Force10 MXL Blade

Dell Force10 MXL Blade User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell Force10 MXL Blade User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Networking Conguration Guide for the MXL
10/40GbE Switch I/O Module
9.14.0.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2018 - 07
Rev. A00
Contents
1 About this Guide...........................................................................................................................................33
Audience............................................................................................................................................................................33
Conventions......................................................................................................................................................................33
Information Symbols........................................................................................................................................................33
Related Documents......................................................................................................................................................... 34
2 Conguration Fundamentals........................................................................................................................ 35
Accessing the Command Line........................................................................................................................................35
CLI Modes.........................................................................................................................................................................35
Navigating CLI Modes............................................................................................................................................... 36
The do Command............................................................................................................................................................ 39
Undoing Commands........................................................................................................................................................ 39
Obtaining Help..................................................................................................................................................................40
Entering and Editing Commands................................................................................................................................... 40
Command History.............................................................................................................................................................41
Filtering show Command Outputs..................................................................................................................................41
Multiple Users in Conguration Mode...........................................................................................................................42
3 Getting Started............................................................................................................................................44
Console Access................................................................................................................................................................45
Serial Console.............................................................................................................................................................45
External Serial Port with a USB Connector............................................................................................................47
Accessing the CLI Interface and Running Scripts Using SSH.................................................................................... 47
Entering CLI commands Using an SSH Connection..............................................................................................47
Executing Local CLI Scripts Using an SSH Connection........................................................................................47
Boot Process.................................................................................................................................................................... 48
Default Conguration...................................................................................................................................................... 49
Conguring a Host Name............................................................................................................................................... 49
Conguring a Unique Host Name on the System........................................................................................................50
Accessing the System Remotely................................................................................................................................... 50
Accessing the Switch Remotely.............................................................................................................................. 50
Congure the Management Port IP Address.........................................................................................................50
Congure a Management Route...............................................................................................................................51
Conguring a Username and Password...................................................................................................................51
Conguring the Enable Password..................................................................................................................................52
Conguration File Management.....................................................................................................................................52
Copy Files to and from the System......................................................................................................................... 52
Save the Running-Conguration..............................................................................................................................54
Viewing Files...............................................................................................................................................................54
Managing the File System.............................................................................................................................................. 56
View the Command History............................................................................................................................................57
Using HTTP for File Transfers........................................................................................................................................ 57
Contents
3
Upgrading and Downgrading the Dell Networking OS................................................................................................58
Verify Software Images Before Installation...................................................................................................................58
4 Management............................................................................................................................................... 60
Conguring Privilege Levels........................................................................................................................................... 60
Creating a Custom Privilege Level............................................................................................................................61
Customizing a Privilege Level....................................................................................................................................61
Applying a Privilege Level to a Username............................................................................................................... 63
Applying a Privilege Level to a Terminal Line.......................................................................................................... 63
Conguring Logging........................................................................................................................................................ 63
Audit and Security Logs............................................................................................................................................ 64
Conguring Logging Format ...................................................................................................................................65
Setting Up a Secure Connection to a Syslog Server.............................................................................................66
Display the Logging Buer and the Logging Conguration........................................................................................ 67
Log Messages in the Internal Buer..............................................................................................................................67
Conguration Task List for System Log Management..........................................................................................68
Disabling System Logging............................................................................................................................................... 68
Sending System Messages to a Syslog Server............................................................................................................68
Conguring a UNIX System as a Syslog Server.....................................................................................................68
Changing System Logging Settings.............................................................................................................................. 69
Display the Logging Buer and the Logging Conguration........................................................................................ 70
Conguring a UNIX Logging Facility Level....................................................................................................................70
Synchronizing Log Messages..........................................................................................................................................71
Enabling Timestamp on Syslog Messages.................................................................................................................... 72
Enabling Secure Management Mode.............................................................................................................................72
Enabling Secured CLI Mode............................................................................................................................................73
File Transfer Services.......................................................................................................................................................73
Conguration Task List for File Transfer Services..................................................................................................73
Enabling the FTP Server........................................................................................................................................... 73
Conguring FTP Server Parameters........................................................................................................................74
Conguring FTP Client Parameters......................................................................................................................... 74
Terminal Lines................................................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line................................................................................................75
Conguring Login Authentication for Terminal Lines............................................................................................. 75
Setting Time Out of EXEC Privilege Mode...................................................................................................................76
Using Telnet to get to Another Network Device.......................................................................................................... 77
Lock CONFIGURATION Mode....................................................................................................................................... 77
Viewing the Conguration Lock Status...................................................................................................................78
Limit Concurrent Login Sessions....................................................................................................................................78
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................78
Conguring Concurrent Session Limit.....................................................................................................................79
Enabling the System to Clear Existing Sessions.................................................................................................... 79
Track Login Activity......................................................................................................................................................... 80
Restrictions for Tracking Login Activity.................................................................................................................. 80
Conguring Login Activity Tracking......................................................................................................................... 80
Display Login Statistics...............................................................................................................................................81
4
Contents
Recovering from a Forgotten Password....................................................................................................................... 82
Recovering from a Forgotten Enable Password...........................................................................................................83
Recovering from a Failed Start.......................................................................................................................................84
Viewing the Reason for Last System Reboot...............................................................................................................84
5 802.1X......................................................................................................................................................... 85
The Port-Authentication Process.................................................................................................................................. 88
EAP over RADIUS......................................................................................................................................................89
Conguring 802.1X...........................................................................................................................................................89
Related Conguration Tasks..................................................................................................................................... 89
Important Points to Remember......................................................................................................................................90
Enabling 802.1X................................................................................................................................................................ 90
Conguring Request Identity Re-Transmissions......................................................................................................91
Conguring a Quiet Period after a Failed Authentication..................................................................................... 92
Conguring dot1x Prole ................................................................................................................................................93
Conguring MAC addresses for a do1x Prole.............................................................................................................93
Conguring the Static MAB and MAB Prole .............................................................................................................94
Conguring Critical VLAN ..............................................................................................................................................94
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 95
Re-Authenticating a Port................................................................................................................................................96
Conguring Timeouts...................................................................................................................................................... 97
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................98
Guest and Authentication-Fail VLANs.................................................................................................................... 99
Conguring a Guest VLAN......................................................................................................................................100
Conguring an Authentication-Fail VLAN............................................................................................................. 100
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 102
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 102
Guidelines for Conguring ACL VLAN groups............................................................................................................ 103
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................104
Conguring ACL VLAN Groups.............................................................................................................................. 104
Conguring FP Blocks for VLAN Parameters.......................................................................................................105
Viewing CAM Usage...................................................................................................................................................... 105
Allocating FP Blocks for VLAN Processes...................................................................................................................107
7 Access Control Lists (ACLs)....................................................................................................................... 108
IP Access Control Lists (ACLs).....................................................................................................................................109
Implementing ACL on the Dell Networking OS........................................................................................................... 110
ACLs and VLANs.............................................................................................................................................................110
ACL Optimization............................................................................................................................................................ 110
Determine the Order in which ACLs are Used to Classify Trac..............................................................................110
Example of the order Keyword to Determine ACL Sequence............................................................................. 110
IP Fragment Handling...................................................................................................................................................... 111
IP Fragments ACL Examples.......................................................................................................................................... 111
Layer 4 ACL Rules Examples.......................................................................................................................................... 111
Congure a Standard IP ACL.........................................................................................................................................112
Contents
5
Conguring a Standard IP ACL Filter............................................................................................................................113
Congure an Extended IP ACL......................................................................................................................................114
Conguring Filters with a Sequence Number..............................................................................................................114
Conguring Filters Without a Sequence Number....................................................................................................... 115
Established Flag...............................................................................................................................................................115
Congure Layer 2 and Layer 3 ACLs............................................................................................................................ 115
Assign an IP ACL to an Interface...................................................................................................................................116
Applying an IP ACL..........................................................................................................................................................116
Counting ACL Hits...........................................................................................................................................................117
Congure Ingress ACLs.................................................................................................................................................. 117
Congure Egress ACLs...................................................................................................................................................118
Applying Egress Layer 3 ACLs (Control-Plane)...........................................................................................................118
IP Prex Lists...................................................................................................................................................................119
Implementation Information.....................................................................................................................................119
Conguration Task List for Prex Lists.........................................................................................................................119
Creating a Prex List......................................................................................................................................................120
Creating a Prex List Without a Sequence Number..................................................................................................120
Viewing Prex Lists.........................................................................................................................................................121
Applying a Prex List for Route Redistribution...........................................................................................................122
Applying a Filter to a Prex List (OSPF)......................................................................................................................122
ACL Remarks.................................................................................................................................................................. 123
Conguring a Remark.............................................................................................................................................. 123
Deleting a Remark.................................................................................................................................................... 124
ACL Resequencing......................................................................................................................................................... 124
Resequencing an ACL or Prex List.............................................................................................................................125
Route Maps.....................................................................................................................................................................126
Implementation Information.................................................................................................................................... 126
Important Points to Remember.................................................................................................................................... 126
Conguration Task List for Route Maps...................................................................................................................... 126
Creating a Route Map....................................................................................................................................................127
Congure Route Map Filters......................................................................................................................................... 128
Conguring Match Routes............................................................................................................................................ 129
Conguring Set Conditions........................................................................................................................................... 129
Congure a Route Map for Route Redistribution.......................................................................................................130
Congure a Route Map for Route Tagging.................................................................................................................. 131
Continue Clause...............................................................................................................................................................131
Logging of ACL Processes............................................................................................................................................. 131
Guidelines for Conguring ACL Logging......................................................................................................................132
Conguring ACL Logging...............................................................................................................................................133
Flow-Based Monitoring Support for ACLs.................................................................................................................. 133
Behavior of Flow-Based Monitoring.......................................................................................................................133
Enabling Flow-Based Monitoring..................................................................................................................................135
8 Bidirectional Forwarding Detection (BFD)...................................................................................................137
How BFD Works..............................................................................................................................................................137
BFD Packet Format..................................................................................................................................................138
6
Contents
BFD Sessions............................................................................................................................................................ 139
BFD Three-Way Handshake.................................................................................................................................... 140
Session State Changes............................................................................................................................................142
Important Points to Remember.................................................................................................................................... 142
Congure BFD................................................................................................................................................................ 142
Congure BFD for Physical Ports...........................................................................................................................143
Enabling BFD Globally.............................................................................................................................................. 143
Changing Physical Port Session Parameters........................................................................................................ 144
Disabling and Re-Enabling BFD...............................................................................................................................144
Congure BFD for Static Routes..................................................................................................................................145
Related Conguration Tasks....................................................................................................................................145
Establishing Sessions for Static Routes.................................................................................................................145
Establishing Static Route Sessions on Specic Neighbors................................................................................. 146
Changing Static Route Session Parameters..........................................................................................................147
Disabling BFD for Static Routes..............................................................................................................................147
Congure BFD for OSPF............................................................................................................................................... 147
Related Conguration Tasks....................................................................................................................................148
Establishing Sessions with OSPF Neighbors........................................................................................................ 148
Establishing Sessions with OSPF Neighbors for nondefault VRFs.................................................................... 149
Changing OSPF Session Parameters.....................................................................................................................150
Disabling BFD for OSPF.......................................................................................................................................... 150
Congure BFD for OSPFv3...........................................................................................................................................150
Related Conguration Tasks.....................................................................................................................................151
Establishing Sessions with OSPFv3 Neighbors.....................................................................................................151
Establishing BFD Sessions with OSPFv3 Neighbors for nondefault VRFs........................................................ 151
Changing OSPFv3 Session Parameters.................................................................................................................152
Disabling BFD for OSPFv3...................................................................................................................................... 153
Congure BFD for BGP................................................................................................................................................. 153
Prerequisites..............................................................................................................................................................153
Establishing Sessions with BGP Neighbors.......................................................................................................... 153
Disabling BFD for BGP.............................................................................................................................................158
Use BFD in a BGP Peer Group............................................................................................................................... 158
Displaying BFD for BGP Information......................................................................................................................158
Congure BFD for VRRP...............................................................................................................................................162
Related Conguration Tasks....................................................................................................................................162
Establishing Sessions with All VRRP Neighbors...................................................................................................163
Establishing VRRP Sessions on VRRP Neighbors................................................................................................163
Changing VRRP Session Parameters.....................................................................................................................164
Disabling BFD for VRRP.......................................................................................................................................... 164
Congure BFD for VLANs.............................................................................................................................................165
Related Conguration Task..................................................................................................................................... 165
Establish Sessions with VLAN Neighbors............................................................................................................. 166
Changing VLAN Session Parameters.....................................................................................................................166
Disabling BFD for VLANs.........................................................................................................................................167
Congure BFD for Port-Channels................................................................................................................................ 167
Contents
7
Related Conguration Tasks....................................................................................................................................167
Establish Sessions on Port-Channels.....................................................................................................................168
Changing Physical Port Session Parameters........................................................................................................ 168
Disabling BFD for Port-Channels............................................................................................................................169
Conguring Protocol Liveness...................................................................................................................................... 169
9 Border Gateway Protocol IPv4 (BGPv4).....................................................................................................170
Autonomous Systems (AS)........................................................................................................................................... 170
Sessions and Peers.........................................................................................................................................................172
Establish a Session................................................................................................................................................... 172
Route Reectors.............................................................................................................................................................173
Communities..............................................................................................................................................................174
BGP Attributes................................................................................................................................................................174
Best Path Selection Criteria.................................................................................................................................... 174
Weight........................................................................................................................................................................176
Local Preference.......................................................................................................................................................176
Multi-Exit Discriminators (MEDs)...........................................................................................................................177
Origin..........................................................................................................................................................................178
AS Path......................................................................................................................................................................179
Next Hop................................................................................................................................................................... 179
Multiprotocol BGP..........................................................................................................................................................179
Implement BGP with the Dell Networking OS............................................................................................................180
Additional Path (Add-Path) Support......................................................................................................................180
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 180
Ignore Router-ID for Some Best-Path Calculations.............................................................................................. 181
Four-Byte AS Numbers............................................................................................................................................ 181
AS4 Number Representation...................................................................................................................................181
AS Number Migration.............................................................................................................................................. 183
BGP4 Management Information Base (MIB)........................................................................................................184
Important Points to Remember.............................................................................................................................. 184
Conguration Information..............................................................................................................................................185
BGP Conguration......................................................................................................................................................... 185
Enabling BGP............................................................................................................................................................ 186
Enabling MBGP Congurations.............................................................................................................................. 217
BGP Regular Expression Optimization.........................................................................................................................219
Debugging BGP.............................................................................................................................................................. 219
Storing Last and Bad PDUs....................................................................................................................................220
PDU Counters...........................................................................................................................................................221
Sample Congurations...................................................................................................................................................221
10 Content Addressable Memory (CAM).......................................................................................................230
CAM Allocation.............................................................................................................................................................. 230
Test CAM Usage.............................................................................................................................................................231
View CAM-ACL Settings............................................................................................................................................... 231
Conguring CAM Threshold and Silence Period........................................................................................................232
Setting CAM Threshold and Silence Period......................................................................................................... 232
8
Contents
CAM Optimization......................................................................................................................................................... 233
11 Control Plane Policing (CoPP).................................................................................................................. 234
Congure Control Plane Policing................................................................................................................................. 235
Conguring CoPP for Protocols............................................................................................................................ 236
Conguring CoPP for CPU Queues.......................................................................................................................237
Show Commands.....................................................................................................................................................238
12 Data Center Bridging (DCB).....................................................................................................................240
Ethernet Enhancements in Data Center Bridging..................................................................................................... 240
Priority-Based Flow Control.................................................................................................................................... 241
Enhanced Transmission Selection..........................................................................................................................242
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................243
Data Center Bridging in a Trac Flow...................................................................................................................244
Enabling Data Center Bridging..................................................................................................................................... 244
Conguring DCB Maps and its Attributes............................................................................................................ 245
Data Center Bridging: Default Conguration..............................................................................................................248
Interworking of DCB Map With DCB Buer Threshold Settings.............................................................................248
Conguring Priority-Based Flow Control.................................................................................................................... 249
Conguring Lossless Queues................................................................................................................................. 250
Conguring the PFC Buer in a Switch Stack..................................................................................................... 251
Priority-Based Flow Control Using Dynamic Buer Method.............................................................................. 251
Congure Enhanced Transmission Selection..............................................................................................................253
ETS Prerequisites and Restrictions....................................................................................................................... 253
Creating an ETS Priority Group..............................................................................................................................253
ETS Operation with DCBx......................................................................................................................................254
Conguring Bandwidth Allocation for DCBx CIN................................................................................................ 255
Hierarchical Scheduling in ETS Output Policies................................................................................................... 256
Applying DCB Policies with an ETS Conguration.................................................................................................... 256
PFC and ETS Conguration Examples........................................................................................................................256
Using PFC and ETS to Manage Data Center Trac........................................................................................... 257
Using PFC and ETS to Manage Converged Ethernet Trac in a Switch Stack..............................................259
Applying DCB Policies in a Switch Stack....................................................................................................................259
Congure a DCBx Operation........................................................................................................................................259
DCBx Operation.......................................................................................................................................................259
DCBx Port Roles......................................................................................................................................................260
DCB Conguration Exchange................................................................................................................................. 261
Conguration Source Election................................................................................................................................ 261
Propagation of DCB Information............................................................................................................................262
Auto-Detection and Manual Conguration of the DCBx Version...................................................................... 262
DCBx Example..........................................................................................................................................................263
DCBx Prerequisites and Restrictions.....................................................................................................................264
Conguring DCBx....................................................................................................................................................264
Verifying the DCB Conguration..................................................................................................................................267
QoS dot1p Trac Classication and Queue Assignment.......................................................................................... 275
Conguring the Dynamic Buer Method....................................................................................................................276
Contents
9
13 Debugging and Diagnostics.......................................................................................................................278
Oine Diagnostics......................................................................................................................................................... 278
Important Points to Remember..............................................................................................................................278
Running Oine Diagnostics....................................................................................................................................279
Trace Logs....................................................................................................................................................................... 281
Auto Save on Crash or Rollover..............................................................................................................................281
Using the Show Hardware Commands........................................................................................................................281
Enabling Environmental Monitoring.............................................................................................................................283
Recognize an Over-Temperature Condition..........................................................................................................284
Troubleshoot an Over-Temperature Condition..................................................................................................... 284
Recognize an Under-Voltage Condition................................................................................................................285
Troubleshoot an Under-Voltage Condition............................................................................................................285
Troubleshooting Packet Loss........................................................................................................................................286
Displaying Drop Counters........................................................................................................................................286
Dataplane Statistics................................................................................................................................................. 287
Display Stack Port Statistics.................................................................................................................................. 288
Displaying Stack Member Counters...................................................................................................................... 289
Enabling Application Core Dumps................................................................................................................................290
Mini Core Dumps........................................................................................................................................................... 290
Enabling TCP Dumps..................................................................................................................................................... 291
Enabling Buer Statistics Tracking .............................................................................................................................292
14 Dynamic Host Conguration Protocol (DHCP).........................................................................................294
DHCP Packet Format and Options............................................................................................................................. 294
Assign an IP Address using DHCP.........................................................................................................................296
Implementation Information..........................................................................................................................................296
Congure the System to be a DHCP Server..............................................................................................................297
Conguring the Server for Automatic Address Allocation.................................................................................. 297
Conguration Tasks................................................................................................................................................. 298
Specifying a Default Gateway................................................................................................................................299
Enabling the DHCP Server.....................................................................................................................................299
Congure a Method of Hostname Resolution..................................................................................................... 300
Creating Manual Binding Entries............................................................................................................................ 301
Debugging the DHCP Server..................................................................................................................................301
Using DHCP Clear Commands............................................................................................................................... 301
Congure the System to be a Relay Agent................................................................................................................ 302
Congure the System to be a DHCP Client...............................................................................................................304
Conguring the DHCP Client System...................................................................................................................304
DHCP Client on a Management Interface............................................................................................................ 307
DHCP Client Operation with Other Features.......................................................................................................308
Congure Secure DHCP...............................................................................................................................................309
Option 82..................................................................................................................................................................309
DHCP Snooping.......................................................................................................................................................309
Conguring the DHCP secondary-subnet.............................................................................................................313
Drop DHCP Packets on Snooped VLANs Only.....................................................................................................314
10
Contents
Dynamic ARP Inspection......................................................................................................................................... 314
Conguring Dynamic ARP Inspection....................................................................................................................315
Source Address Validation....................................................................................................................................... 316
15 Equal Cost Multi-Path (ECMP).................................................................................................................318
ECMP for Flow-Based Anity......................................................................................................................................318
Enabling Deterministic ECMP Next Hop............................................................................................................... 318
Link Bundle Monitoring.................................................................................................................................................. 318
Managing ECMP Group Paths......................................................................................................................................319
RTAG7..............................................................................................................................................................................319
Flow-based Hashing for ECMP................................................................................................................................... 320
16 FC FLEXIO FPORT...................................................................................................................................324
FC FLEXIO FPORT........................................................................................................................................................324
Conguring Switch Mode to FCF Port Mode............................................................................................................325
Name Server.................................................................................................................................................................. 326
FCoE Maps.....................................................................................................................................................................326
Creating an FCoE Map..................................................................................................................................................327
Zoning..............................................................................................................................................................................328
Creating Zone and Adding Members...........................................................................................................................329
Creating Zone Alias and Adding Members..................................................................................................................329
Creating Zonesets..........................................................................................................................................................329
Activating a Zoneset......................................................................................................................................................330
Displaying the Fabric Parameters................................................................................................................................ 330
17 FCoE Transit.............................................................................................................................................333
Fibre Channel over Ethernet........................................................................................................................................ 333
Ensure Robustness in a Converged Ethernet Network............................................................................................ 333
FIP Snooping on Ethernet Bridges..............................................................................................................................335
FIP Snooping in a Switch Stack...................................................................................................................................336
Using FIP Snooping........................................................................................................................................................337
Important Points to Remember..............................................................................................................................337
Enabling the FCoE Transit Feature........................................................................................................................ 337
Enable FIP Snooping on VLANs............................................................................................................................. 337
Congure the FC-MAP Value................................................................................................................................ 338
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 338
Congure a Port for a Bridge-to-FCF Link...........................................................................................................338
Impact on Other Software Features..................................................................................................................... 338
FIP Snooping Prerequisites.....................................................................................................................................339
FIP Snooping Restrictions...................................................................................................................................... 339
Conguring FIP Snooping.......................................................................................................................................339
Displaying FIP Snooping Information...........................................................................................................................340
FCoE Transit Conguration Example...........................................................................................................................345
18 FIPS Cryptography...................................................................................................................................347
Preparing the System....................................................................................................................................................347
Contents
11
Enabling FIPS Mode...................................................................................................................................................... 347
Generating Host-Keys...................................................................................................................................................348
Monitoring FIPS Mode Status......................................................................................................................................348
Disabling FIPS Mode..................................................................................................................................................... 349
19 Force10 Resilient Ring Protocol (FRRP)...................................................................................................350
Protocol Overview.........................................................................................................................................................350
Ring Status................................................................................................................................................................351
Multiple FRRP Rings............................................................................................................................................... 352
Important FRRP Points...........................................................................................................................................353
Important FRRP Concepts..................................................................................................................................... 354
Implementing FRRP...................................................................................................................................................... 355
FRRP Conguration...................................................................................................................................................... 355
Creating the FRRP Group...................................................................................................................................... 355
Conguring the Control VLAN...............................................................................................................................355
Conguring and Adding the Member VLANs.......................................................................................................357
Setting the FRRP Timers........................................................................................................................................358
Clearing the FRRP Counters..................................................................................................................................358
Viewing the FRRP Conguration...........................................................................................................................358
Viewing the FRRP Information.............................................................................................................................. 359
Troubleshooting FRRP.................................................................................................................................................. 359
Conguration Checks..............................................................................................................................................359
Sample Conguration and Topology............................................................................................................................360
FRRP Support on VLT................................................................................................................................................... 361
Example Scenario.................................................................................................................................................... 362
Important Points to Remember............................................................................................................................. 363
20 GARP VLAN Registration Protocol (GVRP)............................................................................................. 364
Important Points to Remember................................................................................................................................... 364
Congure GVRP............................................................................................................................................................ 364
Related Conguration Tasks...................................................................................................................................365
Enabling GVRP Globally................................................................................................................................................365
Enabling GVRP on a Layer 2 Interface........................................................................................................................366
Congure GVRP Registration...................................................................................................................................... 366
Congure a GARP Timer...............................................................................................................................................367
21 Internet Group Management Protocol (IGMP)......................................................................................... 368
IGMP Protocol Overview..............................................................................................................................................368
IGMP Version 2........................................................................................................................................................368
IGMP Version 3........................................................................................................................................................ 370
IGMP Snooping.............................................................................................................................................................. 373
IGMP Snooping Implementation Information....................................................................................................... 373
Conguring IGMP Snooping................................................................................................................................... 374
Enabling IGMP Immediate-Leave........................................................................................................................... 374
Disabling Multicast Flooding................................................................................................................................... 375
Specifying a Port as Connected to a Multicast Router.......................................................................................375
12
Contents
Conguring the Switch as Querier........................................................................................................................ 375
Fast Convergence after MSTP Topology Changes................................................................................................... 376
Designating a Multicast Router Interface................................................................................................................... 376
22 Interfaces.................................................................................................................................................377
Basic Interface Conguration....................................................................................................................................... 377
Advanced Interface Conguration............................................................................................................................... 377
Interface Types............................................................................................................................................................... 378
View Basic Interface Information................................................................................................................................. 378
Conguring the Default Interface................................................................................................................................380
Enabling a Physical Interface.........................................................................................................................................381
Physical Interfaces..........................................................................................................................................................381
Conguration Task List for Physical Interfaces.....................................................................................................381
Overview of Layer Modes.......................................................................................................................................382
Conguring Layer 2 (Data Link) Mode..................................................................................................................382
Conguring Layer 2 (Interface) Mode.................................................................................................................. 383
Conguring Layer 3 (Network) Mode...................................................................................................................383
Conguring Layer 3 (Interface) Mode.................................................................................................................. 384
Automatic recovery of an Err-disabled interface....................................................................................................... 384
Conguring an automatic recovery for an Err-disabled interface......................................................................385
Management Interfaces................................................................................................................................................385
Conguring Management Interfaces on the Switch........................................................................................... 386
VLAN Interfaces.............................................................................................................................................................387
Loopback Interfaces...................................................................................................................................................... 388
Null Interfaces................................................................................................................................................................ 388
Port Channel Interfaces................................................................................................................................................388
Port Channel Denition and Standards.................................................................................................................389
Port Channel Benets.............................................................................................................................................389
Port Channel Implementation.................................................................................................................................389
100/1000/10000 Mbps Interfaces in Port Channels...........................................................................................390
Conguration Tasks for Port Channel Interfaces.................................................................................................390
Creating a Port Channel......................................................................................................................................... 390
Adding a Physical Interface to a Port Channel..................................................................................................... 391
Reassigning an Interface to a New Port Channel................................................................................................392
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 393
Adding or Removing a Port Channel from a VLAN............................................................................................. 393
Assigning an IP Address to a Port Channel.......................................................................................................... 394
Deleting or Disabling a Port Channel.....................................................................................................................394
Load Balancing through Port Channels.......................................................................................................................394
Changing the Hash Algorithm......................................................................................................................................395
Server Ports................................................................................................................................................................... 396
Default Conguration without Start-up Cong................................................................................................... 396
Bulk Conguration......................................................................................................................................................... 396
Interface Range....................................................................................................................................................... 396
Bulk Conguration Examples..................................................................................................................................397
Dening Interface Range Macros................................................................................................................................ 398
Contents
13
Dene the Interface Range.................................................................................................................................... 399
Choosing an Interface-Range Macro.................................................................................................................... 399
Monitoring and Maintaining Interfaces....................................................................................................................... 399
Maintenance Using TDR.........................................................................................................................................400
QSFP+ High-Power Optics Usage...............................................................................................................................401
High-Power Optics is Inserted and Peer Port has No OpticsHigh-Power Optics is Inserted and Peer
Port has High / Low Power OpticsLow-Power Optics is Inserted and Peer Port has High-Power Optics..401
Splitting QSFP Ports to SFP+ Ports............................................................................................................................401
Merging SFP+ Ports to QSFP 40G Ports.............................................................................................................402
Congure the MTU Size on an Interface..............................................................................................................402
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................403
Important Points to Remember............................................................................................................................. 403
Example Scenarios...................................................................................................................................................403
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................404
Layer 2 Flow Control Using Ethernet Pause Frames................................................................................................ 404
Enabling Pause Frames...........................................................................................................................................405
Congure MTU Size on an Interface...........................................................................................................................405
Port-Pipes.......................................................................................................................................................................406
Auto-Negotiation on Ethernet Interfaces...................................................................................................................406
Setting the Speed and Duplex Mode of Ethernet Interfaces.............................................................................406
View Advanced Interface Information.........................................................................................................................408
Conguring the Interface Sampling Size.............................................................................................................. 409
Conguring the Trac Sampling Size Globally..................................................................................................... 410
Dynamic Counters.................................................................................................................................................... 412
Enhanced Control of Remote Fault Indication Processing........................................................................................413
Assigning a Front-end Port to a Management VRF...................................................................................................413
23 Internet Protocol Security (IPSec)........................................................................................................... 414
Conguring IPSec ..........................................................................................................................................................414
24 IPv4 Routing.............................................................................................................................................416
IP Addresses....................................................................................................................................................................416
Implementation Information.....................................................................................................................................417
Conguration Tasks for IP Addresses.....................................................................................................................417
IPv4 Path MTU Discovery Overview........................................................................................................................... 419
Packet handling during MTU mismatch ...............................................................................................................420
Using the Congured Source IP Address in ICMP Messages..................................................................................420
Conguring the ICMP Source Interface............................................................................................................... 420
Conguring the Duration to Establish a TCP Connection......................................................................................... 421
Enabling Directed Broadcast......................................................................................................................................... 421
Resolution of Host Names.............................................................................................................................................421
Enabling Dynamic Resolution of Host Names......................................................................................................422
Specifying the Local System Domain and a List of Domains............................................................................. 422
Conguring DNS with Traceroute..........................................................................................................................423
ARP..................................................................................................................................................................................423
Conguration Tasks for ARP.................................................................................................................................. 424
14
Contents
ARP Learning via Gratuitous ARP................................................................................................................................425
ARP Learning via ARP Request................................................................................................................................... 425
Conguring ARP Retries...............................................................................................................................................426
ICMP................................................................................................................................................................................427
Conguration Tasks for ICMP................................................................................................................................ 427
UDP Helper.....................................................................................................................................................................427
Congure UDP Helper.............................................................................................................................................427
Important Points to Remember..............................................................................................................................428
Enabling UDP Helper...............................................................................................................................................428
Congurations Using UDP Helper............................................................................................................................... 428
UDP Helper with Broadcast-All Addresses...........................................................................................................429
UDP Helper with Subnet Broadcast Addresses...................................................................................................429
UDP Helper with Congured Broadcast Addresses............................................................................................430
UDP Helper with No Congured Broadcast Addresses......................................................................................430
Troubleshooting UDP Helper.........................................................................................................................................431
25 IPv6 Addressing.......................................................................................................................................432
Protocol Overview......................................................................................................................................................... 432
Extended Address Space........................................................................................................................................433
Stateless Autoconguration................................................................................................................................... 433
IPv6 Header Fields.........................................................................................................................................................434
Version (4 bits).........................................................................................................................................................434
Trac Class (8 bits).................................................................................................................................................434
Flow Label (20 bits).................................................................................................................................................434
Payload Length (16 bits)......................................................................................................................................... 434
Next Header (8 bits)............................................................................................................................................... 435
Hop Limit (8 bits).....................................................................................................................................................435
Source Address (128 bits).......................................................................................................................................436
Destination Address (128 bits)............................................................................................................................... 436
Extension Header Fields................................................................................................................................................436
Hop-by-Hop Options Header................................................................................................................................. 436
Addressing.......................................................................................................................................................................437
Link-local Addresses................................................................................................................................................ 437
Static and Dynamic Addressing..............................................................................................................................437
Implementing IPv6 with the Dell Networking OS...................................................................................................... 438
ICMPv6............................................................................................................................................................................441
Path MTU Discovery..................................................................................................................................................... 442
IPv6 Neighbor Discovery.............................................................................................................................................. 442
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................443
Conguring the IPv6 Recursive DNS Server....................................................................................................... 443
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................444
Displaying IPv6 RDNSS Information......................................................................................................................444
IPv6 Multicast................................................................................................................................................................ 444
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 444
Conguration Task List for IPv6...................................................................................................................................445
Adjusting Your CAM-Prole....................................................................................................................................445
Contents
15
Assigning an IPv6 Address to an Interface...........................................................................................................446
Assigning a Static IPv6 Route................................................................................................................................446
Conguring Telnet with IPv6.................................................................................................................................. 447
SNMP over IPv6......................................................................................................................................................447
Showing IPv6 Information.......................................................................................................................................447
Showing an IPv6 Interface..................................................................................................................................... 448
Showing IPv6 Routes..............................................................................................................................................448
Showing the Running-Conguration for an Interface......................................................................................... 449
Clearing IPv6 Routes...............................................................................................................................................450
Disabling ND Entry Timeout...................................................................................................................................450
26 iSCSI Optimization................................................................................................................................... 451
iSCSI Optimization Overview........................................................................................................................................451
Monitoring iSCSI Trac Flows...............................................................................................................................453
Information Monitored in iSCSI Trac Flows.......................................................................................................453
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 453
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................454
iSCSI Optimization: Operation............................................................................................................................... 454
Default iSCSI Optimization Values.........................................................................................................................454
Displaying iSCSI Optimization Information................................................................................................................. 455
27 Intermediate System to Intermediate System...........................................................................................457
IS-IS Protocol Overview................................................................................................................................................457
IS-IS Addressing.............................................................................................................................................................457
Multi-Topology IS-IS...................................................................................................................................................... 458
Transition Mode....................................................................................................................................................... 458
Interface Support.....................................................................................................................................................459
Adjacencies...............................................................................................................................................................459
Graceful Restart............................................................................................................................................................ 459
Timers....................................................................................................................................................................... 459
Implementation Information......................................................................................................................................... 460
Conguration Information.............................................................................................................................................460
Conguration Tasks for IS-IS.................................................................................................................................. 461
IS-IS Metric Styles.........................................................................................................................................................475
Congure Metric Values................................................................................................................................................475
Maximum Values in the Routing Table...................................................................................................................475
Change the IS-IS Metric Style in One Level Only................................................................................................475
Leaks from One Level to Another.......................................................................................................................... 477
Sample Congurations.................................................................................................................................................. 478
28 Link Aggregation Control Protocol (LACP).............................................................................................. 482
Introduction to Dynamic LAGs and LACP...................................................................................................................482
Important Points to Remember..............................................................................................................................482
LACP Modes............................................................................................................................................................ 483
Conguring LACP Commands............................................................................................................................... 483
LACP Conguration Tasks............................................................................................................................................484
16
Contents
Creating a LAG.........................................................................................................................................................484
Conguring the LAG Interfaces as Dynamic........................................................................................................ 484
Setting the LACP Long Timeout........................................................................................................................... 485
Shared LAG State Tracking.......................................................................................................................................... 486
Conguring Shared LAG State Tracking.....................................................................................................................486
Important Points about Shared LAG State Tracking........................................................................................... 488
LACP Basic Conguration Example............................................................................................................................ 488
Congure a LAG on ALPHA................................................................................................................................... 488
LACP Fast Switchover..................................................................................................................................................496
Conguring LACP Fast Switchover...................................................................................................................... 496
29 Layer 2.....................................................................................................................................................498
Manage the MAC Address Table................................................................................................................................. 498
Clearing the MAC Address Table........................................................................................................................... 498
Setting the Aging Time for Dynamic Entries........................................................................................................498
Conguring a Static MAC Address........................................................................................................................499
Displaying the MAC Address Table........................................................................................................................499
MAC Learning Limit.......................................................................................................................................................499
Setting the MAC Learning Limit............................................................................................................................ 500
mac learning-limit Dynamic.................................................................................................................................... 500
mac learning-limit station-move............................................................................................................................ 500
Learning Limit Violation Actions.............................................................................................................................500
Setting Station Move Violation Actions.................................................................................................................501
Recovering from Learning Limit and Station Move Violations............................................................................501
Disabling MAC Address Learning on the System................................................................................................ 502
NIC Teaming................................................................................................................................................................... 502
MAC Move Optimization........................................................................................................................................504
30 Link Layer Discovery Protocol (LLDP)..................................................................................................... 505
802.1AB (LLDP) Overview........................................................................................................................................... 505
Protocol Data Units................................................................................................................................................. 505
Optional TLVs.................................................................................................................................................................506
Management TLVs.................................................................................................................................................. 506
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 508
TIA Organizationally Specic TLVs........................................................................................................................508
Extended Power via MDI TLV................................................................................................................................. 512
Congure LLDP.............................................................................................................................................................. 512
Related Conguration Tasks....................................................................................................................................512
Important Points to Remember.............................................................................................................................. 513
LLDP Compatibility...................................................................................................................................................513
CONFIGURATION versus INTERFACE Congurations............................................................................................. 513
Enabling LLDP.................................................................................................................................................................514
Disabling and Undoing LLDP...................................................................................................................................514
Advertising TLVs.............................................................................................................................................................514
Viewing the LLDP Conguration.................................................................................................................................. 515
Viewing Information Advertised by Adjacent LLDP Agents...................................................................................... 516
Contents
17
Conguring LLDPDU Intervals...................................................................................................................................... 517
Conguring Transmit and Receive Mode.....................................................................................................................517
Conguring a Time to Live............................................................................................................................................ 518
Debugging LLDP.............................................................................................................................................................519
Relevant Management Objects................................................................................................................................... 520
31 Microsoft Network Load Balancing...........................................................................................................525
NLB Unicast Mode Scenario........................................................................................................................................525
NLB Multicast Mode Scenario.....................................................................................................................................525
Limitations With Enabling NLB on Switches.............................................................................................................. 526
Benets and Working of Microsoft Clustering...........................................................................................................526
Enable and Disable VLAN Flooding ............................................................................................................................ 526
Conguring a Switch for NLB .....................................................................................................................................526
Multicast NLB Mode............................................................................................................................................... 527
32 Multicast Source Discovery Protocol (MSDP)......................................................................................... 528
Protocol Overview......................................................................................................................................................... 528
Anycast RP.....................................................................................................................................................................530
Implementation Information.......................................................................................................................................... 531
Congure the Multicast Source Discovery Protocol..................................................................................................531
Related Conguration Tasks....................................................................................................................................531
Enabling MSDP..............................................................................................................................................................535
Manage the Source-Active Cache..............................................................................................................................536
Viewing the Source-Active Cache.........................................................................................................................536
Limiting the Source-Active Cache.........................................................................................................................536
Clearing the Source-Active Cache........................................................................................................................ 537
Enabling the Rejected Source-Active Cache....................................................................................................... 537
Accept Source-Active Messages that Fail the RFP Check......................................................................................537
Specifying Source-Active Messages........................................................................................................................... 541
Limiting the Source-Active Messages from a Peer...................................................................................................542
Preventing MSDP from Caching a Local Source.......................................................................................................542
Preventing MSDP from Caching a Remote Source.................................................................................................. 543
Preventing MSDP from Advertising a Local Source..................................................................................................543
Logging Changes in Peership States...........................................................................................................................544
Terminating a Peership..................................................................................................................................................544
Clearing Peer Statistics.................................................................................................................................................545
Debugging MSDP..........................................................................................................................................................545
MSDP with Anycast RP................................................................................................................................................546
Conguring Anycast RP................................................................................................................................................547
Reducing Source-Active Message Flooding.........................................................................................................548
Specifying the RP Address Used in SA Messages.............................................................................................. 548
MSDP Sample Congurations..................................................................................................................................... 550
33 Multiple Spanning Tree Protocol (MSTP)................................................................................................ 553
Protocol Overview.........................................................................................................................................................553
Spanning Tree Variations.............................................................................................................................................. 554
18
Contents
Implementation Information......................................................................................................................................... 554
Congure Multiple Spanning Tree Protocol................................................................................................................554
Related Conguration Tasks...................................................................................................................................555
Enable Multiple Spanning Tree Globally...................................................................................................................... 555
Creating Multiple Spanning Tree Instances................................................................................................................555
Inuencing MSTP Root Selection............................................................................................................................... 556
Interoperate with Non-Dell Networking OS Bridges................................................................................................. 557
Changing the Region Name or Revision..................................................................................................................... 557
Modifying Global Parameters.......................................................................................................................................558
Enable BPDU Filtering Globally.................................................................................................................................... 559
Modifying the Interface Parameters........................................................................................................................... 559
Conguring an EdgePort.............................................................................................................................................. 560
Flush MAC Addresses after a Topology Change........................................................................................................561
MSTP Sample Congurations.......................................................................................................................................561
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................562
Debugging and Verifying MSTP Congurations........................................................................................................ 565
34 Multicast Features................................................................................................................................... 567
Enabling IP Multicast.....................................................................................................................................................567
Implementation Information..........................................................................................................................................567
First Packet Forwarding for Lossless Multicast.........................................................................................................568
Multicast Policies...........................................................................................................................................................568
IPv4 Multicast Policies..................................................................................................................................................568
Limiting the Number of Multicast Routes............................................................................................................ 569
Preventing a Host from Joining a Group.............................................................................................................. 569
Rate Limiting IGMP Join Requests........................................................................................................................572
Preventing a PIM Router from Forming an Adjacency........................................................................................572
Preventing a Source from Registering with the RP............................................................................................ 572
Preventing a PIM Router from Processing a Join................................................................................................575
Understanding Multicast Traceroute (mtrace)...........................................................................................................575
Important Points to Remember..............................................................................................................................576
Printing Multicast Traceroute (mtrace) Paths............................................................................................................576
Supported Error Codes................................................................................................................................................. 577
mtrace Scenarios........................................................................................................................................................... 578
35 Object Tracking....................................................................................................................................... 584
Object Tracking Overview............................................................................................................................................ 584
Track Layer 2 Interfaces......................................................................................................................................... 585
Track Layer 3 Interfaces......................................................................................................................................... 585
Track IPv4 and IPv6 Routes...................................................................................................................................585
Set Tracking Delays................................................................................................................................................. 585
VRRP Object Tracking............................................................................................................................................ 586
Object Tracking Conguration..................................................................................................................................... 586
Tracking a Layer 2 Interface...................................................................................................................................586
Tracking a Layer 3 Interface................................................................................................................................... 587
Contents
19
Track an IPv4/IPv6 Route...................................................................................................................................... 588
Displaying Tracked Objects...........................................................................................................................................589
36 Open Shortest Path First (OSPFv2 and OSPFv3).................................................................................... 591
Protocol Overview..........................................................................................................................................................591
Autonomous System (AS) Areas............................................................................................................................591
Area Types................................................................................................................................................................ 592
Networks and Neighbors........................................................................................................................................593
Router Types............................................................................................................................................................ 593
Link-State Advertisements (LSAs)........................................................................................................................595
Router Priority and Cost.........................................................................................................................................596
OSPF with the Dell Networking OS............................................................................................................................ 597
Graceful Restart...................................................................................................................................................... 598
Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................599
Processing SNMP and Sending SNMP Traps......................................................................................................599
OSPF ACK Packing................................................................................................................................................. 599
Setting OSPF Adjacency with Cisco Routers...................................................................................................... 599
Conguration Information.............................................................................................................................................600
Conguration Task List for OSPFv2 (OSPF for IPv4)........................................................................................ 600
Troubleshooting OSPFv2..........................................................................................................................................611
OSPFv3 NSSA................................................................................................................................................................615
NSSA Options...........................................................................................................................................................615
Conguration Task List for OSPFv3 (OSPF for IPv6)............................................................................................... 615
Enabling IPv6 Unicast Routing............................................................................................................................... 616
Applying cost for OSPFv3.......................................................................................................................................616
Assigning IPv6 Addresses on an Interface.............................................................................................................617
Assigning Area ID on an Interface...........................................................................................................................617
Assigning OSPFv3 Process ID and Router ID Globally.........................................................................................617
Conguring Stub Areas............................................................................................................................................618
Conguring Passive-Interface.................................................................................................................................618
Redistributing Routes.............................................................................................................................................. 619
Conguring a Default Route....................................................................................................................................619
Enabling OSPFv3 Graceful Restart........................................................................................................................619
Displaying Graceful Restart.................................................................................................................................... 620
OSPFv3 Authentication Using IPsec......................................................................................................................621
37 Policy-based Routing (PBR).................................................................................................................... 629
Overview.........................................................................................................................................................................629
Implementing Policy-based Routing with Dell Networking OS................................................................................. 631
Conguration Task List for Policy-based Routing.......................................................................................................631
PBR Exceptions (Permit)....................................................................................................................................... 633
Apply a Redirect-list to an Interface using a Redirect-group................................................................................... 635
Show Redirect List Conguration..........................................................................................................................636
Sample Conguration.................................................................................................................................................... 637
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD......637
20
Contents
/