................................................................51
Configure the Overload Bit for a Startup Scenario................................................................................................51
Viewing Files................................................................................................................................................................51
Managing the File System.............................................................................................................................................. 52
View Command History.................................................................................................................................................. 53
Upgrading Dell Networking OS...................................................................................................................................... 53
Using HTTP for File Transfers....................................................................................................................................... 53
Verify Software Images Before Installation..................................................................................................................54
4 Management............................................................................................................................................... 56
Contents
3
Configuring Privilege Levels........................................................................................................................................... 56
Creating a Custom Privilege Level...........................................................................................................................57
Removing a Command from EXEC Mode.............................................................................................................. 57
Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 57
Allowing Access to CONFIGURATION Mode Commands....................................................................................57
Allowing Access to Different Modes....................................................................................................................... 57
Applying a Privilege Level to a Username...............................................................................................................59
Applying a Privilege Level to a Terminal Line......................................................................................................... 59
Configuring Logging........................................................................................................................................................ 59
Audit and Security Logs............................................................................................................................................60
Configuring Logging Format ................................................................................................................................... 61
Setting Up a Secure Connection to a Syslog Server.............................................................................................61
Log Messages in the Internal Buffer............................................................................................................................. 63
Configuration Task List for System Log Management.........................................................................................63
Disabling System Logging...............................................................................................................................................63
Sending System Messages to a Syslog Server............................................................................................................63
Configuring a UNIX System as a Syslog Server.................................................................................................... 63
Track Login Activity.........................................................................................................................................................64
Restrictions for Tracking Login Activity..................................................................................................................64
Configuring Login Activity Tracking........................................................................................................................ 64
Display Login Statistics............................................................................................................................................. 65
Limit Concurrent Login Sessions................................................................................................................................... 66
Restrictions for Limiting the Number of Concurrent Sessions............................................................................66
Configuring Concurrent Session Limit.................................................................................................................... 66
Enabling the System to Clear Existing Sessions.................................................................................................... 67
Enabling Secured CLI Mode........................................................................................................................................... 68
Changing System Logging Settings.............................................................................................................................. 68
Display the Logging Buffer and the Logging Configuration....................................................................................... 69
Configuring a UNIX Logging Facility Level................................................................................................................... 69
Synchronizing Log Messages.........................................................................................................................................70
Enabling Timestamp on Syslog Messages.....................................................................................................................71
File Transfer Services.......................................................................................................................................................71
Configuration Task List for File Transfer Services.................................................................................................72
Enabling the FTP Server........................................................................................................................................... 72
Configuring FTP Server Parameters....................................................................................................................... 72
Configuring FTP Client Parameters.........................................................................................................................73
Terminal Lines...................................................................................................................................................................73
Denying and Permitting Access to a Terminal Line............................................................................................... 73
Configuring Login Authentication for Terminal Lines............................................................................................ 74
Setting Timeout for EXEC Privilege Mode...................................................................................................................75
Using Telnet to get to Another Network Device.........................................................................................................76
Lock CONFIGURATION Mode.......................................................................................................................................76
Viewing the Configuration Lock Status.................................................................................................................. 76
Reloading the system...................................................................................................................................................... 77
Restoring the Factory Default Settings........................................................................................................................ 78
4
Contents
Important Points to Remember............................................................................................................................... 78
Restoring Factory Default Environment Variables.................................................................................................78
5 802.1X..........................................................................................................................................................81
Port-Authentication Process..........................................................................................................................................83
EAP over RADIUS......................................................................................................................................................83
Configuring 802.1X.......................................................................................................................................................... 84
Related Configuration Tasks.................................................................................................................................... 84
Important Points to Remember..................................................................................................................................... 84
Enabling 802.1X................................................................................................................................................................85
Configuring dot1x Profile ............................................................................................................................................... 86
Configuring MAC addresses for a do1x Profile............................................................................................................ 87
Configuring the Static MAB and MAB Profile .............................................................................................................87
Configuring Critical VLAN ..............................................................................................................................................88
Configuring Request Identity Re-Transmissions..........................................................................................................89
Configuring a Quiet Period after a Failed Authentication.....................................................................................89
Forcibly Authorizing or Unauthorizing a Port...............................................................................................................90
Re-Authenticating a Port................................................................................................................................................ 91
Configuring Timeouts......................................................................................................................................................92
Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................... 93
Guest and Authentication-Fail VLANs.......................................................................................................................... 94
Configuring a Guest VLAN....................................................................................................................................... 94
Configuring an Authentication-Fail VLAN...............................................................................................................94
6 Access Control Lists (ACLs)........................................................................................................................96
IP Access Control Lists (ACLs)......................................................................................................................................97
CAM Usage................................................................................................................................................................ 98
Implementing ACLs on Dell Networking OS...........................................................................................................98
Configure ACL Range Profiles................................................................................................................................100
Important Points to Remember....................................................................................................................................100
Configuration Task List for Route Maps................................................................................................................101
Configuring Match Routes......................................................................................................................................103
Configuring Set Conditions.....................................................................................................................................104
Configure a Route Map for Route Redistribution................................................................................................ 105
Configure a Route Map for Route Tagging.......................................................................................................... 106
Continue Clause....................................................................................................................................................... 106
IP Fragment Handling.................................................................................................................................................... 106
IP Fragments ACL Examples...................................................................................................................................107
Layer 4 ACL Rules Examples.................................................................................................................................. 107
Configure a Standard IP ACL....................................................................................................................................... 108
Configuring a Standard IP ACL Filter.....................................................................................................................109
Configure an Extended IP ACL..................................................................................................................................... 110
Configuring Filters with a Sequence Number........................................................................................................110
Configuring Filters Without a Sequence Number..................................................................................................111
Configure Layer 2 and Layer 3 ACLs............................................................................................................................112
Assign an IP ACL to an Interface.................................................................................................................................. 112
Contents
5
Applying an IP ACL..........................................................................................................................................................113
Counting ACL Hits.................................................................................................................................................... 113
Configure Ingress ACLs..................................................................................................................................................113
Configure Egress ACLs.................................................................................................................................................. 114
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 115
IP Prefix Lists...................................................................................................................................................................115
Implementation Information.....................................................................................................................................116
Configuration Task List for Prefix Lists..................................................................................................................116
ACL Resequencing..........................................................................................................................................................119
Resequencing an ACL or Prefix List...................................................................................................................... 120
Route Maps......................................................................................................................................................................121
Implementation Information.....................................................................................................................................121
Flow-Based Monitoring Support for ACLs..................................................................................................................122
Behavior of Flow-Based Monitoring...................................................................................................................... 122
Enabling Flow-Based Monitoring............................................................................................................................123
Configuring IP Mirror Access Group............................................................................................................................124
Sample Configuration.............................................................................................................................................. 125
Example of viewing IP mirror–access–group applied to an Interface...............................................................125
7 Bidirectional Forwarding Detection (BFD)..................................................................................................126
How BFD Works.............................................................................................................................................................126
BFD Packet Format..................................................................................................................................................127
BFD Sessions............................................................................................................................................................ 128
BFD Three-Way Handshake................................................................................................................................... 129
Session State Changes.............................................................................................................................................131
Important Points to Remember.....................................................................................................................................131
Configure BFD.................................................................................................................................................................131
Configure BFD for Physical Ports.......................................................................................................................... 132
Configure BFD for Static Routes........................................................................................................................... 133
Configure BFD for OSPF.........................................................................................................................................136
Configure BFD for OSPFv3.................................................................................................................................... 139
Configure BFD for IS-IS...........................................................................................................................................140
Configure BFD for BGP...........................................................................................................................................142
Configure BFD for VRRP........................................................................................................................................ 149
Configuring Protocol Liveness................................................................................................................................152
Troubleshooting BFD............................................................................................................................................... 152
8 Border Gateway Protocol IPv4 (BGPv4)....................................................................................................154
Autonomous Systems (AS)...........................................................................................................................................154
Sessions and Peers........................................................................................................................................................ 156
Establish a Session...................................................................................................................................................156
Route Reflectors............................................................................................................................................................ 157
BGP Attributes............................................................................................................................................................... 158
Best Path Selection Criteria....................................................................................................................................159
Weight....................................................................................................................................................................... 160
Local Preference...................................................................................................................................................... 160
6
Contents
Multi-Exit Discriminators (MEDs)........................................................................................................................... 161
Origin..........................................................................................................................................................................162
AS Path......................................................................................................................................................................163
Next Hop................................................................................................................................................................... 163
Multiprotocol BGP..........................................................................................................................................................163
Implement BGP with Dell Networking OS...................................................................................................................164
Additional Path (Add-Path) Support..................................................................................................................... 164
Advertise IGP Cost as MED for Redistributed Routes........................................................................................164
Ignore Router-ID in Best-Path Calculation........................................................................................................... 165
Four-Byte AS Numbers...........................................................................................................................................165
AS4 Number Representation..................................................................................................................................165
AS Number Migration.............................................................................................................................................. 167
BGP4 Management Information Base (MIB)....................................................................................................... 168
Important Points to Remember..............................................................................................................................168
Configuration Information............................................................................................................................................. 169
BGP Configuration......................................................................................................................................................... 169
Enabling BGP............................................................................................................................................................ 170
Configuring AS4 Number Representations...........................................................................................................173
Configuring Peer Groups.........................................................................................................................................175
Configuring BGP Fast Fall-Over............................................................................................................................. 177
Configuring Passive Peering................................................................................................................................... 179
Maintaining Existing AS Numbers During an AS Migration.................................................................................179
Allowing an AS Number to Appear in its Own AS Path.......................................................................................180
Enabling Graceful Restart........................................................................................................................................ 181
Enabling Neighbor Graceful Restart...................................................................................................................... 182
Filtering on an AS-Path Attribute...........................................................................................................................182
Regular Expressions as Filters................................................................................................................................ 184
Redistributing Routes.............................................................................................................................................. 185
Enabling Additional Paths........................................................................................................................................186
Configuring IP Community Lists.............................................................................................................................186
Configuring an IP Extended Community List........................................................................................................187
Filtering Routes with Community Lists..................................................................................................................188
Manipulating the COMMUNITY Attribute.............................................................................................................189
Changing MED Attributes.......................................................................................................................................190
Changing the LOCAL_PREFERENCE Attribute..................................................................................................190
Configuring the local System or a Different System to be the Next Hop for BGP-Learned Routes.............191
Changing the WEIGHT Attribute............................................................................................................................192
Enabling Multipath....................................................................................................................................................192
Filtering BGP Routes............................................................................................................................................... 192
Filtering BGP Routes Using Route Maps.............................................................................................................. 194
Filtering BGP Routes Using AS-PATH Information............................................................................................. 194
Configuring BGP Route Reflectors........................................................................................................................195
Aggregating Routes................................................................................................................................................. 196
Configuring BGP Confederations...........................................................................................................................196
Enabling Route Flap Dampening.............................................................................................................................197
Contents
7
Changing BGP Timers............................................................................................................................................. 199
Enabling BGP Neighbor Soft-Reconfiguration.....................................................................................................199
Enabling or disabling BGP neighbors.....................................................................................................................200
Route Map Continue...............................................................................................................................................202
Enabling MBGP Configurations................................................................................................................................... 202
BGP Regular Expression Optimization........................................................................................................................203
Debugging BGP............................................................................................................................................................. 203
Storing Last and Bad PDUs....................................................................................................................................204
Capturing PDUs.......................................................................................................................................................205
PDU Counters..........................................................................................................................................................206
Sample Configurations..................................................................................................................................................206
9 Content Addressable Memory (CAM)........................................................................................................ 213
CAM Allocation............................................................................................................................................................... 213
Test CAM Usage............................................................................................................................................................215
View CAM Profiles......................................................................................................................................................... 215
View CAM-ACL Settings...............................................................................................................................................216
View CAM Usage............................................................................................................................................................217
CAM Optimization..........................................................................................................................................................218
Troubleshoot CAM Profiling..........................................................................................................................................218
QoS CAM Region Limitation................................................................................................................................... 218
Syslog Error When the Table is Full....................................................................................................................... 218
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................219
Syslog Warning for Discrepancies Between Configured Extended Prefixes....................................................219
Unified Forwarding Table (UFT) Modes......................................................................................................................219
Configuring UFT Modes.......................................................................................................................................... 219
10 Control Plane Policing (CoPP)..................................................................................................................221
Configure Control Plane Policing.................................................................................................................................222
Configuring CoPP for Protocols............................................................................................................................223
Configuring CoPP for CPU Queues......................................................................................................................225
Displaying CoPP Configuration .............................................................................................................................226
11 Data Center Bridging (DCB)..................................................................................................................... 228
Ethernet Enhancements in Data Center Bridging.....................................................................................................228
Priority-Based Flow Control...................................................................................................................................229
Enhanced Transmission Selection.........................................................................................................................230
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................231
Data Center Bridging in a Traffic Flow................................................................................................................. 232
Enabling Data Center Bridging.....................................................................................................................................232
DCB Maps and its Attributes................................................................................................................................. 233
Data Center Bridging: Default Configuration............................................................................................................. 234
Configuring Priority-Based Flow Control....................................................................................................................234
Configuring Lossless Queues................................................................................................................................. 235
Configuring PFC in a DCB Map................................................................................................................................... 237
PFC Configuration Notes....................................................................................................................................... 237
8
Contents
PFC Prerequisites and Restrictions.......................................................................................................................238
Applying a DCB Map on a Port.................................................................................................................................... 238
Configuring PFC without a DCB Map.........................................................................................................................239
Configuring Lossless QueuesExample:................................................................................................................. 239
Priority-Based Flow Control Using Dynamic Buffer Method....................................................................................241
Pause and Resume of Traffic................................................................................................................................. 241
Buffer Sizes for Lossless or PFC Packets............................................................................................................ 241
Behavior of Tagged Packets........................................................................................................................................242
Configuration Example for DSCP and PFC Priorities................................................................................................242
SNMP Support for PFC and Buffer Statistics Tracking...........................................................................................243
Performing PFC Using DSCP Bits Instead of 802.1p Bits........................................................................................243
PFC and ETS Configuration Examples....................................................................................................................... 244
Using PFC to Manage Converged Ethernet Traffic................................................................................................. 244
Operations on Untagged Packets............................................................................................................................... 244
Generation of PFC for a Priority for Untagged Packets.......................................................................................... 245
Configure Enhanced Transmission Selection.............................................................................................................245
ETS Prerequisites and Restrictions.......................................................................................................................245
Creating an ETS Priority Group............................................................................................................................. 245
ETS Operation with DCBx......................................................................................................................................246
Configuring Bandwidth Allocation for DCBx CIN.................................................................................................247
Configuring ETS in a DCB Map..............................................................................................................................248
Hierarchical Scheduling in ETS Output Policies.........................................................................................................249
Using ETS to Manage Converged Ethernet Traffic..................................................................................................249
Applying DCB Policies in a Switch Stack....................................................................................................................250
Configure a DCBx Operation....................................................................................................................................... 250
DCBx Operation.......................................................................................................................................................250
DCBx Port Roles......................................................................................................................................................250
DCB Configuration Exchange................................................................................................................................ 252
Configuration Source Election............................................................................................................................... 252
Propagation of DCB Information........................................................................................................................... 253
Auto-Detection and Manual Configuration of the DCBx Version..................................................................... 253
DCBx Example......................................................................................................................................................... 253
DCBx Prerequisites and Restrictions.................................................................................................................... 254
Configuring DCBx....................................................................................................................................................254
Verifying the DCB Configuration.................................................................................................................................258
QoS dot1p Traffic Classification and Queue Assignment.........................................................................................266
Configuring the Dynamic Buffer Method................................................................................................................... 267
Sample DCB Configuration...........................................................................................................................................268
PFC and ETS Configuration Command Examples.............................................................................................. 269
12 Dynamic Host Configuration Protocol (DHCP).........................................................................................270
DHCP Packet Format and Options............................................................................................................................. 270
Assign an IP Address using DHCP...............................................................................................................................272
Implementation Information..........................................................................................................................................273
Configure the System to be a DHCP Server............................................................................................................. 273
Configuring the Server for Automatic Address Allocation................................................................................. 274
Contents
9
Specifying a Default Gateway................................................................................................................................275
Configure a Method of Hostname Resolution..................................................................................................... 275
Using DNS for Address Resolution........................................................................................................................275
Using NetBIOS WINS for Address Resolution..................................................................................................... 276
Creating Manual Binding Entries............................................................................................................................276
Debugging the DHCP Server................................................................................................................................. 276
Using DHCP Clear Commands...............................................................................................................................277
Configure the System to be a DHCP Client...............................................................................................................277
Configuring the DHCP Client System................................................................................................................... 277
DHCP Client on a Management Interface............................................................................................................279
DHCP Client Operation with Other Features.......................................................................................................279
Configure the System for User Port Stacking (Option 230)...................................................................................280
Configure Secure DHCP...............................................................................................................................................280
Option 82...................................................................................................................................................................281
DHCP Snooping........................................................................................................................................................281
Drop DHCP Packets on Snooped VLANs Only....................................................................................................284
Dynamic ARP Inspection........................................................................................................................................ 285
Configuring Dynamic ARP Inspection................................................................................................................... 286
Source Address Validation............................................................................................................................................287
Enabling IP Source Address Validation..................................................................................................................287
DHCP MAC Source Address Validation................................................................................................................288
Enabling IP+MAC Source Address Validation......................................................................................................288
Viewing the Number of SAV Dropped Packets...................................................................................................289
Clearing the Number of SAV Dropped Packets.................................................................................................. 289
13 Equal Cost Multi-Path (ECMP)................................................................................................................290
ECMP for Flow-Based Affinity.................................................................................................................................... 290
Configuring the Hash Algorithm............................................................................................................................ 290
Enabling Deterministic ECMP Next Hop..............................................................................................................290
Configuring the Hash Algorithm Seed................................................................................................................... 291
Link Bundle Monitoring..................................................................................................................................................291
Managing ECMP Group Paths...............................................................................................................................292
Creating an ECMP Group Bundle..........................................................................................................................292
Modifying the ECMP Group Threshold................................................................................................................ 292
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table.................................... 293
Support for ECMP in host table............................................................................................................................ 294
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ........................................................................294
14 FIP Snooping............................................................................................................................................295
Fibre Channel over Ethernet........................................................................................................................................295
Ensure Robustness in a Converged Ethernet Network........................................................................................... 295
FIP Snooping on Ethernet Bridges.............................................................................................................................. 297
Using FIP Snooping....................................................................................................................................................... 299
FIP Snooping Prerequisites.................................................................................................................................... 299
Important Points to Remember.............................................................................................................................299
Enabling the FCoE Transit Feature.......................................................................................................................300
10
Contents
Enable FIP Snooping on VLANs.............................................................................................................................300
Configure the FC-MAP Value.................................................................................................................................301
Configure a Port for a Bridge-to-Bridge Link....................................................................................................... 301
Configure a Port for a Bridge-to-FCF Link...........................................................................................................301
Impact on Other Software Features......................................................................................................................301
FIP Snooping Restrictions...................................................................................................................................... 302
Configuring FIP Snooping.......................................................................................................................................302
Displaying FIP Snooping Information...........................................................................................................................303
FCoE Transit Configuration Example..........................................................................................................................308
15 Flex Hash and Optimized Boot-Up............................................................................................................310
Flex Hash Capability Overview..................................................................................................................................... 310
Configuring the Flex Hash Mechanism........................................................................................................................310
Configuring Fast Boot and LACP Fast Switchover.................................................................................................... 311
Optimizing the Boot Time.............................................................................................................................................. 311
Booting Process When Optimized Boot Time Mechanism is Enabled............................................................... 311
Guidelines for Configuring Optimized Booting Mechanism................................................................................ 312
Interoperation of Applications with Fast Boot and System States..........................................................................313
LACP and IPv4 Routing...........................................................................................................................................313
LACP and IPv6 Routing...........................................................................................................................................313
BGP Graceful Restart..............................................................................................................................................314
Cold Boot Caused by Power Cycling the System................................................................................................314
Unexpected Reload of the System........................................................................................................................ 314
Software Upgrade....................................................................................................................................................314
LACP Fast Switchover............................................................................................................................................ 314
Changes to BGP Multipath.....................................................................................................................................315
Delayed Installation of ECMP Routes Into BGP...................................................................................................315
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................315
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces..................................................................................... 316
16 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 317
Protocol Overview..........................................................................................................................................................317
Ring Status................................................................................................................................................................318
Multiple FRRP Rings................................................................................................................................................ 318
Important FRRP Points........................................................................................................................................... 319
Important FRRP Concepts.....................................................................................................................................320
Implementing FRRP....................................................................................................................................................... 321
FRRP Configuration....................................................................................................................................................... 321
Creating the FRRP Group....................................................................................................................................... 321
Configuring the Control VLAN...............................................................................................................................322
Configuring and Adding the Member VLANs.......................................................................................................323
Setting the FRRP Timers........................................................................................................................................324
Clearing the FRRP Counters..................................................................................................................................324
Viewing the FRRP Configuration...........................................................................................................................324
Viewing the FRRP Information.............................................................................................................................. 324
Troubleshooting FRRP..................................................................................................................................................325
Contents
11
Configuration Checks..............................................................................................................................................325
Sample Configuration and Topology........................................................................................................................... 325
FRRP Support on VLT.................................................................................................................................................. 326
Example Scenario.....................................................................................................................................................327
Important Points to Remember............................................................................................................................. 328
17 GARP VLAN Registration Protocol (GVRP)............................................................................................. 329
Important Points to Remember...................................................................................................................................329
Configure GVRP............................................................................................................................................................ 330
Related Configuration Tasks..................................................................................................................................330
Enabling GVRP Globally.................................................................................................................................................331
Enabling GVRP on a Layer 2 Interface........................................................................................................................ 331
Configure GVRP Registration.......................................................................................................................................331
Configure a GARP Timer.............................................................................................................................................. 332
18 Internet Group Management Protocol (IGMP).........................................................................................333
IGMP Implementation Information.............................................................................................................................. 333
IGMP Protocol Overview..............................................................................................................................................333
IGMP Version 2........................................................................................................................................................333
IGMP Version 3........................................................................................................................................................335
Configure IGMP.............................................................................................................................................................338
Related Configuration Tasks.................................................................................................................................. 338
Viewing IGMP Enabled Interfaces...............................................................................................................................339
Selecting an IGMP Version...........................................................................................................................................339
Viewing IGMP Groups...................................................................................................................................................339
Adjusting Timers............................................................................................................................................................ 340
Adjusting Query and Response Timers.................................................................................................................340
Enabling IGMP Immediate-Leave.................................................................................................................................341
IGMP Snooping...............................................................................................................................................................341
IGMP Snooping Implementation Information........................................................................................................341
Configuring IGMP Snooping................................................................................................................................... 341
Removing a Group-Port Association.....................................................................................................................342
Disabling Multicast Flooding...................................................................................................................................342
Specifying a Port as Connected to a Multicast Router......................................................................................342
Configuring the Switch as Querier........................................................................................................................ 343
Fast Convergence after MSTP Topology Changes..................................................................................................343
Egress Interface Selection (EIS) for HTTP and IGMP Applications....................................................................... 344
Protocol Separation.................................................................................................................................................344
Enabling and Disabling Management Egress Interface Selection......................................................................345
Handling of Management Route Configuration...................................................................................................346
Handling of Switch-Initiated Traffic......................................................................................................................346
Handling of Switch-Destined Traffic.....................................................................................................................347
Handling of Transit Traffic (Traffic Separation)..................................................................................................348
Mapping of Management Applications and Traffic Type................................................................................... 348
Behavior of Various Applications for Switch-Initiated Traffic ...........................................................................349
Behavior of Various Applications for Switch-Destined Traffic .........................................................................350
12
Contents
Interworking of EIS With Various Applications..................................................................................................... 351
Designating a Multicast Router Interface................................................................................................................... 351
19 Interfaces.................................................................................................................................................352
Basic Interface Configuration...................................................................................................................................... 352
Advanced Interface Configuration.............................................................................................................................. 352
Interface Types..............................................................................................................................................................353
View Basic Interface Information................................................................................................................................ 353
Resetting an Interface to its Factory Default State..................................................................................................355
Enabling a Physical Interface....................................................................................................................................... 355
Physical Interfaces........................................................................................................................................................ 356
Configuration Task List for Physical Interfaces...................................................................................................356
40G to 1G Breakout Cable Adaptor.......................................................................................................................356
Overview of Layer Modes...................................................................................................................................... 357
Configuring Layer 2 (Data Link) Mode................................................................................................................. 357
Configuring Layer 2 (Interface) Mode..................................................................................................................358
Configuring Layer 3 (Network) Mode.................................................................................................................. 358
Configuring Layer 3 (Interface) Mode..................................................................................................................359
Egress Interface Selection (EIS)................................................................................................................................. 359
Important Points to Remember.............................................................................................................................359
Configuring EIS........................................................................................................................................................360
Management Interfaces............................................................................................................................................... 360
Configuring Management Interfaces.................................................................................................................... 360
Configuring a Management Interface on an Ethernet Port............................................................................... 362
VLAN Interfaces............................................................................................................................................................ 363
Loopback Interfaces......................................................................................................................................................363
Null Interfaces................................................................................................................................................................364
Port Channel Interfaces................................................................................................................................................364
Port Channel Definition and Standards................................................................................................................ 364
Port Channel Benefits.............................................................................................................................................364
Port Channel Implementation................................................................................................................................ 365
Interfaces in Port Channels....................................................................................................................................365
Configuration Tasks for Port Channel Interfaces................................................................................................366
Creating a Port Channel......................................................................................................................................... 366
Adding a Physical Interface to a Port Channel.................................................................................................... 366
Reassigning an Interface to a New Port Channel............................................................................................... 368
Configuring the Minimum Oper Up Links in a Port Channel..............................................................................369
Adding or Removing a Port Channel from a VLAN.............................................................................................369
Assigning an IP Address to a Port Channel..........................................................................................................370
Deleting or Disabling a Port Channel.....................................................................................................................370
Load Balancing Through Port Channels................................................................................................................ 371
Changing the Hash Algorithm.................................................................................................................................371
Bulk Configuration......................................................................................................................................................... 372
Interface Range........................................................................................................................................................372
Bulk Configuration Examples..................................................................................................................................373
Defining Interface Range Macros................................................................................................................................374
Contents
13
Define the Interface Range.................................................................................................................................... 374
Choosing an Interface-Range Macro....................................................................................................................374
Monitoring and Maintaining Interfaces....................................................................................................................... 375
Maintenance Using TDR.........................................................................................................................................376
Splitting 40G Ports without Reload.............................................................................................................................376
Splitting QSFP Ports to SFP+ Ports...........................................................................................................................378
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................378
Important Points to Remember............................................................................................................................. 379
Example Scenarios...................................................................................................................................................379
Configuring wavelength for 10–Gigabit SFP+ optics................................................................................................ 381
Link Dampening.............................................................................................................................................................. 381
Important Points to Remember..............................................................................................................................381
Enabling Link Dampening.........................................................................................................................................381
Link Bundle Monitoring................................................................................................................................................. 383
Using Ethernet Pause Frames for Flow Control........................................................................................................383
Enabling Pause Frames...........................................................................................................................................384
Configure the MTU Size on an Interface................................................................................................................... 385
Port-Pipes...................................................................................................................................................................... 385
Auto-Negotiation on Ethernet Interfaces...................................................................................................................386
Setting the Speed of Ethernet Interfaces............................................................................................................386
Set Auto-Negotiation Options............................................................................................................................... 387
View Advanced Interface Information........................................................................................................................ 388
Configuring the Interface Sampling Size..............................................................................................................389
Dynamic Counters.........................................................................................................................................................390
Clearing Interface Counters...................................................................................................................................390
Compressing Configuration Files..................................................................................................................................391
20 IPv4 Routing............................................................................................................................................394
IP Addresses...................................................................................................................................................................395
Implementation Information................................................................................................................................... 395
Configuration Tasks for IP Addresses.........................................................................................................................395
Assigning IP Addresses to an Interface...................................................................................................................... 395
Configuring Static Routes............................................................................................................................................ 396
Configure Static Routes for the Management Interface......................................................................................... 397
Using the Configured Source IP Address in ICMP Messages................................................................................. 398
Configuring the ICMP Source Interface...............................................................................................................398
Configuring the Duration to Establish a TCP Connection........................................................................................398
Enabling Directed Broadcast........................................................................................................................................399
Resolution of Host Names............................................................................................................................................399
Enabling Dynamic Resolution of Host Names............................................................................................................399
Specifying the Local System Domain and a List of Domains...................................................................................400
Configuring DNS with Traceroute...............................................................................................................................400
ARP.................................................................................................................................................................................. 401
Configuration Tasks for ARP........................................................................................................................................ 401
Configuring Static ARP Entries.................................................................................................................................... 401
Enabling Proxy ARP.......................................................................................................................................................402
14
Contents
Clearing ARP Cache......................................................................................................................................................402
ARP Learning via Gratuitous ARP............................................................................................................................... 402
Enabling ARP Learning via Gratuitous ARP............................................................................................................... 403
ARP Learning via ARP Request...................................................................................................................................403
Configuring ARP Retries...............................................................................................................................................404
ICMP............................................................................................................................................................................... 404
Configuration Tasks for ICMP..................................................................................................................................... 404
Enabling ICMP Unreachable Messages......................................................................................................................404
UDP Helper.................................................................................................................................................................... 405
Configure UDP Helper............................................................................................................................................ 405
Important Points to Remember.............................................................................................................................405
Enabling UDP Helper.....................................................................................................................................................405
Configuring a Broadcast Address................................................................................................................................406
Configurations Using UDP Helper...............................................................................................................................406
UDP Helper with Broadcast-All Addresses................................................................................................................ 406
UDP Helper with Subnet Broadcast Addresses........................................................................................................ 407
UDP Helper with Configured Broadcast Addresses..................................................................................................407
UDP Helper with No Configured Broadcast Addresses........................................................................................... 408
Troubleshooting UDP Helper....................................................................................................................................... 408
21 IPv6 Routing............................................................................................................................................ 409
Protocol Overview.........................................................................................................................................................409
Extended Address Space........................................................................................................................................ 410
Stateless Autoconfiguration....................................................................................................................................410
IPv6 Headers............................................................................................................................................................ 410
Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support....................................................................411
IPv6 Header Fields................................................................................................................................................... 412
Extension Header Fields.......................................................................................................................................... 414
Addressing.................................................................................................................................................................415
Implementing IPv6 with Dell Networking OS..............................................................................................................416
ICMPv6............................................................................................................................................................................417
Path MTU Discovery......................................................................................................................................................418
IPv6 Neighbor Discovery...............................................................................................................................................418
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................419
Configuring the IPv6 Recursive DNS Server........................................................................................................419
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................420
Displaying IPv6 RDNSS Information..................................................................................................................... 420
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 421
Configuration Tasks for IPv6........................................................................................................................................ 421
Adjusting Your CAM-Profile....................................................................................................................................421
Assigning an IPv6 Address to an Interface...........................................................................................................422
Assigning a Static IPv6 Route................................................................................................................................423
Configuring Telnet with IPv6................................................................................................................................. 423
SNMP over IPv6......................................................................................................................................................423
Displaying IPv6 Information....................................................................................................................................424
Displaying an IPv6 Interface Information..............................................................................................................424
Contents
15
Showing IPv6 Routes..............................................................................................................................................425
Showing the Running-Configuration for an Interface.........................................................................................426
Clearing IPv6 Routes...............................................................................................................................................427
Configuring IPv6 RA Guard.......................................................................................................................................... 427
Configuring IPv6 RA Guard on an Interface.........................................................................................................429
Monitoring IPv6 RA Guard..................................................................................................................................... 429
22 iSCSI Optimization.................................................................................................................................. 430
iSCSI Optimization Overview.......................................................................................................................................430
Monitoring iSCSI Traffic Flows..............................................................................................................................432
Application of Quality of Service to iSCSI Traffic Flows.................................................................................... 432
Information Monitored in iSCSI Traffic Flows......................................................................................................432
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................... 433
Configuring Detection and Ports for Dell Compellent Arrays............................................................................ 433
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer...............................................................434
Enable and Disable iSCSI Optimization................................................................................................................. 434
Default iSCSI Optimization Values.............................................................................................................................. 435
iSCSI Optimization Prerequisites.................................................................................................................................435
Configuring iSCSI Optimization................................................................................................................................... 435
Displaying iSCSI Optimization Information................................................................................................................. 437
23 Intermediate System to Intermediate System..........................................................................................439
IS-IS Protocol Overview............................................................................................................................................... 439
IS-IS Addressing.............................................................................................................................................................439
Multi-Topology IS-IS..................................................................................................................................................... 440
Transition Mode.......................................................................................................................................................440
Interface Support..................................................................................................................................................... 441
Adjacencies................................................................................................................................................................441
Graceful Restart............................................................................................................................................................. 441
Timers........................................................................................................................................................................ 441
Implementation Information.......................................................................................................................................... 441
Configuration Information.............................................................................................................................................442
Configuration Tasks for IS-IS.................................................................................................................................443
Configuring the Distance of a Route.................................................................................................................... 450
Changing the IS-Type..............................................................................................................................................451
Redistributing IPv4 Routes.....................................................................................................................................453
Redistributing IPv6 Routes.....................................................................................................................................454
Configuring Authentication Passwords................................................................................................................ 455
Setting the Overload Bit.........................................................................................................................................455
Debugging IS-IS.......................................................................................................................................................456
IS-IS Metric Styles.........................................................................................................................................................457
Configure Metric Values............................................................................................................................................... 457
Maximum Values in the Routing Table..................................................................................................................458
Change the IS-IS Metric Style in One Level Only............................................................................................... 458
Leaks from One Level to Another......................................................................................................................... 459
Sample Configurations..................................................................................................................................................460
16
Contents
24 Link Aggregation Control Protocol (LACP)..............................................................................................463
Introduction to Dynamic LAGs and LACP.................................................................................................................. 463
Important Points to Remember.............................................................................................................................463
LACP Modes............................................................................................................................................................ 464
Configuring LACP Commands...............................................................................................................................464
LACP Configuration Tasks........................................................................................................................................... 465
Creating a LAG........................................................................................................................................................ 465
Configuring the LAG Interfaces as Dynamic........................................................................................................465
Setting the LACP Long Timeout........................................................................................................................... 466
Monitoring and Debugging LACP..........................................................................................................................466
Shared LAG State Tracking..........................................................................................................................................467
Configuring Shared LAG State Tracking.............................................................................................................. 467
Important Points about Shared LAG State Tracking..........................................................................................469
LACP Basic Configuration Example............................................................................................................................ 469
Configure a LAG on ALPHA...................................................................................................................................469
25 Layer 2.....................................................................................................................................................478
Manage the MAC Address Table.................................................................................................................................478
Clearing the MAC Address Table...........................................................................................................................478
Setting the Aging Time for Dynamic Entries........................................................................................................478
Configuring a Static MAC Address........................................................................................................................479
Displaying the MAC Address Table....................................................................................................................... 479
MAC Learning Limit.......................................................................................................................................................479
Setting the MAC Learning Limit............................................................................................................................480
mac learning-limit Dynamic.................................................................................................................................... 480
mac learning-limit mac-address-sticky................................................................................................................. 480
mac learning-limit station-move............................................................................................................................. 481
mac learning-limit no-station-move....................................................................................................................... 481
Learning Limit Violation Actions............................................................................................................................. 481
Setting Station Move Violation Actions................................................................................................................482
Recovering from Learning Limit and Station Move Violations...........................................................................482
Disabling MAC Address Learning on the System................................................................................................ 483
NIC Teaming...................................................................................................................................................................483
Configure Redundant Pairs.......................................................................................................................................... 484
Important Points about Configuring Redundant Pairs........................................................................................486
Far-End Failure Detection.............................................................................................................................................487
FEFD State Changes...............................................................................................................................................488
Configuring FEFD.................................................................................................................................................... 489
Enabling FEFD on an Interface.............................................................................................................................. 489
Debugging FEFD......................................................................................................................................................490
26 Link Layer Discovery Protocol (LLDP).....................................................................................................492
802.1AB (LLDP) Overview........................................................................................................................................... 492
Protocol Data Units.................................................................................................................................................492
Optional TLVs.................................................................................................................................................................493
Contents
17
Management TLVs..................................................................................................................................................493
TIA-1057 (LLDP-MED) Overview............................................................................................................................... 495
TIA Organizationally Specific TLVs....................................................................................................................... 495
Configure LLDP............................................................................................................................................................. 499
Related Configuration Tasks..................................................................................................................................499
Important Points to Remember.............................................................................................................................499
LLDP Compatibility..................................................................................................................................................500
CONFIGURATION versus INTERFACE Configurations........................................................................................... 500
Enabling LLDP................................................................................................................................................................500
Disabling and Undoing LLDP...................................................................................................................................501
Enabling LLDP on Management Ports........................................................................................................................ 501
Disabling and Undoing LLDP on Management Ports...........................................................................................501
Advertising TLVs............................................................................................................................................................ 501
Viewing the LLDP Configuration.................................................................................................................................503
Viewing Information Advertised by Adjacent LLDP Agents.....................................................................................503
Configuring LLDPDU Intervals.....................................................................................................................................504
Configuring Transmit and Receive Mode...................................................................................................................505
Configuring the Time to Live Value.............................................................................................................................505
Debugging LLDP............................................................................................................................................................506
Relevant Management Objects................................................................................................................................... 507
27 Microsoft Network Load Balancing.......................................................................................................... 512
NLB Unicast Mode Scenario.........................................................................................................................................512
NLB Multicast Mode Scenario......................................................................................................................................512
Limitations of the NLB Feature.................................................................................................................................... 513
Microsoft Clustering...................................................................................................................................................... 513
Enable and Disable VLAN Flooding ............................................................................................................................. 513
Configuring a Switch for NLB ..................................................................................................................................... 513
Enabling a Switch for Multicast NLB.....................................................................................................................514
28 Multicast Source Discovery Protocol (MSDP)......................................................................................... 515
Protocol Overview......................................................................................................................................................... 515
Anycast RP..................................................................................................................................................................... 516
Implementation Information.......................................................................................................................................... 517
Configure Multicast Source Discovery Protocol........................................................................................................ 517
Related Configuration Tasks...................................................................................................................................517
Enable MSDP..................................................................................................................................................................521
Manage the Source-Active Cache..............................................................................................................................522
Viewing the Source-Active Cache........................................................................................................................ 522
Limiting the Source-Active Cache........................................................................................................................ 522
Clearing the Source-Active Cache........................................................................................................................523
Enabling the Rejected Source-Active Cache.......................................................................................................523
Accept Source-Active Messages that Fail the RFP Check..................................................................................... 523
Specifying Source-Active Messages.......................................................................................................................... 526
Limiting the Source-Active Messages from a Peer.................................................................................................. 527
Preventing MSDP from Caching a Local Source...................................................................................................... 527
18
Contents
Preventing MSDP from Caching a Remote Source..................................................................................................528
Preventing MSDP from Advertising a Local Source.................................................................................................528
Logging Changes in Peership States.......................................................................................................................... 529
Terminating a Peership.................................................................................................................................................529
Clearing Peer Statistics................................................................................................................................................ 530
Debugging MSDP..........................................................................................................................................................530
MSDP with Anycast RP................................................................................................................................................ 531
Configuring Anycast RP................................................................................................................................................532
Reducing Source-Active Message Flooding........................................................................................................ 533
Specifying the RP Address Used in SA Messages..............................................................................................533
MSDP Sample Configurations..................................................................................................................................... 535
29 Multiple Spanning Tree Protocol (MSTP)................................................................................................538
Protocol Overview.........................................................................................................................................................538
Spanning Tree Variations..............................................................................................................................................539
Implementation Information................................................................................................................................... 539
Configure Multiple Spanning Tree Protocol...............................................................................................................539
Related Configuration Tasks..................................................................................................................................540
Enable Multiple Spanning Tree Globally......................................................................................................................540
Adding and Removing Interfaces................................................................................................................................ 540
Creating Multiple Spanning Tree Instances................................................................................................................ 541
Influencing MSTP Root Selection............................................................................................................................... 542
Interoperate with Non-Dell Bridges.............................................................................................................................543
Changing the Region Name or Revision.....................................................................................................................543
Modifying Global Parameters.......................................................................................................................................543
Modifying the Interface Parameters...........................................................................................................................545
Configuring an EdgePort..............................................................................................................................................546
Flush MAC Addresses after a Topology Change...................................................................................................... 546
MSTP Sample Configurations......................................................................................................................................547
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration.......................................................................................547
Debugging and Verifying MSTP Configurations........................................................................................................ 551
30 Multicast Features...................................................................................................................................553
Enabling IP Multicast.....................................................................................................................................................553
Implementation Information......................................................................................................................................... 553
Multicast Policies...........................................................................................................................................................554
IPv4 Multicast Policies............................................................................................................................................554
Understanding Multicast Traceroute (mtrace)..........................................................................................................561
Important Points to Remember.............................................................................................................................562
Printing Multicast Traceroute (mtrace) Paths..........................................................................................................562
Supported Error Codes.................................................................................................................................................563
mtrace Scenarios...........................................................................................................................................................564
31 Object Tracking........................................................................................................................................570
Object Tracking Overview............................................................................................................................................570
Contents
19
Track Layer 2 Interfaces..........................................................................................................................................571
Track Layer 3 Interfaces..........................................................................................................................................571
Track IPv4 and IPv6 Routes...................................................................................................................................572
Set Tracking Delays.................................................................................................................................................573
VRRP Object Tracking............................................................................................................................................573
Object Tracking Configuration.....................................................................................................................................573
Tracking a Layer 2 Interface...................................................................................................................................573
Tracking a Layer 3 Interface...................................................................................................................................574
Track an IPv4/IPv6 Route......................................................................................................................................576
Displaying Tracked Objects.......................................................................................................................................... 579
32 Open Shortest Path First (OSPFv2 and OSPFv3)....................................................................................581
Protocol Overview......................................................................................................................................................... 581
Autonomous System (AS) Areas........................................................................................................................... 581
Area Types................................................................................................................................................................582
Networks and Neighbors........................................................................................................................................583
Router Types............................................................................................................................................................583
Designated and Backup Designated Routers.......................................................................................................585
Link-State Advertisements (LSAs).......................................................................................................................585
Router Priority and Cost.........................................................................................................................................586
OSPF with Dell Networking OS...................................................................................................................................587
Graceful Restart...................................................................................................................................................... 588
Fast Convergence (OSPFv2, IPv4 Only)............................................................................................................. 589
Multi-Process OSPFv2 with VRF..........................................................................................................................589
RFC-2328 Compliant OSPF Flooding...................................................................................................................589
OSPF ACK Packing.................................................................................................................................................590
Setting OSPF Adjacency with Cisco Routers......................................................................................................590
Configuration Information............................................................................................................................................. 591
Configuration Task List for OSPFv2 (OSPF for IPv4)........................................................................................591
Configuration Task List for OSPFv3 (OSPF for IPv6).............................................................................................605
Enabling IPv6 Unicast Routing.............................................................................................................................. 606
Applying cost for OSPFv3......................................................................................................................................606
Assigning IPv6 Addresses on an Interface...........................................................................................................606
Assigning Area ID on an Interface..........................................................................................................................607
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................607
Assigning OSPFv3 Process ID and Router ID to a VRF..................................................................................... 608
Configuring Stub Areas...........................................................................................................................................608
Configuring Passive-Interface............................................................................................................................... 608
Redistributing Routes............................................................................................................................................. 609
Configuring a Default Route.................................................................................................................................. 609
Enabling OSPFv3 Graceful Restart....................................................................................................................... 610
OSPFv3 Authentication Using IPsec..................................................................................................................... 612
Troubleshooting OSPFv3........................................................................................................................................618
33 Policy-based Routing (PBR)....................................................................................................................620
Overview........................................................................................................................................................................ 620
20
Contents
/