PowerSwitch S4048-ON

Dell PowerSwitch S4048-ON Quick start guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4048-ON Quick start guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S4048–ON
System
9.14.2.2
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2019 - 07
Rev. A00
Contents
1 About this Guide...........................................................................................................................................38
Audience............................................................................................................................................................................38
Conventions......................................................................................................................................................................38
Related Documents......................................................................................................................................................... 38
2 Conguration Fundamentals........................................................................................................................ 39
Accessing the Command Line........................................................................................................................................39
CLI Modes.........................................................................................................................................................................39
Navigating CLI Modes................................................................................................................................................41
The do Command............................................................................................................................................................ 44
Undoing Commands........................................................................................................................................................ 44
Obtaining Help..................................................................................................................................................................45
Entering and Editing Commands................................................................................................................................... 45
Command History............................................................................................................................................................46
Filtering show Command Outputs.................................................................................................................................46
Example of the grep Keyword.................................................................................................................................. 46
Multiple Users in Conguration Mode........................................................................................................................... 47
3 Getting Started............................................................................................................................................48
Console Access................................................................................................................................................................49
Serial Console.............................................................................................................................................................49
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................50
Entering CLI commands Using an SSH Connection..............................................................................................50
Executing Local CLI Scripts Using an SSH Connection........................................................................................50
Default Conguration....................................................................................................................................................... 51
Conguring a Host Name................................................................................................................................................ 51
Accessing the System Remotely.................................................................................................................................... 51
Accessing the System Remotely.............................................................................................................................. 51
Congure the Management Port IP Address..........................................................................................................51
Congure a Management Route..............................................................................................................................52
Conguring a Username and Password..................................................................................................................52
Conguring the Enable Password..................................................................................................................................53
Conguration File Management.....................................................................................................................................53
Copy Files to and from the System......................................................................................................................... 54
Mounting an NFS File System..................................................................................................................................54
Save the Running-Conguration..............................................................................................................................56
Congure the Overload Bit for a Startup Scenario................................................................................................57
Viewing Files............................................................................................................................................................... 57
Compressing Conguration Files............................................................................................................................. 58
Managing the File System.............................................................................................................................................. 60
Enabling Software Features on Devices Using a Command Option.......................................................................... 61
View Command History................................................................................................................................................... 61
Contents
3
Upgrading Dell EMC Networking OS............................................................................................................................ 63
Verify Software Images Before Installation...................................................................................................................63
Using HTTP for File Transfers........................................................................................................................................ 64
4 Management............................................................................................................................................... 66
Conguring Privilege Levels........................................................................................................................................... 66
Creating a Custom Privilege Level........................................................................................................................... 67
Removing a Command from EXEC Mode.............................................................................................................. 67
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................67
Allowing Access to CONFIGURATION Mode Commands.................................................................................... 67
Allowing Access to Dierent Modes........................................................................................................................67
Applying a Privilege Level to a Username............................................................................................................... 69
Applying a Privilege Level to a Terminal Line.......................................................................................................... 69
Conguring Logging........................................................................................................................................................ 69
Audit and Security Logs............................................................................................................................................ 70
Conguring Logging Format ...................................................................................................................................72
Display the Logging Buer and the Logging Conguration.................................................................................. 72
Setting Up a Secure Connection to a Syslog Server.............................................................................................73
Sending System Messages to a Syslog Server...................................................................................................... 74
Track Login Activity..........................................................................................................................................................74
Restrictions for Tracking Login Activity...................................................................................................................74
Conguring Login Activity Tracking..........................................................................................................................74
Display Login Statistics..............................................................................................................................................75
Limit Concurrent Login Sessions....................................................................................................................................76
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................76
Conguring Concurrent Session Limit.....................................................................................................................77
Enabling the System to Clear Existing Sessions.....................................................................................................77
Enabling Secured CLI Mode............................................................................................................................................78
Log Messages in the Internal Buer..............................................................................................................................78
Conguration Task List for System Log Management.......................................................................................... 78
Disabling System Logging............................................................................................................................................... 78
Sending System Messages to a Syslog Server............................................................................................................ 79
Conguring a UNIX System as a Syslog Server.....................................................................................................79
Changing System Logging Settings...............................................................................................................................79
Display the Logging Buer and the Logging Conguration........................................................................................80
Conguring a UNIX Logging Facility Level.....................................................................................................................81
Synchronizing Log Messages......................................................................................................................................... 82
Enabling Timestamp on Syslog Messages....................................................................................................................82
File Transfer Services...................................................................................................................................................... 85
Conguration Task List for File Transfer Services..................................................................................................85
Enabling the FTP Server...........................................................................................................................................85
Conguring FTP Server Parameters....................................................................................................................... 86
Conguring FTP Client Parameters.........................................................................................................................86
Terminal Lines................................................................................................................................................................... 87
Denying and Permitting Access to a Terminal Line................................................................................................ 87
Conguring Login Authentication for Terminal Lines.............................................................................................88
4
Contents
Setting Timeout for EXEC Privilege Mode................................................................................................................... 89
Using Telnet to get to Another Network Device..........................................................................................................89
Lock CONFIGURATION Mode.......................................................................................................................................90
Viewing the Conguration Lock Status...................................................................................................................90
Reloading the system...................................................................................................................................................... 90
Restoring the Factory Default Settings......................................................................................................................... 91
Important Points to Remember................................................................................................................................ 91
Restoring Factory Default Environment Variables................................................................................................. 92
Viewing the Reason for Last System Reboot...............................................................................................................93
5 802.1X..........................................................................................................................................................94
Port-Authentication Process..........................................................................................................................................96
EAP over RADIUS......................................................................................................................................................96
Conguring 802.1X........................................................................................................................................................... 97
Related Conguration Tasks..................................................................................................................................... 97
Important Points to Remember......................................................................................................................................97
Enabling 802.1X................................................................................................................................................................ 98
Conguring dot1x Prole ................................................................................................................................................99
Conguring MAC addresses for a do1x Prole........................................................................................................... 100
Conguring the Static MAB and MAB Prole ........................................................................................................... 100
Conguring Critical VLAN .............................................................................................................................................101
Conguring Request Identity Re-Transmissions......................................................................................................... 102
Conguring a Quiet Period after a Failed Authentication....................................................................................102
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................103
Re-Authenticating a Port.............................................................................................................................................. 104
Conguring Timeouts.................................................................................................................................................... 105
Conguring Dynamic VLAN Assignment with Port Authentication.........................................................................106
Guest and Authentication-Fail VLANs......................................................................................................................... 107
Conguring a Guest VLAN......................................................................................................................................107
Conguring an Authentication-Fail VLAN............................................................................................................. 107
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 109
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 109
Guidelines for Conguring ACL VLAN Groups............................................................................................................ 110
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters............................................... 110
Conguring ACL VLAN Groups............................................................................................................................... 110
Conguring FP Blocks for VLAN Parameters.........................................................................................................111
Viewing CAM Usage....................................................................................................................................................... 112
Allocating FP Blocks for VLAN Processes................................................................................................................... 113
Unied Forwarding Table (UFT) Modes....................................................................................................................... 114
Conguring UFT Modes...........................................................................................................................................114
7 Access Control Lists (ACLs)........................................................................................................................115
IP Access Control Lists (ACLs)......................................................................................................................................116
CAM Usage................................................................................................................................................................117
Implementing ACLs on Dell EMC Networking OS.................................................................................................117
Contents
5
Important Points to Remember.....................................................................................................................................119
Conguration Task List for Route Maps.................................................................................................................119
Conguring Match Routes.......................................................................................................................................121
Conguring Set Conditions..................................................................................................................................... 123
Congure a Route Map for Route Redistribution.................................................................................................124
Congure a Route Map for Route Tagging............................................................................................................124
Continue Clause........................................................................................................................................................125
IP Fragment Handling.................................................................................................................................................... 125
IP Fragments ACL Examples...................................................................................................................................125
Layer 4 ACL Rules Examples...................................................................................................................................126
Congure a Standard IP ACL........................................................................................................................................ 126
Conguring a Standard IP ACL Filter..................................................................................................................... 127
Congure an Extended IP ACL..................................................................................................................................... 128
Conguring Filters with a Sequence Number....................................................................................................... 128
Conguring Filters Without a Sequence Number................................................................................................ 130
Congure Layer 2 and Layer 3 ACLs............................................................................................................................130
Assign an IP ACL to an Interface...................................................................................................................................131
Applying an IP ACL..........................................................................................................................................................131
Counting ACL Hits....................................................................................................................................................132
Congure Ingress ACLs................................................................................................................................................. 132
Congure Egress ACLs.................................................................................................................................................. 133
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 134
IP Prex Lists.................................................................................................................................................................. 134
Implementation Information.................................................................................................................................... 135
Conguration Task List for Prex Lists.................................................................................................................. 135
ACL Remarks.................................................................................................................................................................. 138
Conguring a Remark.............................................................................................................................................. 138
Deleting a Remark.................................................................................................................................................... 139
ACL Resequencing......................................................................................................................................................... 140
Resequencing an ACL or Prex List.......................................................................................................................140
Route Maps......................................................................................................................................................................141
Implementation Information..................................................................................................................................... 141
Logging of ACL Processes............................................................................................................................................ 142
Guidelines for Conguring ACL Logging................................................................................................................143
Conguring ACL Logging.........................................................................................................................................143
Flow-Based Monitoring..................................................................................................................................................144
Behavior of Flow-Based Monitoring.......................................................................................................................144
Enabling Flow-Based Monitoring............................................................................................................................145
Conguring UDF ACL.................................................................................................................................................... 146
Conguring IP Mirror Access Group............................................................................................................................ 149
Sample Conguration.............................................................................................................................................. 150
Example of viewing IP mirror–access–group applied to an Interface............................................................... 150
8 Bidirectional Forwarding Detection (BFD)................................................................................................... 151
How BFD Works.............................................................................................................................................................. 151
BFD Packet Format..................................................................................................................................................152
6
Contents
BFD Sessions............................................................................................................................................................ 153
BFD Three-Way Handshake.................................................................................................................................... 154
Session State Changes............................................................................................................................................156
Important Points to Remember....................................................................................................................................156
Congure BFD.................................................................................................................................................................157
Congure BFD for Physical Ports...........................................................................................................................157
Congure BFD for Static Routes............................................................................................................................159
Congure BFD for IPv6 Static Routes...................................................................................................................162
Congure BFD for OSPF.........................................................................................................................................165
Congure BFD for OSPFv3.....................................................................................................................................170
Congure BFD for IS-IS...........................................................................................................................................173
Congure BFD for BGP........................................................................................................................................... 175
Congure BFD for VRRP.........................................................................................................................................183
Conguring Protocol Liveness................................................................................................................................185
9 Border Gateway Protocol (BGP)................................................................................................................ 186
BGP IP version 4 (BGPv4) Overview..........................................................................................................................186
BGP Autonomous Systems.....................................................................................................................................186
AS4 Number Representation.................................................................................................................................. 188
Four-Byte AS Numbers........................................................................................................................................... 190
BGP router ID............................................................................................................................................................190
Sessions and Peers.................................................................................................................................................. 190
Establish a Session....................................................................................................................................................191
BGP Attributes for selecting Best Path..................................................................................................................191
Multiprotocol BGP....................................................................................................................................................196
BGP global and address family conguration........................................................................................................197
Implement BGP with Dell EMC Networking OS...................................................................................................199
Conguration Information.......................................................................................................................................202
Basic BGP conguration tasks.....................................................................................................................................202
Prerequisite for conguring a BGP network.........................................................................................................202
Restrictions...............................................................................................................................................................203
Enabling BGP........................................................................................................................................................... 203
Enabling four-byte autonomous system numbers............................................................................................... 205
Changing a BGP router ID...................................................................................................................................... 206
Conguring AS4 Number Representations.......................................................................................................... 206
Conguring a BGP peer..........................................................................................................................................208
Example-Conguring BGP routing between peers............................................................................................. 209
BGP peer group........................................................................................................................................................210
Advanced BGP conguration tasks............................................................................................................................. 216
Route-refresh and Soft-reconguration................................................................................................................ 217
Aggregating Routes..................................................................................................................................................219
Filtering BGP.............................................................................................................................................................221
Conguring BGP Fast Fall-Over............................................................................................................................ 228
Conguring Passive Peering...................................................................................................................................229
Enabling Graceful Restart.......................................................................................................................................230
Redistributing Routes...............................................................................................................................................231
Contents
7
Redistributing iBGP Routes into IGP.....................................................................................................................232
Enabling Additional Paths........................................................................................................................................234
Conguring IP Community Lists............................................................................................................................ 235
Conguring an IP Extended Community List....................................................................................................... 236
Congure BGP attributes........................................................................................................................................237
Enabling Multipath....................................................................................................................................................241
Route Reectors...................................................................................................................................................... 242
Enabling Route Flap Dampening............................................................................................................................ 243
Changing BGP keepalive and hold timers.............................................................................................................246
Setting the extended timer.....................................................................................................................................247
Enabling or disabling BGP neighbors.....................................................................................................................247
Route Map Continue............................................................................................................................................... 248
Conguring BGP Confederations.......................................................................................................................... 249
Conguring a BGP VRF address family................................................................................................................ 250
Maintaining Existing AS Numbers During an AS Migration................................................................................. 251
Allowing an AS Number to Appear in its Own AS Path...................................................................................... 252
Enabling MBGP Congurations............................................................................................................................. 253
MBGP support for IPv6..........................................................................................................................................253
Conguring IPv6 MBGP between peers.............................................................................................................. 253
Example-Conguring IPv4 and IPv6 neighbors................................................................................................... 254
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor......................................... 256
BGP Regular Expression Optimization..................................................................................................................258
Debugging BGP....................................................................................................................................................... 258
10 Content Addressable Memory (CAM)....................................................................................................... 261
CAM Allocation............................................................................................................................................................... 261
Test CAM Usage............................................................................................................................................................263
View CAM-ACL Settings.............................................................................................................................................. 263
View CAM Usage...........................................................................................................................................................265
Conguring CAM Threshold and Silence Period........................................................................................................265
Setting CAM Threshold and Silence Period......................................................................................................... 265
CAM Optimization......................................................................................................................................................... 266
Troubleshoot CAM Proling..........................................................................................................................................267
QoS CAM Region Limitation...................................................................................................................................267
11 Control Plane Policing (CoPP).................................................................................................................. 268
Congure Control Plane Policing................................................................................................................................. 269
Conguring CoPP for Protocols.............................................................................................................................270
Conguring CoPP for CPU Queues.......................................................................................................................272
CoPP for OSPFv3 Packets.....................................................................................................................................273
Conguring CoPP for OSPFv3...............................................................................................................................276
Displaying CoPP Conguration ............................................................................................................................. 276
12 Data Center Bridging (DCB)..................................................................................................................... 279
Ethernet Enhancements in Data Center Bridging......................................................................................................279
Priority-Based Flow Control................................................................................................................................... 280
8
Contents
Enhanced Transmission Selection...........................................................................................................................281
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................282
Data Center Bridging in a Trac Flow...................................................................................................................283
Enabling Data Center Bridging..................................................................................................................................... 283
DCB Maps and its Attributes..................................................................................................................................284
Data Center Bridging: Default Conguration..............................................................................................................285
Conguring Priority-Based Flow Control....................................................................................................................285
Conguring Lossless Queues................................................................................................................................. 286
Conguring PFC in a DCB Map....................................................................................................................................287
PFC Conguration Notes........................................................................................................................................287
PFC Prerequisites and Restrictions....................................................................................................................... 288
Applying a DCB Map on a Port.................................................................................................................................... 288
Conguring PFC without a DCB Map.........................................................................................................................289
Conguring Lossless QueuesExample:..................................................................................................................289
Priority-Based Flow Control Using Dynamic Buer Method.................................................................................... 291
Pause and Resume of Trac.................................................................................................................................. 291
Buer Sizes for Lossless or PFC Packets............................................................................................................. 291
Behavior of Tagged Packets.........................................................................................................................................292
Conguration Example for DSCP and PFC Priorities................................................................................................292
Using PFC to Manage Converged Ethernet Trac...................................................................................................293
Congure Enhanced Transmission Selection..............................................................................................................293
ETS Prerequisites and Restrictions....................................................................................................................... 294
Creating an ETS Priority Group..............................................................................................................................294
ETS Operation with DCBx......................................................................................................................................295
Conguring Bandwidth Allocation for DCBx CIN................................................................................................ 295
Conguring ETS in a DCB Map..............................................................................................................................296
Hierarchical Scheduling in ETS Output Policies......................................................................................................... 297
Using ETS to Manage Converged Ethernet Trac...................................................................................................298
Applying DCB Policies in a Switch Stack.................................................................................................................... 298
Congure a DCBx Operation........................................................................................................................................298
DCBx Operation.......................................................................................................................................................299
DCBx Port Roles......................................................................................................................................................299
DCB Conguration Exchange................................................................................................................................ 300
Conguration Source Election................................................................................................................................ 301
Propagation of DCB Information............................................................................................................................ 301
Auto-Detection and Manual Conguration of the DCBx Version.......................................................................301
DCBx Example......................................................................................................................................................... 302
DCBx Prerequisites and Restrictions.....................................................................................................................302
Conguring DCBx....................................................................................................................................................303
Verifying the DCB Conguration................................................................................................................................. 306
QoS dot1p Trac Classication and Queue Assignment...........................................................................................316
Conguring the Dynamic Buer Method.................................................................................................................... 317
Sample DCB Conguration............................................................................................................................................318
PFC and ETS Conguration Command Examples............................................................................................... 319
13 Dynamic Host Conguration Protocol (DHCP).........................................................................................320
Contents
9
DHCP Packet Format and Options............................................................................................................................. 320
Assign an IP Address using DHCP...............................................................................................................................322
Implementation Information..........................................................................................................................................323
Congure the System to be a DHCP Server..............................................................................................................323
Conguring the Server for Automatic Address Allocation..................................................................................324
Specifying a Default Gateway................................................................................................................................ 325
Congure a Method of Hostname Resolution..................................................................................................... 326
Using DNS for Address Resolution........................................................................................................................326
Using NetBIOS WINS for Address Resolution..................................................................................................... 326
Creating Manual Binding Entries............................................................................................................................326
Debugging the DHCP Server................................................................................................................................. 327
Using DHCP Clear Commands...............................................................................................................................327
Congure the System to be a Relay Agent.................................................................................................................327
Congure the System to be a DHCP Client............................................................................................................... 329
Conguring the DHCP Client System...................................................................................................................329
DHCP Client on a Management Interface.............................................................................................................331
DHCP Client Operation with Other Features........................................................................................................331
DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................ 332
Conguring Route Leaking between VRFs on DHCP Relay Agent................................................................... 332
Non-default VRF conguration for DHCPv6 helper address................................................................................... 333
Conguring DHCP relay source interface...................................................................................................................334
Global DHCP relay source IPv4 or IPv6 conguration ....................................................................................... 334
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................334
Congure the System for User Port Stacking (Option 230)....................................................................................336
Congure Secure DHCP...............................................................................................................................................336
Option 82 (DHCPv4 relay options)........................................................................................................................336
DHCPv6 relay agent options.................................................................................................................................. 337
DHCP Snooping....................................................................................................................................................... 337
Drop DHCP Packets on Snooped VLANs Only....................................................................................................342
Dynamic ARP Inspection.........................................................................................................................................342
Conguring Dynamic ARP Inspection................................................................................................................... 343
Source Address Validation............................................................................................................................................ 345
Enabling IP Source Address Validation..................................................................................................................345
DHCP MAC Source Address Validation................................................................................................................ 346
Enabling IP+MAC Source Address Validation.......................................................................................................346
Viewing the Number of SAV Dropped Packets....................................................................................................347
Clearing the Number of SAV Dropped Packets................................................................................................... 347
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 348
ECMP for Flow-Based Anity.....................................................................................................................................348
Conguring the Hash Algorithm............................................................................................................................ 348
Enabling Deterministic ECMP Next Hop.............................................................................................................. 348
Conguring the Hash Algorithm Seed.................................................................................................................. 349
Link Bundle Monitoring................................................................................................................................................. 349
Managing ECMP Group Paths...............................................................................................................................350
Creating an ECMP Group Bundle..........................................................................................................................350
10
Contents
Modifying the ECMP Group Threshold................................................................................................................ 350
RTAG7..............................................................................................................................................................................351
Flow-based Hashing for ECMP................................................................................................................................... 352
15 FIP Snooping............................................................................................................................................355
Fibre Channel over Ethernet........................................................................................................................................355
Ensure Robustness in a Converged Ethernet Network............................................................................................355
FIP Snooping on Ethernet Bridges.............................................................................................................................. 357
FIP Snooping in a Switch Stack...................................................................................................................................359
Using FIP Snooping....................................................................................................................................................... 359
FIP Snooping Prerequisites.....................................................................................................................................359
Important Points to Remember............................................................................................................................. 359
Enabling the FCoE Transit Feature........................................................................................................................360
Enable FIP Snooping on VLANs............................................................................................................................. 361
Congure the FC-MAP Value................................................................................................................................. 361
Congure a Port for a Bridge-to-Bridge Link........................................................................................................361
Congure a Port for a Bridge-to-FCF Link............................................................................................................361
Impact on Other Software Features...................................................................................................................... 361
FIP Snooping Restrictions...................................................................................................................................... 362
Conguring FIP Snooping.......................................................................................................................................362
Displaying FIP Snooping Information...........................................................................................................................363
FCoE Transit Conguration Example...........................................................................................................................368
16 Flex Hash and Optimized Boot-Up............................................................................................................370
Flex Hash Capability Overview.....................................................................................................................................370
Conguring the Flex Hash Mechanism....................................................................................................................... 370
Conguring Fast Boot and LACP Fast Switchover....................................................................................................371
Optimizing the Boot Time..............................................................................................................................................371
Booting Process When Optimized Boot Time Mechanism is Enabled...............................................................371
Guidelines for Conguring Optimized Booting Mechanism................................................................................ 372
Interoperation of Applications with Fast Boot and System States.......................................................................... 373
LACP and IPv4 Routing...........................................................................................................................................373
LACP and IPv6 Routing.......................................................................................................................................... 373
BGP Graceful Restart..............................................................................................................................................374
Cold Boot Caused by Power Cycling the System................................................................................................ 374
Unexpected Reload of the System........................................................................................................................ 374
Software Upgrade....................................................................................................................................................374
LACP Fast Switchover............................................................................................................................................ 374
Changes to BGP Multipath.....................................................................................................................................375
Delayed Installation of ECMP Routes Into BGP...................................................................................................375
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................375
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 376
17 FIPS Cryptography................................................................................................................................... 377
Conguration Tasks........................................................................................................................................................377
Preparing the System....................................................................................................................................................377
Contents
11
Enabling FIPS Mode...................................................................................................................................................... 378
Generating Host-Keys................................................................................................................................................... 378
Monitoring FIPS Mode Status......................................................................................................................................378
Disabling FIPS Mode......................................................................................................................................................379
18 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 380
Protocol Overview.........................................................................................................................................................380
Ring Status................................................................................................................................................................381
Multiple FRRP Rings................................................................................................................................................ 381
Important FRRP Points...........................................................................................................................................382
Important FRRP Concepts..................................................................................................................................... 383
Implementing FRRP.......................................................................................................................................................384
FRRP Conguration.......................................................................................................................................................384
Creating the FRRP Group.......................................................................................................................................384
Conguring the Control VLAN...............................................................................................................................385
Conguring and Adding the Member VLANs.......................................................................................................386
Setting the FRRP Timers........................................................................................................................................ 387
Clearing the FRRP Counters.................................................................................................................................. 387
Viewing the FRRP Conguration........................................................................................................................... 387
Viewing the FRRP Information...............................................................................................................................387
Troubleshooting FRRP.................................................................................................................................................. 388
Conguration Checks..............................................................................................................................................388
Sample Conguration and Topology............................................................................................................................388
FRRP Support on VLT...................................................................................................................................................389
Example Scenario.................................................................................................................................................... 390
Important Points to Remember.............................................................................................................................. 391
19 GARP VLAN Registration Protocol (GVRP)..............................................................................................392
Important Points to Remember................................................................................................................................... 392
Congure GVRP............................................................................................................................................................ 393
Related Conguration Tasks...................................................................................................................................393
Enabling GVRP Globally................................................................................................................................................ 394
Enabling GVRP on a Layer 2 Interface........................................................................................................................394
Congure GVRP Registration...................................................................................................................................... 394
Congure a GARP Timer.............................................................................................................................................. 395
RPM Redundancy..........................................................................................................................................................395
20 High Availability (HA)............................................................................................................................... 397
Component Redundancy.............................................................................................................................................. 397
Automatic and Manual Stack Unit Failover...........................................................................................................397
Synchronization between Management and Standby Units..............................................................................398
Forcing a Stack Unit Failover................................................................................................................................. 398
Disabling Auto-Reboot............................................................................................................................................ 399
Pre-Conguring a Stack Unit Slot............................................................................................................................... 399
Removing a Provisioned Logical Stack Unit............................................................................................................... 399
Hitless Behavior............................................................................................................................................................. 399
12
Contents
Graceful Restart............................................................................................................................................................ 400
Software Resiliency.......................................................................................................................................................400
Software Component Health Monitoring............................................................................................................. 400
System Health Monitoring......................................................................................................................................400
Failure and Event Logging...................................................................................................................................... 400
Hot-Lock Behavior......................................................................................................................................................... 401
21 Internet Group Management Protocol (IGMP)......................................................................................... 402
IGMP Implementation Information.............................................................................................................................. 402
IGMP Protocol Overview..............................................................................................................................................402
IGMP Version 2........................................................................................................................................................ 402
IGMP Version 3........................................................................................................................................................404
Congure IGMP............................................................................................................................................................. 407
Related Conguration Tasks................................................................................................................................... 407
Viewing IGMP Enabled Interfaces...............................................................................................................................408
Selecting an IGMP Version...........................................................................................................................................408
Viewing IGMP Groups...................................................................................................................................................409
Adjusting Timers............................................................................................................................................................ 409
Adjusting Query and Response Timers................................................................................................................. 409
Preventing a Host from Joining a Group..................................................................................................................... 410
Enabling IGMP Immediate-Leave................................................................................................................................. 413
IGMP Snooping...............................................................................................................................................................413
IGMP Snooping Implementation Information........................................................................................................413
Conguring IGMP Snooping................................................................................................................................... 413
Removing a Group-Port Association......................................................................................................................414
Disabling Multicast Flooding....................................................................................................................................414
Specifying a Port as Connected to a Multicast Router....................................................................................... 415
Conguring the Switch as Querier.........................................................................................................................415
Fast Convergence after MSTP Topology Changes....................................................................................................416
Egress Interface Selection (EIS) for HTTP and IGMP Applications.........................................................................416
Protocol Separation..................................................................................................................................................416
Enabling and Disabling Management Egress Interface Selection....................................................................... 417
Handling of Management Route Conguration....................................................................................................418
Handling of Switch-Initiated Trac........................................................................................................................419
Handling of Switch-Destined Trac...................................................................................................................... 419
Handling of Transit Trac (Trac Separation).................................................................................................... 420
Mapping of Management Applications and Trac Type.....................................................................................420
Behavior of Various Applications for Switch-Initiated Trac .............................................................................421
Behavior of Various Applications for Switch-Destined Trac ...........................................................................422
Interworking of EIS With Various Applications.....................................................................................................423
Designating a Multicast Router Interface................................................................................................................... 423
22 Interfaces................................................................................................................................................ 425
Basic Interface Conguration.......................................................................................................................................425
Advanced Interface Conguration...............................................................................................................................425
Interface Types...............................................................................................................................................................426
Contents
13
View Basic Interface Information.................................................................................................................................426
Resetting an Interface to its Factory Default State...................................................................................................428
Enabling a Physical Interface........................................................................................................................................429
Physical Interfaces.........................................................................................................................................................429
Conguration Task List for Physical Interfaces....................................................................................................429
Overview of Layer Modes...................................................................................................................................... 430
Conguring Layer 2 (Data Link) Mode..................................................................................................................430
Conguring Layer 2 (Interface) Mode.................................................................................................................. 430
Conguring Layer 3 (Network) Mode....................................................................................................................431
Conguring Layer 3 (Interface) Mode................................................................................................................... 431
Monitoring internal physical temperature of 10GBase-T optical ports.................................................................... 432
Enabling temperature polling on ports...................................................................................................................434
Setting the reset port to normal mode................................................................................................................. 434
Automatic recovery of an Err-disabled interface....................................................................................................... 434
Conguring an automatic recovery for an Err-disabled interface......................................................................435
Egress Interface Selection (EIS)..................................................................................................................................436
Important Points to Remember............................................................................................................................. 436
Conguring EIS........................................................................................................................................................ 436
Management Interfaces................................................................................................................................................436
Conguring Management Interfaces.....................................................................................................................436
Conguring a Management Interface on an Ethernet Port................................................................................438
VLAN Interfaces............................................................................................................................................................ 439
Loopback Interfaces......................................................................................................................................................439
Null Interfaces................................................................................................................................................................ 440
Port Channel Interfaces................................................................................................................................................440
Port Channel Denition and Standards.................................................................................................................440
Port Channel Benets.............................................................................................................................................440
Port Channel Implementation................................................................................................................................. 441
Interfaces in Port Channels.....................................................................................................................................441
Conguration Tasks for Port Channel Interfaces.................................................................................................442
Creating a Port Channel..........................................................................................................................................442
Adding a Physical Interface to a Port Channel.....................................................................................................442
Reassigning an Interface to a New Port Channel................................................................................................444
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 445
Adding or Removing a Port Channel from a VLAN............................................................................................. 445
Assigning an IP Address to a Port Channel.......................................................................................................... 446
Deleting or Disabling a Port Channel.....................................................................................................................446
Load Balancing Through Port Channels................................................................................................................447
Changing the Hash Algorithm................................................................................................................................ 447
Bulk Conguration......................................................................................................................................................... 448
Interface Range........................................................................................................................................................448
Bulk Conguration Examples..................................................................................................................................448
Dening Interface Range Macros................................................................................................................................ 450
Dene the Interface Range.................................................................................................................................... 450
Choosing an Interface-Range Macro....................................................................................................................450
14
Contents
Monitoring and Maintaining Interfaces....................................................................................................................... 450
Maintenance Using TDR..........................................................................................................................................451
Non Dell-Qualied Transceivers................................................................................................................................... 452
Splitting 40G Ports without Reload.............................................................................................................................452
Splitting QSFP Ports to SFP+ Ports........................................................................................................................... 454
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................454
Important Points to Remember............................................................................................................................. 455
Example Scenarios.................................................................................................................................................. 455
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................456
Link Dampening..............................................................................................................................................................457
Important Points to Remember..............................................................................................................................457
Conguration Example of Link Dampening.......................................................................................................... 458
Enabling Link Dampening........................................................................................................................................460
Link Bundle Monitoring.................................................................................................................................................. 461
Using Ethernet Pause Frames for Flow Control........................................................................................................ 462
Enabling Pause Frames........................................................................................................................................... 462
Congure the MTU Size on an Interface....................................................................................................................463
Port-Pipes.......................................................................................................................................................................464
Auto-Negotiation on Ethernet Interfaces...................................................................................................................464
Setting the speed to 10/100/1000 Mbps on SFP-1G-T transceiver..................................................................464
Setting the Speed of Ethernet Interfaces............................................................................................................ 464
Set Auto-Negotiation Options............................................................................................................................... 466
View Advanced Interface Information.........................................................................................................................466
Conguring the Interface Sampling Size...............................................................................................................467
Conguring the Trac Sampling Size Globally...........................................................................................................468
Dynamic Counters......................................................................................................................................................... 470
Clearing Interface Counters....................................................................................................................................470
Discard Counters............................................................................................................................................................ 471
Display discard counters.......................................................................................................................................... 471
23 Internet Protocol Security (IPSec)...........................................................................................................473
Conguring IPSec .........................................................................................................................................................473
24 IPv4 Routing............................................................................................................................................ 475
IP Addresses...................................................................................................................................................................476
Implementation Information....................................................................................................................................476
Conguration Tasks for IP Addresses..........................................................................................................................476
Assigning IP Addresses to an Interface.......................................................................................................................476
Conguring Static Routes.............................................................................................................................................477
Adding description for IPv4 and IPv6 static routes............................................................................................. 478
Congure Static Routes for the Management Interface.......................................................................................... 479
IPv4 Path MTU Discovery Overview...........................................................................................................................479
Packet handling during MTU mismatch................................................................................................................480
Using the Congured Source IP Address in ICMP Messages..................................................................................480
Conguring the ICMP Source Interface............................................................................................................... 480
Conguring the Duration to Establish a TCP Connection......................................................................................... 481
Contents
15
Enabling Directed Broadcast......................................................................................................................................... 481
Resolution of Host Names.............................................................................................................................................481
Enabling Dynamic Resolution of Host Names............................................................................................................482
Specifying the Local System Domain and a List of Domains................................................................................... 482
Conguring DNS with Traceroute................................................................................................................................483
ARP..................................................................................................................................................................................483
Conguration Tasks for ARP........................................................................................................................................ 484
Conguring Static ARP Entries....................................................................................................................................484
Enabling Proxy ARP.......................................................................................................................................................484
Clearing ARP Cache......................................................................................................................................................485
ARP Learning via Gratuitous ARP............................................................................................................................... 485
Enabling ARP Learning via Gratuitous ARP................................................................................................................485
ARP Learning via ARP Request................................................................................................................................... 485
Conguring ARP Retries...............................................................................................................................................486
ICMP................................................................................................................................................................................487
Conguration Tasks for ICMP...................................................................................................................................... 487
Enabling ICMP Unreachable Messages.......................................................................................................................487
ICMP Redirects.............................................................................................................................................................. 487
UDP Helper.....................................................................................................................................................................488
Congure UDP Helper.............................................................................................................................................488
Important Points to Remember............................................................................................................................. 489
Enabling UDP Helper.....................................................................................................................................................489
Congurations Using UDP Helper............................................................................................................................... 489
UDP Helper with Broadcast-All Addresses.................................................................................................................489
UDP Helper with Subnet Broadcast Addresses.........................................................................................................490
UDP Helper with Congured Broadcast Addresses...................................................................................................491
UDP Helper with No Congured Broadcast Addresses.............................................................................................491
Troubleshooting UDP Helper.........................................................................................................................................491
25 IPv6 Routing............................................................................................................................................493
Protocol Overview.........................................................................................................................................................493
Extended Address Space........................................................................................................................................494
Stateless Autoconguration................................................................................................................................... 494
IPv6 Headers............................................................................................................................................................494
IPv6 Header Fields.................................................................................................................................................. 495
Extension Header Fields..........................................................................................................................................497
Addressing................................................................................................................................................................ 498
Implementing IPv6 with Dell EMC Networking OS...................................................................................................499
ICMPv6...........................................................................................................................................................................500
Path MTU discovery...................................................................................................................................................... 501
IPv6 Neighbor Discovery...............................................................................................................................................501
IPv6 Neighbor Discovery of MTU Packets.......................................................................................................... 502
Conguration Task List for IPv6 RDNSS.................................................................................................................... 502
Conguring the IPv6 Recursive DNS Server....................................................................................................... 502
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................503
Displaying IPv6 RDNSS Information......................................................................................................................504
16
Contents
Secure Shell (SSH) Over an IPv6 Transport..............................................................................................................504
Conguration Tasks for IPv6........................................................................................................................................505
Adjusting Your CAM-Prole....................................................................................................................................505
Assigning an IPv6 Address to an Interface...........................................................................................................506
Assigning a Static IPv6 Route................................................................................................................................506
Conguring Telnet with IPv6..................................................................................................................................507
SNMP over IPv6......................................................................................................................................................507
Displaying IPv6 Information.................................................................................................................................... 507
Displaying an IPv6 Interface Information.............................................................................................................. 508
Showing IPv6 Routes..............................................................................................................................................508
Showing the Running-Conguration for an Interface..........................................................................................510
Clearing IPv6 Routes............................................................................................................................................... 510
Disabling ND Entry Timeout....................................................................................................................................510
Conguring IPv6 RA Guard............................................................................................................................................511
Conguring IPv6 RA Guard on an Interface..........................................................................................................512
Monitoring IPv6 RA Guard...................................................................................................................................... 513
26 iSCSI Optimization................................................................................................................................... 514
iSCSI Optimization Overview........................................................................................................................................514
Monitoring iSCSI Trac Flows................................................................................................................................516
Application of Quality of Service to iSCSI Trac Flows...................................................................................... 516
Information Monitored in iSCSI Trac Flows........................................................................................................516
Detection and Auto-Conguration for Dell EqualLogic Arrays............................................................................ 517
Conguring Detection and Ports for Dell Compellent Arrays..............................................................................517
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer..................................................................518
Enable and Disable iSCSI Optimization..................................................................................................................518
Default iSCSI Optimization Values................................................................................................................................519
iSCSI Optimization Prerequisites.................................................................................................................................. 519
Conguring iSCSI Optimization.................................................................................................................................... 519
Displaying iSCSI Optimization Information.................................................................................................................. 521
27 Intermediate System to Intermediate System...........................................................................................523
IS-IS Protocol Overview................................................................................................................................................523
IS-IS Addressing.............................................................................................................................................................523
Multi-Topology IS-IS...................................................................................................................................................... 524
Transition Mode........................................................................................................................................................524
Interface Support.....................................................................................................................................................525
Adjacencies...............................................................................................................................................................525
Graceful Restart............................................................................................................................................................ 525
Timers....................................................................................................................................................................... 525
Implementation Information..........................................................................................................................................525
Conguration Information.............................................................................................................................................526
Conguration Tasks for IS-IS..................................................................................................................................527
Conguring the Distance of a Route.....................................................................................................................534
Changing the IS-Type..............................................................................................................................................535
Redistributing IPv4 Routes..................................................................................................................................... 537
Contents
17
Redistributing IPv6 Routes.....................................................................................................................................538
Conguring Authentication Passwords.................................................................................................................539
Setting the Overload Bit.........................................................................................................................................539
Debugging IS-IS.......................................................................................................................................................540
IS-IS Metric Styles......................................................................................................................................................... 541
Congure Metric Values................................................................................................................................................ 541
Maximum Values in the Routing Table................................................................................................................... 541
Change the IS-IS Metric Style in One Level Only.................................................................................................541
Leaks from One Level to Another..........................................................................................................................543
Sample Congurations..................................................................................................................................................544
28 Link Aggregation Control Protocol (LACP).............................................................................................. 546
Introduction to Dynamic LAGs and LACP.................................................................................................................. 546
Important Points to Remember............................................................................................................................. 546
LACP Modes............................................................................................................................................................ 547
Conguring LACP Commands............................................................................................................................... 547
LACP Conguration Tasks............................................................................................................................................548
Creating a LAG.........................................................................................................................................................548
Conguring the LAG Interfaces as Dynamic........................................................................................................548
Setting the LACP Long Timeout........................................................................................................................... 549
Monitoring and Debugging LACP..........................................................................................................................549
Shared LAG State Tracking..........................................................................................................................................550
Conguring Shared LAG State Tracking...............................................................................................................550
Important Points about Shared LAG State Tracking...........................................................................................552
LACP Basic Conguration Example............................................................................................................................ 552
Congure a LAG on ALPHA................................................................................................................................... 552
29 Layer 2..................................................................................................................................................... 561
Manage the MAC Address Table..................................................................................................................................561
Clearing the MAC Address Table............................................................................................................................561
Setting the Aging Time for Dynamic Entries.........................................................................................................561
Conguring a Static MAC Address........................................................................................................................562
Displaying the MAC Address Table........................................................................................................................562
MAC Learning Limit.......................................................................................................................................................562
Setting the MAC Learning Limit............................................................................................................................ 563
mac learning-limit Dynamic.................................................................................................................................... 563
mac learning-limit mac-address-sticky................................................................................................................. 563
mac learning-limit station-move............................................................................................................................ 564
mac learning-limit no-station-move...................................................................................................................... 564
Learning Limit Violation Actions.............................................................................................................................564
Setting Station Move Violation Actions................................................................................................................565
Recovering from Learning Limit and Station Move Violations...........................................................................565
Disabling MAC Address Learning on the System................................................................................................ 566
Enabling port security............................................................................................................................................. 566
NIC Teaming...................................................................................................................................................................566
Congure Redundant Pairs...........................................................................................................................................567
18
Contents
Important Points about Conguring Redundant Pairs........................................................................................569
Far-End Failure Detection............................................................................................................................................. 570
FEFD State Changes................................................................................................................................................571
Conguring FEFD.....................................................................................................................................................572
Enabling FEFD on an Interface...............................................................................................................................572
Debugging FEFD......................................................................................................................................................573
30 Link Layer Discovery Protocol (LLDP)..................................................................................................... 575
802.1AB (LLDP) Overview............................................................................................................................................575
Protocol Data Units................................................................................................................................................. 575
Optional TLVs................................................................................................................................................................. 576
Management TLVs...................................................................................................................................................576
TIA-1057 (LLDP-MED) Overview.................................................................................................................................578
TIA Organizationally Specic TLVs........................................................................................................................ 578
Congure LLDP..............................................................................................................................................................582
Related Conguration Tasks...................................................................................................................................582
Important Points to Remember............................................................................................................................. 582
LLDP Compatibility..................................................................................................................................................583
CONFIGURATION versus INTERFACE Congurations............................................................................................ 583
Enabling LLDP................................................................................................................................................................583
Disabling and Undoing LLDP.................................................................................................................................. 584
Enabling LLDP on Management Ports........................................................................................................................584
Disabling and Undoing LLDP on Management Ports..........................................................................................584
Advertising TLVs............................................................................................................................................................ 584
Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................586
Reserved Unrecognized LLDP TLVs..................................................................................................................... 586
Organizational Specic Unrecognized LLDP TLVs..............................................................................................586
Viewing Unrecognized LLDP TLVs........................................................................................................................586
Viewing the LLDP Conguration..................................................................................................................................587
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................587
Examples of Viewing Information Advertised by Neighbors...............................................................................587
Conguring LLDPDU Intervals.....................................................................................................................................590
Conguring LLDP Notication Interval........................................................................................................................591
Conguring LLDP Notication Interval........................................................................................................................591
Conguring Transmit and Receive Mode.................................................................................................................... 591
Conguring the Time to Live Value............................................................................................................................. 592
Debugging LLDP............................................................................................................................................................593
Relevant Management Objects................................................................................................................................... 594
31 Microsoft Network Load Balancing...........................................................................................................599
NLB Unicast Mode Scenario........................................................................................................................................599
NLB Multicast Mode Scenario.....................................................................................................................................599
Limitations of the NLB Feature....................................................................................................................................600
Microsoft Clustering......................................................................................................................................................600
Enable and Disable VLAN Flooding ............................................................................................................................ 600
Conguring a Switch for NLB .....................................................................................................................................600
Contents
19
Enabling a Switch for Multicast NLB.....................................................................................................................601
32 Multicast Source Discovery Protocol (MSDP)......................................................................................... 602
Protocol Overview.........................................................................................................................................................602
Anycast RP.....................................................................................................................................................................603
Implementation Information......................................................................................................................................... 604
Congure Multicast Source Discovery Protocol........................................................................................................604
Related Conguration Tasks...................................................................................................................................604
Enable MSDP.................................................................................................................................................................608
Manage the Source-Active Cache..............................................................................................................................609
Viewing the Source-Active Cache........................................................................................................................ 609
Limiting the Source-Active Cache.........................................................................................................................609
Clearing the Source-Active Cache.........................................................................................................................610
Enabling the Rejected Source-Active Cache........................................................................................................610
Accept Source-Active Messages that Fail the RFP Check...................................................................................... 610
Specifying Source-Active Messages........................................................................................................................... 613
Limiting the Source-Active Messages from a Peer....................................................................................................614
Preventing MSDP from Caching a Local Source........................................................................................................614
Preventing MSDP from Caching a Remote Source...................................................................................................615
Preventing MSDP from Advertising a Local Source.................................................................................................. 615
Logging Changes in Peership States........................................................................................................................... 616
Terminating a Peership...................................................................................................................................................616
Clearing Peer Statistics..................................................................................................................................................617
Debugging MSDP........................................................................................................................................................... 617
MSDP with Anycast RP.................................................................................................................................................618
Conguring Anycast RP................................................................................................................................................ 619
Reducing Source-Active Message Flooding.........................................................................................................620
Specifying the RP Address Used in SA Messages.............................................................................................. 620
MSDP Sample Congurations......................................................................................................................................622
36 Multicast Listener Discovery Protocol..................................................................................................... 625
MLD Version 1................................................................................................................................................................ 625
MLD Querier Router......................................................................................................................................................625
Joining a Multicast Group.............................................................................................................................................626
Leaving a Multicast Group............................................................................................................................................626
MLD version 2................................................................................................................................................................626
MLD timers.....................................................................................................................................................................628
Reducing Host Response Burstiness.................................................................................................................... 629
Conguring MLD Version..............................................................................................................................................629
Clearing MLD groups.....................................................................................................................................................629
Debugging MLD.............................................................................................................................................................629
Explicit Tracking............................................................................................................................................................. 629
Reducing Leave Latency...............................................................................................................................................630
Displaying MLD groups table........................................................................................................................................630
Displaying MLD Interfaces............................................................................................................................................630
20
Contents
/