PowerSwitch S4048-ON

Dell PowerSwitch S4048-ON User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4048-ON User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S4048–ON
System
9.11(0.0)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 01
Rev. A00
Contents
1 About this Guide...........................................................................................................................................36
Audience........................................................................................................................................................................... 36
Conventions......................................................................................................................................................................36
Related Documents......................................................................................................................................................... 36
2 Configuration Fundamentals........................................................................................................................ 37
Accessing the Command Line........................................................................................................................................37
CLI Modes.........................................................................................................................................................................37
Navigating CLI Modes...............................................................................................................................................39
The do Command............................................................................................................................................................ 42
Undoing Commands........................................................................................................................................................ 42
Obtaining Help..................................................................................................................................................................43
Entering and Editing Commands................................................................................................................................... 43
Command History............................................................................................................................................................44
Filtering show Command Outputs.................................................................................................................................44
Example of the grep Keyword..................................................................................................................................44
Multiple Users in Configuration Mode...........................................................................................................................45
3 Getting Started........................................................................................................................................... 46
Console Access................................................................................................................................................................ 47
Serial Console............................................................................................................................................................. 47
Accessing the CLI Interface and Running Scripts Using SSH................................................................................... 48
Entering CLI commands Using an SSH Connection..............................................................................................48
Executing Local CLI Scripts Using an SSH Connection........................................................................................48
Default Configuration...................................................................................................................................................... 49
Configuring a Host Name............................................................................................................................................... 49
Accessing the System Remotely................................................................................................................................... 49
Accessing the System Remotely............................................................................................................................. 49
Configure the Management Port IP Address.........................................................................................................50
Configure a Management Route............................................................................................................................. 50
Configuring a Username and Password..................................................................................................................50
Configuring the Enable Password.................................................................................................................................. 51
Configuration File Management..................................................................................................................................... 51
Copy Files to and from the System..........................................................................................................................51
Mounting an NFS File System..................................................................................................................................52
Save the Running-Configuration............................................................................................................................. 54
Configure the Overload Bit for a Startup Scenario...............................................................................................54
Viewing Files...............................................................................................................................................................54
Compressing Configuration Files.............................................................................................................................55
Managing the File System.............................................................................................................................................. 58
Enabling Software Features on Devices Using a Command Option.........................................................................58
View Command History.................................................................................................................................................. 59
Contents
3
Upgrading Dell Networking OS......................................................................................................................................59
Verify Software Images Before Installation..................................................................................................................59
Using HTTP for File Transfers....................................................................................................................................... 60
4 Management............................................................................................................................................... 62
Configuring Privilege Levels........................................................................................................................................... 62
Creating a Custom Privilege Level...........................................................................................................................63
Removing a Command from EXEC Mode..............................................................................................................63
Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 63
Allowing Access to CONFIGURATION Mode Commands................................................................................... 63
Allowing Access to Different Modes.......................................................................................................................63
Applying a Privilege Level to a Username...............................................................................................................65
Applying a Privilege Level to a Terminal Line......................................................................................................... 65
Configuring Logging........................................................................................................................................................ 65
Audit and Security Logs............................................................................................................................................66
Configuring Logging Format .................................................................................................................................. 68
Display the Logging Buffer and the Logging Configuration................................................................................. 68
Setting Up a Secure Connection to a Syslog Server............................................................................................ 69
Sending System Messages to a Syslog Server......................................................................................................70
Track Login Activity.........................................................................................................................................................70
Restrictions for Tracking Login Activity..................................................................................................................70
Configuring Login Activity Tracking........................................................................................................................ 70
Display Login Statistics.............................................................................................................................................. 71
Limit Concurrent Login Sessions....................................................................................................................................72
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 72
Configuring Concurrent Session Limit.....................................................................................................................73
Enabling the System to Clear Existing Sessions.................................................................................................... 73
Enabling Secured CLI Mode........................................................................................................................................... 74
Log Messages in the Internal Buffer............................................................................................................................. 74
Configuration Task List for System Log Management......................................................................................... 74
Disabling System Logging............................................................................................................................................... 74
Sending System Messages to a Syslog Server............................................................................................................75
Configuring a UNIX System as a Syslog Server.....................................................................................................75
Changing System Logging Settings.............................................................................................................................. 75
Display the Logging Buffer and the Logging Configuration....................................................................................... 76
Configuring a UNIX Logging Facility Level....................................................................................................................77
Synchronizing Log Messages.........................................................................................................................................78
Enabling Timestamp on Syslog Messages.................................................................................................................... 78
File Transfer Services......................................................................................................................................................79
Configuration Task List for File Transfer Services................................................................................................ 79
Enabling the FTP Server...........................................................................................................................................79
Configuring FTP Server Parameters....................................................................................................................... 79
Configuring FTP Client Parameters........................................................................................................................ 80
Terminal Lines.................................................................................................................................................................. 80
Denying and Permitting Access to a Terminal Line................................................................................................81
Configuring Login Authentication for Terminal Lines............................................................................................82
4
Contents
Setting Timeout for EXEC Privilege Mode...................................................................................................................83
Using Telnet to get to Another Network Device.........................................................................................................83
Lock CONFIGURATION Mode.......................................................................................................................................84
Viewing the Configuration Lock Status.................................................................................................................. 84
Reloading the system......................................................................................................................................................84
Restoring the Factory Default Settings........................................................................................................................85
Important Points to Remember............................................................................................................................... 85
Restoring Factory Default Environment Variables................................................................................................ 86
5 802.1X......................................................................................................................................................... 88
Port-Authentication Process......................................................................................................................................... 90
EAP over RADIUS......................................................................................................................................................90
Configuring 802.1X...........................................................................................................................................................91
Related Configuration Tasks.....................................................................................................................................91
Important Points to Remember......................................................................................................................................91
Enabling 802.1X................................................................................................................................................................92
Configuring dot1x Profile ................................................................................................................................................93
Configuring MAC addresses for a do1x Profile............................................................................................................ 94
Configuring the Static MAB and MAB Profile .............................................................................................................94
Configuring Critical VLAN ..............................................................................................................................................95
Configuring Request Identity Re-Transmissions..........................................................................................................96
Configuring a Quiet Period after a Failed Authentication.....................................................................................96
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 97
Re-Authenticating a Port................................................................................................................................................98
Configuring Timeouts......................................................................................................................................................99
Configuring Dynamic VLAN Assignment with Port Authentication.........................................................................100
Guest and Authentication-Fail VLANs..........................................................................................................................101
Configuring a Guest VLAN.......................................................................................................................................101
Configuring an Authentication-Fail VLAN..............................................................................................................101
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)................................. 103
Optimizing CAM Utilization During the Attachment of ACLs to VLANs.................................................................103
Guidelines for Configuring ACL VLAN Groups........................................................................................................... 104
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.............................................. 104
Configuring ACL VLAN Groups..............................................................................................................................104
Configuring FP Blocks for VLAN Parameters...................................................................................................... 105
Viewing CAM Usage...................................................................................................................................................... 106
Allocating FP Blocks for VLAN Processes.................................................................................................................. 107
Unified Forwarding Table (UFT) Modes..................................................................................................................... 108
Configuring UFT Modes.......................................................................................................................................... 108
7 Access Control Lists (ACLs)....................................................................................................................... 110
IP Access Control Lists (ACLs)......................................................................................................................................111
CAM Usage................................................................................................................................................................112
Implementing ACLs on Dell Networking OS.......................................................................................................... 112
Important Points to Remember.....................................................................................................................................114
Contents
5
Configuration Task List for Route Maps................................................................................................................114
Configuring Match Routes.......................................................................................................................................116
Configuring Set Conditions...................................................................................................................................... 117
Configure a Route Map for Route Redistribution.................................................................................................118
Configure a Route Map for Route Tagging........................................................................................................... 119
Continue Clause........................................................................................................................................................ 119
IP Fragment Handling.................................................................................................................................................... 120
IP Fragments ACL Examples.................................................................................................................................. 120
Layer 4 ACL Rules Examples.................................................................................................................................. 120
Configure a Standard IP ACL........................................................................................................................................ 121
Configuring a Standard IP ACL Filter.....................................................................................................................122
Configure an Extended IP ACL.....................................................................................................................................123
Configuring Filters with a Sequence Number.......................................................................................................123
Configuring Filters Without a Sequence Number................................................................................................ 124
Configure Layer 2 and Layer 3 ACLs...........................................................................................................................125
Assign an IP ACL to an Interface................................................................................................................................. 126
Applying an IP ACL.........................................................................................................................................................126
Counting ACL Hits....................................................................................................................................................127
Configure Ingress ACLs................................................................................................................................................. 127
Configure Egress ACLs..................................................................................................................................................127
Applying Egress Layer 3 ACLs (Control-Plane)................................................................................................... 128
IP Prefix Lists..................................................................................................................................................................129
Implementation Information....................................................................................................................................129
Configuration Task List for Prefix Lists................................................................................................................. 129
ACL Resequencing.........................................................................................................................................................133
Resequencing an ACL or Prefix List...................................................................................................................... 133
Route Maps.....................................................................................................................................................................135
Implementation Information....................................................................................................................................135
Logging of ACL Processes............................................................................................................................................135
Guidelines for Configuring ACL Logging............................................................................................................... 136
Configuring ACL Logging........................................................................................................................................ 136
Flow-Based Monitoring Support for ACLs..................................................................................................................137
Behavior of Flow-Based Monitoring...................................................................................................................... 137
Enabling Flow-Based Monitoring............................................................................................................................139
Configuring UDF ACL.................................................................................................................................................... 140
Configuring IP Mirror Access Group............................................................................................................................142
Sample Configuration...............................................................................................................................................143
Example of viewing IP mirror–access–group applied to an Interface...............................................................143
8 Bidirectional Forwarding Detection (BFD)..................................................................................................144
How BFD Works.............................................................................................................................................................144
BFD Packet Format................................................................................................................................................. 145
BFD Sessions............................................................................................................................................................ 146
BFD Three-Way Handshake....................................................................................................................................147
Session State Changes............................................................................................................................................149
Important Points to Remember....................................................................................................................................149
6
Contents
Configure BFD................................................................................................................................................................ 149
Configure BFD for Physical Ports..........................................................................................................................150
Configure BFD for Static Routes............................................................................................................................151
Configure BFD for OSPF.........................................................................................................................................154
Configure BFD for OSPFv3.................................................................................................................................... 157
Configure BFD for IS-IS...........................................................................................................................................158
Configure BFD for BGP...........................................................................................................................................160
Configure BFD for VRRP.........................................................................................................................................167
Configuring Protocol Liveness................................................................................................................................170
Troubleshooting BFD............................................................................................................................................... 170
9 Border Gateway Protocol IPv4 (BGPv4).................................................................................................... 172
Autonomous Systems (AS)...........................................................................................................................................172
Sessions and Peers.........................................................................................................................................................174
Establish a Session................................................................................................................................................... 174
Route Reflectors............................................................................................................................................................ 175
BGP Attributes................................................................................................................................................................176
Best Path Selection Criteria.................................................................................................................................... 177
Weight........................................................................................................................................................................178
Local Preference.......................................................................................................................................................178
Multi-Exit Discriminators (MEDs)...........................................................................................................................179
Origin..........................................................................................................................................................................180
AS Path...................................................................................................................................................................... 181
Next Hop....................................................................................................................................................................181
Multiprotocol BGP.......................................................................................................................................................... 181
Implement BGP with Dell Networking OS...................................................................................................................182
Additional Path (Add-Path) Support..................................................................................................................... 182
Advertise IGP Cost as MED for Redistributed Routes........................................................................................182
Ignore Router-ID in Best-Path Calculation............................................................................................................183
Four-Byte AS Numbers........................................................................................................................................... 183
AS4 Number Representation..................................................................................................................................183
AS Number Migration.............................................................................................................................................. 185
BGP4 Management Information Base (MIB)....................................................................................................... 186
Important Points to Remember..............................................................................................................................186
Configuration Information............................................................................................................................................. 187
BGP Configuration......................................................................................................................................................... 187
Enabling BGP............................................................................................................................................................ 188
Configuring AS4 Number Representations............................................................................................................191
Configuring Peer Groups.........................................................................................................................................193
Configuring BGP Fast Fall-Over.............................................................................................................................195
Configuring Passive Peering................................................................................................................................... 197
Maintaining Existing AS Numbers During an AS Migration.................................................................................197
Allowing an AS Number to Appear in its Own AS Path.......................................................................................198
Enabling Graceful Restart....................................................................................................................................... 199
Enabling Neighbor Graceful Restart..................................................................................................................... 200
Filtering on an AS-Path Attribute..........................................................................................................................200
Contents
7
Regular Expressions as Filters................................................................................................................................202
Redistributing Routes..............................................................................................................................................203
Enabling Additional Paths....................................................................................................................................... 204
Configuring IP Community Lists............................................................................................................................ 204
Configuring an IP Extended Community List.......................................................................................................205
Filtering Routes with Community Lists.................................................................................................................206
Manipulating the COMMUNITY Attribute............................................................................................................207
Changing MED Attributes...................................................................................................................................... 208
Changing the LOCAL_PREFERENCE Attribute................................................................................................. 208
Configuring the local System or a Different System to be the Next Hop for BGP-Learned Routes...........209
Changing the WEIGHT Attribute........................................................................................................................... 210
Enabling Multipath....................................................................................................................................................210
Filtering BGP Routes............................................................................................................................................... 210
Filtering BGP Routes Using Route Maps.............................................................................................................. 212
Filtering BGP Routes Using AS-PATH Information............................................................................................. 212
Configuring BGP Route Reflectors........................................................................................................................213
Aggregating Routes................................................................................................................................................. 214
Configuring BGP Confederations...........................................................................................................................214
Enabling Route Flap Dampening.............................................................................................................................215
Changing BGP Timers..............................................................................................................................................217
Enabling BGP Neighbor Soft-Reconfiguration..................................................................................................... 217
Enabling or disabling BGP neighbors..................................................................................................................... 218
Route Map Continue...............................................................................................................................................220
Enabling MBGP Configurations................................................................................................................................... 220
BGP Regular Expression Optimization.........................................................................................................................221
Debugging BGP.............................................................................................................................................................. 221
Storing Last and Bad PDUs....................................................................................................................................222
Capturing PDUs....................................................................................................................................................... 223
PDU Counters..........................................................................................................................................................224
Sample Configurations..................................................................................................................................................224
10 Content Addressable Memory (CAM).......................................................................................................231
CAM Allocation............................................................................................................................................................... 231
Test CAM Usage........................................................................................................................................................... 233
View CAM-ACL Settings..............................................................................................................................................233
View CAM Usage...........................................................................................................................................................235
CAM Optimization.........................................................................................................................................................235
Troubleshoot CAM Profiling.........................................................................................................................................235
QoS CAM Region Limitation.................................................................................................................................. 235
11 Control Plane Policing (CoPP)..................................................................................................................237
Configure Control Plane Policing.................................................................................................................................238
Configuring CoPP for Protocols............................................................................................................................239
Configuring CoPP for CPU Queues.......................................................................................................................241
CoPP for OSPFv3 Packets.................................................................................................................................... 242
Configuring CoPP for OSPFv3..............................................................................................................................245
8
Contents
Displaying CoPP Configuration .............................................................................................................................245
12 Data Center Bridging (DCB).....................................................................................................................248
Ethernet Enhancements in Data Center Bridging.....................................................................................................248
Priority-Based Flow Control...................................................................................................................................249
Enhanced Transmission Selection.........................................................................................................................250
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................251
Data Center Bridging in a Traffic Flow................................................................................................................. 252
Enabling Data Center Bridging.....................................................................................................................................252
DCB Maps and its Attributes................................................................................................................................. 253
Data Center Bridging: Default Configuration.............................................................................................................254
Configuring Priority-Based Flow Control....................................................................................................................254
Configuring Lossless Queues.................................................................................................................................255
Configuring PFC in a DCB Map...................................................................................................................................256
PFC Configuration Notes....................................................................................................................................... 256
PFC Prerequisites and Restrictions.......................................................................................................................257
Applying a DCB Map on a Port.................................................................................................................................... 257
Configuring PFC without a DCB Map.........................................................................................................................258
Configuring Lossless QueuesExample:................................................................................................................. 258
Priority-Based Flow Control Using Dynamic Buffer Method...................................................................................260
Pause and Resume of Traffic.................................................................................................................................260
Buffer Sizes for Lossless or PFC Packets............................................................................................................260
Behavior of Tagged Packets.........................................................................................................................................261
Configuration Example for DSCP and PFC Priorities................................................................................................ 261
Using PFC to Manage Converged Ethernet Traffic................................................................................................. 262
Configure Enhanced Transmission Selection.............................................................................................................262
ETS Prerequisites and Restrictions.......................................................................................................................262
Creating an ETS Priority Group............................................................................................................................. 262
ETS Operation with DCBx......................................................................................................................................264
Configuring Bandwidth Allocation for DCBx CIN................................................................................................ 264
Configuring ETS in a DCB Map............................................................................................................................. 265
Hierarchical Scheduling in ETS Output Policies.........................................................................................................266
Using ETS to Manage Converged Ethernet Traffic..................................................................................................267
Applying DCB Policies in a Switch Stack....................................................................................................................267
Configure a DCBx Operation........................................................................................................................................267
DCBx Operation.......................................................................................................................................................267
DCBx Port Roles......................................................................................................................................................268
DCB Configuration Exchange................................................................................................................................ 269
Configuration Source Election............................................................................................................................... 269
Propagation of DCB Information........................................................................................................................... 270
Auto-Detection and Manual Configuration of the DCBx Version......................................................................270
DCBx Example.......................................................................................................................................................... 271
DCBx Prerequisites and Restrictions..................................................................................................................... 271
Configuring DCBx.....................................................................................................................................................271
Verifying the DCB Configuration................................................................................................................................. 275
QoS dot1p Traffic Classification and Queue Assignment.........................................................................................284
Contents
9
Configuring the Dynamic Buffer Method...................................................................................................................285
Sample DCB Configuration...........................................................................................................................................286
PFC and ETS Configuration Command Examples.............................................................................................. 288
13 Dynamic Host Configuration Protocol (DHCP)........................................................................................ 289
DHCP Packet Format and Options.............................................................................................................................289
Assign an IP Address using DHCP............................................................................................................................... 291
Implementation Information......................................................................................................................................... 292
Configure the System to be a DHCP Server............................................................................................................. 292
Configuring the Server for Automatic Address Allocation................................................................................. 293
Specifying a Default Gateway................................................................................................................................294
Configure a Method of Hostname Resolution..................................................................................................... 294
Using DNS for Address Resolution........................................................................................................................294
Using NetBIOS WINS for Address Resolution.....................................................................................................295
Creating Manual Binding Entries........................................................................................................................... 295
Debugging the DHCP Server.................................................................................................................................295
Using DHCP Clear Commands.............................................................................................................................. 296
Configure the System to be a Relay Agent................................................................................................................296
Configure the System to be a DHCP Client...............................................................................................................298
Configuring the DHCP Client System...................................................................................................................298
DHCP Client on a Management Interface............................................................................................................299
DHCP Client Operation with Other Features...................................................................................................... 300
Configure the System for User Port Stacking (Option 230)................................................................................... 301
Configure Secure DHCP............................................................................................................................................... 301
Option 82...................................................................................................................................................................301
DHCP Snooping.......................................................................................................................................................302
Drop DHCP Packets on Snooped VLANs Only................................................................................................... 305
Dynamic ARP Inspection........................................................................................................................................ 306
Configuring Dynamic ARP Inspection................................................................................................................... 307
Source Address Validation............................................................................................................................................308
Enabling IP Source Address Validation................................................................................................................. 308
DHCP MAC Source Address Validation................................................................................................................309
Enabling IP+MAC Source Address Validation......................................................................................................309
Viewing the Number of SAV Dropped Packets....................................................................................................310
Clearing the Number of SAV Dropped Packets................................................................................................... 310
14 Equal Cost Multi-Path (ECMP)................................................................................................................. 311
ECMP for Flow-Based Affinity......................................................................................................................................311
Configuring the Hash Algorithm..............................................................................................................................311
Enabling Deterministic ECMP Next Hop................................................................................................................311
Configuring the Hash Algorithm Seed................................................................................................................... 312
Link Bundle Monitoring..................................................................................................................................................312
Managing ECMP Group Paths............................................................................................................................... 313
Creating an ECMP Group Bundle...........................................................................................................................313
Modifying the ECMP Group Threshold................................................................................................................. 313
RTAG7..............................................................................................................................................................................314
10
Contents
Flow-based Hashing for ECMP....................................................................................................................................315
15 FIP Snooping............................................................................................................................................ 318
Fibre Channel over Ethernet.........................................................................................................................................318
Ensure Robustness in a Converged Ethernet Network............................................................................................ 318
FIP Snooping on Ethernet Bridges..............................................................................................................................320
FIP Snooping in a Switch Stack...................................................................................................................................322
Using FIP Snooping....................................................................................................................................................... 322
FIP Snooping Prerequisites.................................................................................................................................... 322
Important Points to Remember............................................................................................................................. 322
Enabling the FCoE Transit Feature....................................................................................................................... 323
Enable FIP Snooping on VLANs.............................................................................................................................324
Configure the FC-MAP Value................................................................................................................................ 324
Configure a Port for a Bridge-to-Bridge Link.......................................................................................................324
Configure a Port for a Bridge-to-FCF Link.......................................................................................................... 324
Impact on Other Software Features.....................................................................................................................324
FIP Snooping Restrictions...................................................................................................................................... 325
Configuring FIP Snooping.......................................................................................................................................325
Displaying FIP Snooping Information...........................................................................................................................326
FCoE Transit Configuration Example...........................................................................................................................331
16 Flex Hash and Optimized Boot-Up........................................................................................................... 333
Flex Hash Capability Overview.................................................................................................................................... 333
Configuring the Flex Hash Mechanism.......................................................................................................................333
Configuring Fast Boot and LACP Fast Switchover...................................................................................................334
Optimizing the Boot Time.............................................................................................................................................334
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................334
Guidelines for Configuring Optimized Booting Mechanism............................................................................... 335
Interoperation of Applications with Fast Boot and System States.........................................................................336
LACP and IPv4 Routing.......................................................................................................................................... 336
LACP and IPv6 Routing..........................................................................................................................................336
BGP Graceful Restart............................................................................................................................................. 337
Cold Boot Caused by Power Cycling the System............................................................................................... 337
Unexpected Reload of the System........................................................................................................................337
Software Upgrade................................................................................................................................................... 337
LACP Fast Switchover............................................................................................................................................337
Changes to BGP Multipath.................................................................................................................................... 338
Delayed Installation of ECMP Routes Into BGP.................................................................................................. 338
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 338
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.....................................................................................339
17 FIPS Cryptography...................................................................................................................................340
Configuration Tasks...................................................................................................................................................... 340
Preparing the System................................................................................................................................................... 340
Enabling FIPS Mode.......................................................................................................................................................341
Generating Host-Keys................................................................................................................................................... 341
Contents
11
Monitoring FIPS Mode Status...................................................................................................................................... 341
Disabling FIPS Mode..................................................................................................................................................... 342
18 Force10 Resilient Ring Protocol (FRRP)...................................................................................................343
Protocol Overview.........................................................................................................................................................343
Ring Status...............................................................................................................................................................344
Multiple FRRP Rings................................................................................................................................................344
Important FRRP Points...........................................................................................................................................345
Important FRRP Concepts.....................................................................................................................................346
Implementing FRRP.......................................................................................................................................................347
FRRP Configuration.......................................................................................................................................................347
Creating the FRRP Group.......................................................................................................................................347
Configuring the Control VLAN...............................................................................................................................348
Configuring and Adding the Member VLANs.......................................................................................................349
Setting the FRRP Timers....................................................................................................................................... 350
Clearing the FRRP Counters..................................................................................................................................350
Viewing the FRRP Configuration.......................................................................................................................... 350
Viewing the FRRP Information.............................................................................................................................. 350
Troubleshooting FRRP...................................................................................................................................................351
Configuration Checks.............................................................................................................................................. 351
Sample Configuration and Topology............................................................................................................................351
FRRP Support on VLT.................................................................................................................................................. 352
Example Scenario.................................................................................................................................................... 353
Important Points to Remember.............................................................................................................................354
19 GARP VLAN Registration Protocol (GVRP)............................................................................................. 355
Important Points to Remember...................................................................................................................................355
Configure GVRP............................................................................................................................................................ 356
Related Configuration Tasks..................................................................................................................................356
Enabling GVRP Globally................................................................................................................................................ 357
Enabling GVRP on a Layer 2 Interface........................................................................................................................357
Configure GVRP Registration...................................................................................................................................... 357
Configure a GARP Timer.............................................................................................................................................. 358
RPM Redundancy..........................................................................................................................................................358
20 High Availability (HA).............................................................................................................................. 360
Component Redundancy..............................................................................................................................................360
Automatic and Manual Stack Unit Failover..........................................................................................................360
Synchronization between Management and Standby Units.............................................................................. 361
Forcing a Stack Unit Failover..................................................................................................................................361
Specifying an Auto-Failover Limit..........................................................................................................................362
Disabling Auto-Reboot............................................................................................................................................362
Manually Synchronizing Management and Standby Units.................................................................................362
Pre-Configuring a Stack Unit Slot...............................................................................................................................362
Removing a Provisioned Logical Stack Unit...............................................................................................................363
Hitless Behavior............................................................................................................................................................. 363
12
Contents
Graceful Restart............................................................................................................................................................ 363
Software Resiliency.......................................................................................................................................................364
Software Component Health Monitoring.............................................................................................................364
System Health Monitoring......................................................................................................................................364
Failure and Event Logging......................................................................................................................................364
Hot-Lock Behavior........................................................................................................................................................ 365
21 Internet Group Management Protocol (IGMP).........................................................................................366
IGMP Implementation Information.............................................................................................................................. 366
IGMP Protocol Overview............................................................................................................................................. 366
IGMP Version 2........................................................................................................................................................366
IGMP Version 3........................................................................................................................................................368
Configure IGMP..............................................................................................................................................................371
Related Configuration Tasks................................................................................................................................... 371
Viewing IGMP Enabled Interfaces............................................................................................................................... 372
Selecting an IGMP Version...........................................................................................................................................372
Viewing IGMP Groups...................................................................................................................................................372
Adjusting Timers.............................................................................................................................................................373
Adjusting Query and Response Timers................................................................................................................. 373
Preventing a Host from Joining a Group.................................................................................................................... 374
Enabling IGMP Immediate-Leave.................................................................................................................................377
IGMP Snooping.............................................................................................................................................................. 377
IGMP Snooping Implementation Information....................................................................................................... 377
Configuring IGMP Snooping...................................................................................................................................377
Removing a Group-Port Association.....................................................................................................................378
Disabling Multicast Flooding...................................................................................................................................378
Specifying a Port as Connected to a Multicast Router...................................................................................... 379
Configuring the Switch as Querier........................................................................................................................ 379
Fast Convergence after MSTP Topology Changes..................................................................................................380
Egress Interface Selection (EIS) for HTTP and IGMP Applications....................................................................... 380
Protocol Separation.................................................................................................................................................380
Enabling and Disabling Management Egress Interface Selection...................................................................... 381
Handling of Management Route Configuration...................................................................................................382
Handling of Switch-Initiated Traffic...................................................................................................................... 383
Handling of Switch-Destined Traffic.....................................................................................................................383
Handling of Transit Traffic (Traffic Separation)..................................................................................................384
Mapping of Management Applications and Traffic Type................................................................................... 384
Behavior of Various Applications for Switch-Initiated Traffic ...........................................................................385
Behavior of Various Applications for Switch-Destined Traffic ......................................................................... 386
Interworking of EIS With Various Applications.....................................................................................................387
Designating a Multicast Router Interface...................................................................................................................388
22 Interfaces................................................................................................................................................ 389
Basic Interface Configuration...................................................................................................................................... 389
Advanced Interface Configuration.............................................................................................................................. 389
Interface Types..............................................................................................................................................................390
Contents
13
View Basic Interface Information................................................................................................................................ 390
Resetting an Interface to its Factory Default State..................................................................................................392
Enabling a Physical Interface....................................................................................................................................... 393
Physical Interfaces........................................................................................................................................................ 393
Configuration Task List for Physical Interfaces...................................................................................................393
Overview of Layer Modes...................................................................................................................................... 393
Configuring Layer 2 (Data Link) Mode................................................................................................................. 394
Configuring Layer 2 (Interface) Mode..................................................................................................................394
Configuring Layer 3 (Network) Mode.................................................................................................................. 395
Configuring Layer 3 (Interface) Mode..................................................................................................................395
Egress Interface Selection (EIS)................................................................................................................................. 396
Important Points to Remember.............................................................................................................................396
Configuring EIS........................................................................................................................................................ 396
Management Interfaces................................................................................................................................................397
Configuring Management Interfaces.................................................................................................................... 397
Configuring a Management Interface on an Ethernet Port...............................................................................398
VLAN Interfaces............................................................................................................................................................ 399
Loopback Interfaces......................................................................................................................................................400
Null Interfaces................................................................................................................................................................400
Port Channel Interfaces................................................................................................................................................400
Port Channel Definition and Standards................................................................................................................. 401
Port Channel Benefits..............................................................................................................................................401
Port Channel Implementation................................................................................................................................. 401
Interfaces in Port Channels....................................................................................................................................402
Configuration Tasks for Port Channel Interfaces................................................................................................402
Creating a Port Channel......................................................................................................................................... 402
Adding a Physical Interface to a Port Channel.................................................................................................... 403
Reassigning an Interface to a New Port Channel............................................................................................... 404
Configuring the Minimum Oper Up Links in a Port Channel..............................................................................405
Adding or Removing a Port Channel from a VLAN.............................................................................................405
Assigning an IP Address to a Port Channel..........................................................................................................406
Deleting or Disabling a Port Channel.....................................................................................................................407
Load Balancing Through Port Channels............................................................................................................... 407
Changing the Hash Algorithm................................................................................................................................ 407
Bulk Configuration.........................................................................................................................................................408
Interface Range....................................................................................................................................................... 408
Bulk Configuration Examples................................................................................................................................. 408
Defining Interface Range Macros................................................................................................................................ 410
Define the Interface Range.....................................................................................................................................410
Choosing an Interface-Range Macro.....................................................................................................................410
Monitoring and Maintaining Interfaces.........................................................................................................................411
Maintenance Using TDR..........................................................................................................................................412
Non Dell-Qualified Transceivers................................................................................................................................... 412
Splitting 40G Ports without Reload............................................................................................................................. 413
Splitting QSFP Ports to SFP+ Ports............................................................................................................................414
14
Contents
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port.................................................................................. 415
Important Points to Remember..............................................................................................................................415
Example Scenarios................................................................................................................................................... 416
Configuring wavelength for 10–Gigabit SFP+ optics................................................................................................ 417
Link Dampening...............................................................................................................................................................417
Important Points to Remember..............................................................................................................................417
Enabling Link Dampening.........................................................................................................................................418
Link Bundle Monitoring..................................................................................................................................................419
Using Ethernet Pause Frames for Flow Control........................................................................................................420
Enabling Pause Frames...........................................................................................................................................420
Configure the MTU Size on an Interface.................................................................................................................... 421
Port-Pipes.......................................................................................................................................................................422
Auto-Negotiation on Ethernet Interfaces...................................................................................................................422
Setting the Speed of Ethernet Interfaces............................................................................................................422
Set Auto-Negotiation Options............................................................................................................................... 424
View Advanced Interface Information........................................................................................................................ 424
Configuring the Interface Sampling Size..............................................................................................................425
Configuring the Traffic Sampling Size Globally..........................................................................................................426
Dynamic Counters......................................................................................................................................................... 428
Clearing Interface Counters................................................................................................................................... 428
23 Internet Protocol Security (IPSec)..........................................................................................................430
Configuring IPSec .........................................................................................................................................................430
24 IPv4 Routing............................................................................................................................................432
IP Addresses...................................................................................................................................................................433
Implementation Information................................................................................................................................... 433
Configuration Tasks for IP Addresses.........................................................................................................................433
Assigning IP Addresses to an Interface...................................................................................................................... 433
Configuring Static Routes............................................................................................................................................ 434
Configure Static Routes for the Management Interface......................................................................................... 435
IPv4 Path MTU Discovery Overview.......................................................................................................................... 436
Using the Configured Source IP Address in ICMP Messages................................................................................. 436
Configuring the ICMP Source Interface...............................................................................................................436
Configuring the Duration to Establish a TCP Connection........................................................................................ 437
Enabling Directed Broadcast........................................................................................................................................437
Resolution of Host Names............................................................................................................................................437
Enabling Dynamic Resolution of Host Names............................................................................................................438
Specifying the Local System Domain and a List of Domains................................................................................... 438
Configuring DNS with Traceroute...............................................................................................................................439
ARP................................................................................................................................................................................. 439
Configuration Tasks for ARP....................................................................................................................................... 440
Configuring Static ARP Entries....................................................................................................................................440
Enabling Proxy ARP.......................................................................................................................................................440
Clearing ARP Cache.......................................................................................................................................................441
ARP Learning via Gratuitous ARP................................................................................................................................441
Contents
15
Enabling ARP Learning via Gratuitous ARP................................................................................................................ 441
ARP Learning via ARP Request....................................................................................................................................441
Configuring ARP Retries...............................................................................................................................................442
ICMP............................................................................................................................................................................... 443
Configuration Tasks for ICMP..................................................................................................................................... 443
Enabling ICMP Unreachable Messages...................................................................................................................... 443
UDP Helper.....................................................................................................................................................................443
Configure UDP Helper............................................................................................................................................ 443
Important Points to Remember............................................................................................................................. 444
Enabling UDP Helper.....................................................................................................................................................444
Configuring a Broadcast Address................................................................................................................................444
Configurations Using UDP Helper............................................................................................................................... 445
UDP Helper with Broadcast-All Addresses................................................................................................................ 445
UDP Helper with Subnet Broadcast Addresses........................................................................................................ 446
UDP Helper with Configured Broadcast Addresses..................................................................................................446
UDP Helper with No Configured Broadcast Addresses............................................................................................447
Troubleshooting UDP Helper........................................................................................................................................447
25 IPv6 Routing............................................................................................................................................448
Protocol Overview.........................................................................................................................................................448
Extended Address Space........................................................................................................................................449
Stateless Autoconfiguration...................................................................................................................................449
IPv6 Headers............................................................................................................................................................449
IPv6 Header Fields.................................................................................................................................................. 450
Extension Header Fields......................................................................................................................................... 452
Addressing................................................................................................................................................................453
Implementing IPv6 with Dell Networking OS.............................................................................................................454
ICMPv6...........................................................................................................................................................................455
Path MTU Discovery.....................................................................................................................................................456
IPv6 Neighbor Discovery..............................................................................................................................................456
IPv6 Neighbor Discovery of MTU Packets.......................................................................................................... 457
Configuration Task List for IPv6 RDNSS....................................................................................................................457
Configuring the IPv6 Recursive DNS Server....................................................................................................... 457
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................458
Displaying IPv6 RDNSS Information..................................................................................................................... 459
Secure Shell (SSH) Over an IPv6 Transport............................................................................................................. 459
Configuration Tasks for IPv6....................................................................................................................................... 460
Adjusting Your CAM-Profile...................................................................................................................................460
Assigning an IPv6 Address to an Interface........................................................................................................... 461
Assigning a Static IPv6 Route................................................................................................................................ 461
Configuring Telnet with IPv6................................................................................................................................. 462
SNMP over IPv6......................................................................................................................................................462
Displaying IPv6 Information....................................................................................................................................462
Displaying an IPv6 Interface Information..............................................................................................................463
Showing IPv6 Routes..............................................................................................................................................463
Showing the Running-Configuration for an Interface........................................................................................ 465
16
Contents
Clearing IPv6 Routes...............................................................................................................................................465
Configuring IPv6 RA Guard..........................................................................................................................................465
Configuring IPv6 RA Guard on an Interface.........................................................................................................467
Monitoring IPv6 RA Guard..................................................................................................................................... 468
26 iSCSI Optimization.................................................................................................................................. 469
iSCSI Optimization Overview.......................................................................................................................................469
Monitoring iSCSI Traffic Flows...............................................................................................................................471
Application of Quality of Service to iSCSI Traffic Flows..................................................................................... 471
Information Monitored in iSCSI Traffic Flows.......................................................................................................471
Detection and Auto-Configuration for Dell EqualLogic Arrays...........................................................................472
Configuring Detection and Ports for Dell Compellent Arrays.............................................................................472
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer...............................................................473
Enable and Disable iSCSI Optimization................................................................................................................. 473
Default iSCSI Optimization Values...............................................................................................................................474
iSCSI Optimization Prerequisites................................................................................................................................. 474
Configuring iSCSI Optimization....................................................................................................................................474
Displaying iSCSI Optimization Information................................................................................................................. 476
27 Intermediate System to Intermediate System..........................................................................................478
IS-IS Protocol Overview............................................................................................................................................... 478
IS-IS Addressing.............................................................................................................................................................478
Multi-Topology IS-IS......................................................................................................................................................479
Transition Mode....................................................................................................................................................... 479
Interface Support.................................................................................................................................................... 480
Adjacencies...............................................................................................................................................................480
Graceful Restart............................................................................................................................................................ 480
Timers....................................................................................................................................................................... 480
Implementation Information......................................................................................................................................... 480
Configuration Information............................................................................................................................................. 481
Configuration Tasks for IS-IS.................................................................................................................................482
Configuring the Distance of a Route.....................................................................................................................489
Changing the IS-Type.............................................................................................................................................490
Redistributing IPv4 Routes.....................................................................................................................................492
Redistributing IPv6 Routes.....................................................................................................................................493
Configuring Authentication Passwords................................................................................................................ 494
Setting the Overload Bit.........................................................................................................................................494
Debugging IS-IS.......................................................................................................................................................495
IS-IS Metric Styles.........................................................................................................................................................496
Configure Metric Values...............................................................................................................................................496
Maximum Values in the Routing Table..................................................................................................................497
Change the IS-IS Metric Style in One Level Only................................................................................................497
Leaks from One Level to Another......................................................................................................................... 498
Sample Configurations..................................................................................................................................................499
28 Link Aggregation Control Protocol (LACP)..............................................................................................502
Contents
17
Introduction to Dynamic LAGs and LACP..................................................................................................................502
Important Points to Remember.............................................................................................................................502
LACP Modes............................................................................................................................................................503
Configuring LACP Commands...............................................................................................................................503
LACP Configuration Tasks........................................................................................................................................... 504
Creating a LAG........................................................................................................................................................ 504
Configuring the LAG Interfaces as Dynamic........................................................................................................504
Setting the LACP Long Timeout...........................................................................................................................505
Monitoring and Debugging LACP..........................................................................................................................505
Shared LAG State Tracking......................................................................................................................................... 506
Configuring Shared LAG State Tracking..............................................................................................................506
Important Points about Shared LAG State Tracking..........................................................................................508
LACP Basic Configuration Example............................................................................................................................ 508
Configure a LAG on ALPHA...................................................................................................................................508
29 Layer 2..................................................................................................................................................... 517
Manage the MAC Address Table................................................................................................................................. 517
Clearing the MAC Address Table........................................................................................................................... 517
Setting the Aging Time for Dynamic Entries.........................................................................................................517
Configuring a Static MAC Address........................................................................................................................518
Displaying the MAC Address Table........................................................................................................................518
MAC Learning Limit....................................................................................................................................................... 518
Setting the MAC Learning Limit.............................................................................................................................519
mac learning-limit Dynamic..................................................................................................................................... 519
mac learning-limit mac-address-sticky..................................................................................................................519
mac learning-limit station-move............................................................................................................................ 520
mac learning-limit no-station-move...................................................................................................................... 520
Learning Limit Violation Actions.............................................................................................................................520
Setting Station Move Violation Actions.................................................................................................................521
Recovering from Learning Limit and Station Move Violations........................................................................... 521
Disabling MAC Address Learning on the System................................................................................................522
NIC Teaming...................................................................................................................................................................522
Configure Redundant Pairs.......................................................................................................................................... 523
Important Points about Configuring Redundant Pairs........................................................................................525
Far-End Failure Detection............................................................................................................................................ 526
FEFD State Changes...............................................................................................................................................527
Configuring FEFD.................................................................................................................................................... 528
Enabling FEFD on an Interface.............................................................................................................................. 528
Debugging FEFD......................................................................................................................................................529
30 Link Layer Discovery Protocol (LLDP)..................................................................................................... 531
802.1AB (LLDP) Overview............................................................................................................................................531
Protocol Data Units..................................................................................................................................................531
Optional TLVs.................................................................................................................................................................532
Management TLVs..................................................................................................................................................532
TIA-1057 (LLDP-MED) Overview............................................................................................................................... 534
18
Contents
TIA Organizationally Specific TLVs........................................................................................................................534
Configure LLDP............................................................................................................................................................. 538
Related Configuration Tasks..................................................................................................................................538
Important Points to Remember.............................................................................................................................538
LLDP Compatibility..................................................................................................................................................539
CONFIGURATION versus INTERFACE Configurations........................................................................................... 539
Enabling LLDP................................................................................................................................................................539
Disabling and Undoing LLDP..................................................................................................................................540
Enabling LLDP on Management Ports........................................................................................................................540
Disabling and Undoing LLDP on Management Ports..........................................................................................540
Advertising TLVs........................................................................................................................................................... 540
Viewing the LLDP Configuration................................................................................................................................. 542
Viewing Information Advertised by Adjacent LLDP Agents.....................................................................................542
Configuring LLDPDU Intervals.....................................................................................................................................543
Configuring Transmit and Receive Mode...................................................................................................................544
Configuring the Time to Live Value.............................................................................................................................544
Debugging LLDP............................................................................................................................................................545
Relevant Management Objects...................................................................................................................................546
31 Microsoft Network Load Balancing...........................................................................................................551
NLB Unicast Mode Scenario.........................................................................................................................................551
NLB Multicast Mode Scenario......................................................................................................................................551
Limitations of the NLB Feature................................................................................................................................... 552
Microsoft Clustering..................................................................................................................................................... 552
Enable and Disable VLAN Flooding ............................................................................................................................ 552
Configuring a Switch for NLB .....................................................................................................................................552
Enabling a Switch for Multicast NLB....................................................................................................................553
32 Multicast Source Discovery Protocol (MSDP)........................................................................................ 554
Protocol Overview........................................................................................................................................................ 554
Anycast RP.....................................................................................................................................................................555
Implementation Information.........................................................................................................................................556
Configure Multicast Source Discovery Protocol.......................................................................................................556
Related Configuration Tasks..................................................................................................................................556
Enable MSDP.................................................................................................................................................................560
Manage the Source-Active Cache...............................................................................................................................561
Viewing the Source-Active Cache.........................................................................................................................561
Limiting the Source-Active Cache.........................................................................................................................561
Clearing the Source-Active Cache........................................................................................................................562
Enabling the Rejected Source-Active Cache.......................................................................................................562
Accept Source-Active Messages that Fail the RFP Check.....................................................................................562
Specifying Source-Active Messages.......................................................................................................................... 565
Limiting the Source-Active Messages from a Peer.................................................................................................. 566
Preventing MSDP from Caching a Local Source......................................................................................................566
Preventing MSDP from Caching a Remote Source..................................................................................................567
Preventing MSDP from Advertising a Local Source.................................................................................................567
Contents
19
Logging Changes in Peership States.......................................................................................................................... 568
Terminating a Peership.................................................................................................................................................568
Clearing Peer Statistics................................................................................................................................................ 569
Debugging MSDP..........................................................................................................................................................569
MSDP with Anycast RP................................................................................................................................................570
Configuring Anycast RP................................................................................................................................................ 571
Reducing Source-Active Message Flooding........................................................................................................ 572
Specifying the RP Address Used in SA Messages.............................................................................................. 572
MSDP Sample Configurations......................................................................................................................................574
33 Multiple Spanning Tree Protocol (MSTP)................................................................................................577
Protocol Overview.........................................................................................................................................................577
Spanning Tree Variations..............................................................................................................................................578
Implementation Information................................................................................................................................... 578
Configure Multiple Spanning Tree Protocol............................................................................................................... 578
Related Configuration Tasks.................................................................................................................................. 579
Enable Multiple Spanning Tree Globally......................................................................................................................579
Adding and Removing Interfaces.................................................................................................................................579
Creating Multiple Spanning Tree Instances............................................................................................................... 580
Influencing MSTP Root Selection................................................................................................................................ 581
Interoperate with Non-Dell Bridges............................................................................................................................. 581
Changing the Region Name or Revision.....................................................................................................................582
Modifying Global Parameters.......................................................................................................................................582
Modifying the Interface Parameters...........................................................................................................................583
Configuring an EdgePort..............................................................................................................................................584
Flush MAC Addresses after a Topology Change...................................................................................................... 585
MSTP Sample Configurations......................................................................................................................................585
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration...................................................................................... 586
Debugging and Verifying MSTP Configurations........................................................................................................589
34 Multicast Features................................................................................................................................... 591
Enabling IP Multicast..................................................................................................................................................... 591
Implementation Information..........................................................................................................................................591
Multicast Policies...........................................................................................................................................................592
IPv4 Multicast Policies............................................................................................................................................592
Understanding Multicast Traceroute (mtrace)......................................................................................................... 599
Important Points to Remember.............................................................................................................................600
Printing Multicast Traceroute (mtrace) Paths..........................................................................................................600
Supported Error Codes................................................................................................................................................. 601
mtrace Scenarios...........................................................................................................................................................602
35 Object Tracking.......................................................................................................................................608
Object Tracking Overview............................................................................................................................................608
Track Layer 2 Interfaces.........................................................................................................................................609
Track Layer 3 Interfaces.........................................................................................................................................609
20
Contents
/