Dell Networking S3100 Series User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell Networking S3100 Series User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S3100 Series
9.11(2.1)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 06
Rev. A00
Contents
1 About this Guide...........................................................................................................................................33
Audience............................................................................................................................................................................33
Conventions......................................................................................................................................................................33
Related Documents......................................................................................................................................................... 33
2 Conguration Fundamentals........................................................................................................................ 34
Accessing the Command Line........................................................................................................................................34
CLI Modes.........................................................................................................................................................................34
Navigating CLI Modes...............................................................................................................................................36
The do Command............................................................................................................................................................ 39
Undoing Commands........................................................................................................................................................ 39
Obtaining Help..................................................................................................................................................................40
Entering and Editing Commands................................................................................................................................... 40
Command History.............................................................................................................................................................41
Filtering show Command Outputs..................................................................................................................................41
Example of the grep Keyword................................................................................................................................... 41
Multiple Users in Conguration Mode...........................................................................................................................42
3 Getting Started............................................................................................................................................44
Console Access................................................................................................................................................................45
Serial Console.............................................................................................................................................................45
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................46
Entering CLI commands Using an SSH Connection..............................................................................................46
Executing Local CLI Scripts Using an SSH Connection........................................................................................46
Default Conguration.......................................................................................................................................................47
Conguring a Host Name................................................................................................................................................47
Accessing the System Remotely....................................................................................................................................47
Accessing the System Remotely..............................................................................................................................47
Congure the Management Port IP Address......................................................................................................... 48
Congure a Management Route..............................................................................................................................48
Conguring a Username and Password..................................................................................................................48
Conguring the Enable Password..................................................................................................................................49
Conguration File Management.....................................................................................................................................49
Copy Files to and from the System......................................................................................................................... 49
Mounting an NFS File System..................................................................................................................................50
Save the Running-Conguration..............................................................................................................................52
Congure the Overload Bit for a Startup Scenario............................................................................................... 52
Viewing Files...............................................................................................................................................................52
Compressing Conguration Files............................................................................................................................. 53
Managing the File System.............................................................................................................................................. 56
Enabling Software Features on Devices Using a Command Option......................................................................... 56
View Command History...................................................................................................................................................57
Contents
3
Upgrading Dell Networking OS.......................................................................................................................................57
Verify Software Images Before Installation...................................................................................................................57
Using HTTP for File Transfers........................................................................................................................................ 58
4 Management............................................................................................................................................... 60
Conguring Privilege Levels........................................................................................................................................... 60
Creating a Custom Privilege Level...........................................................................................................................60
Removing a Command from EXEC Mode............................................................................................................... 61
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................ 61
Allowing Access to CONFIGURATION Mode Commands.....................................................................................61
Allowing Access to Dierent Modes........................................................................................................................ 61
Applying a Privilege Level to a Username............................................................................................................... 63
Applying a Privilege Level to a Terminal Line.......................................................................................................... 63
Conguring Logging........................................................................................................................................................ 63
Audit and Security Logs............................................................................................................................................ 64
Conguring Logging Format ...................................................................................................................................65
Display the Logging Buer and the Logging Conguration..................................................................................66
Setting Up a Secure Connection to a Syslog Server.............................................................................................66
Sending System Messages to a Syslog Server......................................................................................................68
Track Login Activity......................................................................................................................................................... 68
Restrictions for Tracking Login Activity...................................................................................................................68
Conguring Login Activity Tracking......................................................................................................................... 68
Display Login Statistics..............................................................................................................................................69
Limit Concurrent Login Sessions....................................................................................................................................70
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................70
Conguring Concurrent Session Limit.....................................................................................................................70
Enabling the System to Clear Existing Sessions..................................................................................................... 71
Enabling Secured CLI Mode............................................................................................................................................72
Log Messages in the Internal Buer..............................................................................................................................72
Conguration Task List for System Log Management.......................................................................................... 72
Disabling System Logging............................................................................................................................................... 72
Sending System Messages to a Syslog Server............................................................................................................ 73
Conguring a UNIX System as a Syslog Server.....................................................................................................73
Changing System Logging Settings...............................................................................................................................73
Display the Logging Buer and the Logging Conguration........................................................................................ 74
Conguring a UNIX Logging Facility Level.................................................................................................................... 74
Synchronizing Log Messages......................................................................................................................................... 75
Enabling Timestamp on Syslog Messages.................................................................................................................... 76
File Transfer Services.......................................................................................................................................................76
Conguration Task List for File Transfer Services.................................................................................................. 77
Enabling the FTP Server........................................................................................................................................... 77
Conguring FTP Server Parameters........................................................................................................................77
Conguring FTP Client Parameters......................................................................................................................... 78
Terminal Lines................................................................................................................................................................... 78
Denying and Permitting Access to a Terminal Line................................................................................................ 78
Conguring Login Authentication for Terminal Lines.............................................................................................79
4
Contents
Setting Timeout for EXEC Privilege Mode...................................................................................................................80
Using Telnet to get to Another Network Device...........................................................................................................81
Lock CONFIGURATION Mode........................................................................................................................................81
Viewing the Conguration Lock Status................................................................................................................... 81
5 802.1X..........................................................................................................................................................83
Port-Authentication Process..........................................................................................................................................85
EAP over RADIUS......................................................................................................................................................85
Conguring 802.1X...........................................................................................................................................................86
Related Conguration Tasks..................................................................................................................................... 86
Important Points to Remember......................................................................................................................................86
Enabling 802.1X.................................................................................................................................................................87
Conguring dot1x Prole ................................................................................................................................................88
Conguring MAC addresses for a do1x Prole.............................................................................................................89
Conguring the Static MAB and MAB Prole .............................................................................................................89
Conguring Critical VLAN ..............................................................................................................................................90
Conguring Request Identity Re-Transmissions............................................................................................................91
Conguring a Quiet Period after a Failed Authentication...................................................................................... 91
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 92
Re-Authenticating a Port................................................................................................................................................93
Conguring Timeouts......................................................................................................................................................94
Conguring Dynamic VLAN Assignment with Port Authentication.......................................................................... 95
Guest and Authentication-Fail VLANs.......................................................................................................................... 96
Conguring a Guest VLAN....................................................................................................................................... 96
Conguring an Authentication-Fail VLAN...............................................................................................................96
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)....................................98
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...................................................................98
Guidelines for Conguring ACL VLAN Groups.............................................................................................................99
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters................................................99
Conguring ACL VLAN Groups................................................................................................................................99
Conguring FP Blocks for VLAN Parameters.......................................................................................................100
Viewing CAM Usage....................................................................................................................................................... 101
Allocating FP Blocks for VLAN Processes.................................................................................................................. 102
7 Access Control Lists (ACLs)....................................................................................................................... 104
IP Access Control Lists (ACLs).....................................................................................................................................105
CAM Usage...............................................................................................................................................................106
Implementing ACLs on Dell Networking OS..........................................................................................................106
Important Points to Remember....................................................................................................................................108
Conguration Task List for Route Maps................................................................................................................108
Conguring Match Routes.......................................................................................................................................110
Conguring Set Conditions.......................................................................................................................................111
Congure a Route Map for Route Redistribution..................................................................................................112
Congure a Route Map for Route Tagging............................................................................................................ 113
Continue Clause........................................................................................................................................................ 113
Contents
5
IP Fragment Handling..................................................................................................................................................... 114
IP Fragments ACL Examples....................................................................................................................................114
Layer 4 ACL Rules Examples................................................................................................................................... 114
Congure a Standard IP ACL.........................................................................................................................................115
Conguring a Standard IP ACL Filter......................................................................................................................116
Congure an Extended IP ACL......................................................................................................................................117
Conguring Filters with a Sequence Number........................................................................................................117
Conguring Filters Without a Sequence Number................................................................................................. 118
Congure Layer 2 and Layer 3 ACLs............................................................................................................................ 119
Assign an IP ACL to an Interface..................................................................................................................................120
Applying an IP ACL.........................................................................................................................................................120
Counting ACL Hits.....................................................................................................................................................121
Congure Ingress ACLs.................................................................................................................................................. 121
Congure Egress ACLs...................................................................................................................................................121
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 122
IP Prex Lists.................................................................................................................................................................. 123
Implementation Information.................................................................................................................................... 123
Conguration Task List for Prex Lists.................................................................................................................. 123
ACL Resequencing......................................................................................................................................................... 127
Resequencing an ACL or Prex List.......................................................................................................................127
Route Maps.....................................................................................................................................................................129
Implementation Information.................................................................................................................................... 129
Logging of ACL Processes............................................................................................................................................ 129
Guidelines for Conguring ACL Logging................................................................................................................130
Conguring ACL Logging........................................................................................................................................ 130
Flow-Based Monitoring Support for ACLs...................................................................................................................131
Behavior of Flow-Based Monitoring....................................................................................................................... 131
Enabling Flow-Based Monitoring............................................................................................................................132
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 134
How BFD Works............................................................................................................................................................. 134
BFD Packet Format..................................................................................................................................................135
BFD Sessions............................................................................................................................................................ 136
BFD Three-Way Handshake.................................................................................................................................... 137
Session State Changes............................................................................................................................................139
Important Points to Remember.................................................................................................................................... 139
Congure BFD................................................................................................................................................................ 139
Congure BFD for Physical Ports...........................................................................................................................140
Congure BFD for Static Routes.............................................................................................................................141
Congure BFD for OSPF.........................................................................................................................................144
Congure BFD for OSPFv3.....................................................................................................................................148
Congure BFD for IS-IS............................................................................................................................................151
Congure BFD for BGP...........................................................................................................................................153
Congure BFD for VRRP.........................................................................................................................................160
Conguring Protocol Liveness................................................................................................................................ 163
Troubleshooting BFD................................................................................................................................................163
6
Contents
9 Border Gateway Protocol IPv4 (BGPv4).................................................................................................... 165
Autonomous Systems (AS)...........................................................................................................................................165
Sessions and Peers.........................................................................................................................................................167
Establish a Session................................................................................................................................................... 167
Route Reectors.............................................................................................................................................................168
BGP Attributes................................................................................................................................................................169
Best Path Selection Criteria....................................................................................................................................169
Weight.........................................................................................................................................................................171
Local Preference........................................................................................................................................................171
Multi-Exit Discriminators (MEDs)...........................................................................................................................172
Origin..........................................................................................................................................................................173
AS Path...................................................................................................................................................................... 174
Next Hop....................................................................................................................................................................174
Multiprotocol BGP.......................................................................................................................................................... 174
Implement BGP with Dell Networking OS...................................................................................................................175
Additional Path (Add-Path) Support......................................................................................................................175
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 175
Ignore Router-ID in Best-Path Calculation............................................................................................................ 176
Four-Byte AS Numbers............................................................................................................................................176
AS4 Number Representation.................................................................................................................................. 176
AS Number Migration...............................................................................................................................................178
BGP4 Management Information Base (MIB)........................................................................................................179
Important Points to Remember.............................................................................................................................. 179
Conguration Information..............................................................................................................................................180
BGP Conguration......................................................................................................................................................... 180
Enabling BGP.............................................................................................................................................................181
Conguring AS4 Number Representations........................................................................................................... 184
Conguring Peer Groups.........................................................................................................................................186
Conguring BGP Fast Fall-Over.............................................................................................................................188
Conguring Passive Peering................................................................................................................................... 190
Maintaining Existing AS Numbers During an AS Migration.................................................................................190
Allowing an AS Number to Appear in its Own AS Path........................................................................................191
Enabling Graceful Restart........................................................................................................................................192
Enabling Neighbor Graceful Restart.......................................................................................................................193
Filtering on an AS-Path Attribute........................................................................................................................... 193
Regular Expressions as Filters.................................................................................................................................195
Redistributing Routes.............................................................................................................................................. 196
Enabling Additional Paths........................................................................................................................................ 197
Conguring IP Community Lists............................................................................................................................. 197
Conguring an IP Extended Community List........................................................................................................198
Filtering Routes with Community Lists..................................................................................................................199
Manipulating the COMMUNITY Attribute............................................................................................................200
Changing MED Attributes....................................................................................................................................... 201
Changing the LOCAL_PREFERENCE Attribute.................................................................................................. 201
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............ 202
Contents
7
Changing the WEIGHT Attribute...........................................................................................................................203
Enabling Multipath...................................................................................................................................................203
Filtering BGP Routes...............................................................................................................................................203
Filtering BGP Routes Using Route Maps..............................................................................................................205
Filtering BGP Routes Using AS-PATH Information............................................................................................. 205
Conguring BGP Route Reectors....................................................................................................................... 206
Aggregating Routes................................................................................................................................................. 207
Conguring BGP Confederations...........................................................................................................................207
Enabling Route Flap Dampening............................................................................................................................ 208
Changing BGP Timers............................................................................................................................................. 210
Enabling BGP Neighbor Soft-Reconguration..................................................................................................... 210
Enabling or disabling BGP neighbors...................................................................................................................... 211
Route Map Continue................................................................................................................................................213
Enabling MBGP Congurations.................................................................................................................................... 213
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor.......................................... 214
BGP Regular Expression Optimization.........................................................................................................................214
Debugging BGP.............................................................................................................................................................. 214
Storing Last and Bad PDUs.....................................................................................................................................215
Capturing PDUs........................................................................................................................................................216
PDU Counters........................................................................................................................................................... 217
Sample Congurations................................................................................................................................................... 217
10 Content Addressable Memory (CAM).......................................................................................................224
CAM Allocation...............................................................................................................................................................224
Test CAM Usage............................................................................................................................................................226
View CAM-ACL Settings.............................................................................................................................................. 226
View CAM Usage...........................................................................................................................................................228
CAM Optimization......................................................................................................................................................... 228
Troubleshoot CAM Proling..........................................................................................................................................228
CAM Prole Mismatches........................................................................................................................................ 228
QoS CAM Region Limitation...................................................................................................................................229
11 Control Plane Policing (CoPP).................................................................................................................. 230
Congure Control Plane Policing.................................................................................................................................. 231
Conguring CoPP for Protocols............................................................................................................................ 232
Conguring CoPP for CPU Queues...................................................................................................................... 234
CoPP for OSPFv3 Packets.....................................................................................................................................235
Conguring CoPP for OSPFv3.............................................................................................................................. 238
Displaying CoPP Conguration ............................................................................................................................. 238
12 Dynamic Host Conguration Protocol (DHCP)..........................................................................................241
DHCP Packet Format and Options.............................................................................................................................. 241
Assign an IP Address using DHCP...............................................................................................................................243
Implementation Information..........................................................................................................................................244
Congure the System to be a DHCP Server..............................................................................................................244
Conguring the Server for Automatic Address Allocation..................................................................................245
8
Contents
Specifying a Default Gateway................................................................................................................................ 246
Congure a Method of Hostname Resolution......................................................................................................246
Using DNS for Address Resolution........................................................................................................................246
Using NetBIOS WINS for Address Resolution......................................................................................................247
Creating Manual Binding Entries............................................................................................................................247
Debugging the DHCP Server................................................................................................................................. 247
Using DHCP Clear Commands...............................................................................................................................248
Congure the System to be a Relay Agent................................................................................................................ 248
Congure the System to be a DHCP Client...............................................................................................................250
Conguring the DHCP Client System...................................................................................................................250
DHCP Client on a Management Interface.............................................................................................................251
DHCP Client Operation with Other Features.......................................................................................................252
Congure the System for User Port Stacking (Option 230)....................................................................................253
Congure Secure DHCP...............................................................................................................................................253
Option 82..................................................................................................................................................................253
DHCP Snooping.......................................................................................................................................................254
Drop DHCP Packets on Snooped VLANs Only....................................................................................................257
Dynamic ARP Inspection........................................................................................................................................ 258
Conguring Dynamic ARP Inspection................................................................................................................... 259
Source Address Validation............................................................................................................................................ 260
Enabling IP Source Address Validation..................................................................................................................260
DHCP MAC Source Address Validation................................................................................................................. 261
Enabling IP+MAC Source Address Validation....................................................................................................... 261
Viewing the Number of SAV Dropped Packets....................................................................................................262
Clearing the Number of SAV Dropped Packets................................................................................................... 262
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 263
ECMP for Flow-Based Anity.....................................................................................................................................263
Conguring the Hash Algorithm............................................................................................................................ 263
Enabling Deterministic ECMP Next Hop.............................................................................................................. 263
Conguring the Hash Algorithm Seed.................................................................................................................. 264
Link Bundle Monitoring................................................................................................................................................. 264
Managing ECMP Group Paths...............................................................................................................................265
Creating an ECMP Group Bundle..........................................................................................................................265
Modifying the ECMP Group Threshold................................................................................................................ 265
14 FIPS Cryptography................................................................................................................................... 267
Conguration Tasks....................................................................................................................................................... 267
Preparing the System....................................................................................................................................................267
Enabling FIPS Mode...................................................................................................................................................... 268
Generating Host-Keys...................................................................................................................................................268
Monitoring FIPS Mode Status......................................................................................................................................268
Disabling FIPS Mode..................................................................................................................................................... 269
15 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 270
Protocol Overview......................................................................................................................................................... 270
Contents
9
Ring Status................................................................................................................................................................ 271
Multiple FRRP Rings................................................................................................................................................ 271
Important FRRP Points........................................................................................................................................... 272
Important FRRP Concepts..................................................................................................................................... 273
Implementing FRRP....................................................................................................................................................... 274
FRRP Conguration.......................................................................................................................................................274
Creating the FRRP Group....................................................................................................................................... 274
Conguring the Control VLAN............................................................................................................................... 275
Conguring and Adding the Member VLANs.......................................................................................................276
Setting the FRRP Timers........................................................................................................................................ 277
Clearing the FRRP Counters.................................................................................................................................. 277
Viewing the FRRP Conguration........................................................................................................................... 277
Viewing the FRRP Information...............................................................................................................................277
Troubleshooting FRRP...................................................................................................................................................278
Conguration Checks.............................................................................................................................................. 278
Sample Conguration and Topology............................................................................................................................ 278
16 GARP VLAN Registration Protocol (GVRP)..............................................................................................280
Important Points to Remember................................................................................................................................... 280
Congure GVRP............................................................................................................................................................. 281
Related Conguration Tasks....................................................................................................................................281
Enabling GVRP Globally................................................................................................................................................ 282
Enabling GVRP on a Layer 2 Interface........................................................................................................................282
Congure GVRP Registration.......................................................................................................................................282
Congure a GARP Timer.............................................................................................................................................. 283
RPM Redundancy..........................................................................................................................................................283
17 High Availability (HA)............................................................................................................................... 285
Component Redundancy.............................................................................................................................................. 285
Automatic and Manual Stack Unit Failover.......................................................................................................... 285
Synchronization between Management and Standby Units..............................................................................286
Forcing a Stack Unit Failover................................................................................................................................. 286
Disabling Auto-Reboot.............................................................................................................................................287
Manually Synchronizing Management and Standby Units..................................................................................287
Pre-Conguring a Stack Unit Slot................................................................................................................................287
Removing a Provisioned Logical Stack Unit............................................................................................................... 288
Hitless Behavior............................................................................................................................................................. 288
Graceful Restart.............................................................................................................................................................288
Software Resiliency....................................................................................................................................................... 289
Software Component Health Monitoring............................................................................................................. 289
System Health Monitoring......................................................................................................................................289
Failure and Event Logging.......................................................................................................................................289
Hot-Lock Behavior.........................................................................................................................................................290
18 Internet Group Management Protocol (IGMP)..........................................................................................291
IGMP Implementation Information............................................................................................................................... 291
10
Contents
IGMP Protocol Overview...............................................................................................................................................291
IGMP Version 2.........................................................................................................................................................291
IGMP Version 3........................................................................................................................................................ 293
Congure IGMP............................................................................................................................................................. 296
Related Conguration Tasks...................................................................................................................................296
Viewing IGMP Enabled Interfaces............................................................................................................................... 297
Selecting an IGMP Version........................................................................................................................................... 297
Viewing IGMP Groups................................................................................................................................................... 297
Adjusting Timers............................................................................................................................................................ 298
Adjusting Query and Response Timers................................................................................................................. 298
Preventing a Host from Joining a Group.................................................................................................................... 299
Enabling IGMP Immediate-Leave.................................................................................................................................302
IGMP Snooping..............................................................................................................................................................302
IGMP Snooping Implementation Information....................................................................................................... 302
Conguring IGMP Snooping...................................................................................................................................302
Removing a Group-Port Association.....................................................................................................................303
Disabling Multicast Flooding...................................................................................................................................303
Specifying a Port as Connected to a Multicast Router...................................................................................... 304
Conguring the Switch as Querier........................................................................................................................ 304
Fast Convergence after MSTP Topology Changes...................................................................................................305
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................305
Protocol Separation.................................................................................................................................................305
Enabling and Disabling Management Egress Interface Selection......................................................................306
Handling of Management Route Conguration................................................................................................... 307
Handling of Switch-Initiated Trac.......................................................................................................................308
Handling of Switch-Destined Trac......................................................................................................................308
Handling of Transit Trac (Trac Separation).................................................................................................... 309
Mapping of Management Applications and Trac Type.....................................................................................309
Behavior of Various Applications for Switch-Initiated Trac .............................................................................310
Behavior of Various Applications for Switch-Destined Trac ............................................................................ 311
Interworking of EIS With Various Applications......................................................................................................312
Designating a Multicast Router Interface....................................................................................................................312
19 Interfaces..................................................................................................................................................314
Basic Interface Conguration........................................................................................................................................314
Advanced Interface Conguration................................................................................................................................314
Interface Types............................................................................................................................................................... 315
Optional Modules............................................................................................................................................................315
View Basic Interface Information..................................................................................................................................316
Resetting an Interface to its Factory Default State....................................................................................................317
Enabling Energy Ecient Ethernet.............................................................................................................................. 318
View EEE Information.................................................................................................................................................... 318
Clear EEE Counters.......................................................................................................................................................322
Enabling a Physical Interface........................................................................................................................................323
Physical Interfaces.........................................................................................................................................................323
Conguration Task List for Physical Interfaces.................................................................................................... 324
Contents
11
Overview of Layer Modes.......................................................................................................................................324
Conguring Layer 2 (Data Link) Mode..................................................................................................................324
Conguring Layer 2 (Interface) Mode.................................................................................................................. 325
Conguring Layer 3 (Network) Mode...................................................................................................................325
Conguring Layer 3 (Interface) Mode.................................................................................................................. 326
Egress Interface Selection (EIS)..................................................................................................................................326
Important Points to Remember............................................................................................................................. 326
Conguring EIS.........................................................................................................................................................327
Management Interfaces................................................................................................................................................327
Conguring Management Interfaces.....................................................................................................................327
Conguring a Management Interface on an Ethernet Port................................................................................329
VLAN Interfaces............................................................................................................................................................ 329
Loopback Interfaces......................................................................................................................................................330
Null Interfaces................................................................................................................................................................ 330
Port Channel Interfaces................................................................................................................................................330
Port Channel Denition and Standards..................................................................................................................331
Port Channel Benets..............................................................................................................................................331
Port Channel Implementation................................................................................................................................. 331
Interfaces in Port Channels.................................................................................................................................... 332
Conguration Tasks for Port Channel Interfaces.................................................................................................332
Creating a Port Channel..........................................................................................................................................332
Adding a Physical Interface to a Port Channel.....................................................................................................333
Reassigning an Interface to a New Port Channel................................................................................................334
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 335
Adding or Removing a Port Channel from a VLAN............................................................................................. 335
Assigning an IP Address to a Port Channel.......................................................................................................... 336
Deleting or Disabling a Port Channel..................................................................................................................... 337
Load Balancing Through Port Channels................................................................................................................337
Load-Balancing Method..........................................................................................................................................337
Changing the Hash Algorithm................................................................................................................................338
Bulk Conguration......................................................................................................................................................... 339
Interface Range........................................................................................................................................................339
Bulk Conguration Examples..................................................................................................................................339
Dening Interface Range Macros................................................................................................................................. 341
Dene the Interface Range..................................................................................................................................... 341
Choosing an Interface-Range Macro.....................................................................................................................341
Monitoring and Maintaining Interfaces........................................................................................................................342
Maintenance Using TDR......................................................................................................................................... 343
Link Dampening..............................................................................................................................................................343
Important Points to Remember..............................................................................................................................343
Enabling Link Dampening........................................................................................................................................344
Link Bundle Monitoring................................................................................................................................................. 345
Using Ethernet Pause Frames for Flow Control........................................................................................................ 346
Enabling Pause Frames........................................................................................................................................... 346
Congure the MTU Size on an Interface.................................................................................................................... 347
12
Contents
Port-Pipes.......................................................................................................................................................................348
Auto-Negotiation on Ethernet Interfaces................................................................................................................... 348
Setting the Speed of Ethernet Interfaces............................................................................................................ 348
Set Auto-Negotiation Options............................................................................................................................... 350
Provisioning Combo Ports.............................................................................................................................................351
View Advanced Interface Information..........................................................................................................................351
Conguring the Interface Sampling Size.............................................................................................................. 352
Conguring the Trac Sampling Size Globally...........................................................................................................353
Dynamic Counters......................................................................................................................................................... 354
Clearing Interface Counters................................................................................................................................... 355
20 Internet Protocol Security (IPSec).......................................................................................................... 356
Conguring IPSec .........................................................................................................................................................356
21 IPv4 Routing............................................................................................................................................ 358
IP Addresses...................................................................................................................................................................359
Implementation Information....................................................................................................................................359
Conguration Tasks for IP Addresses......................................................................................................................... 359
Assigning IP Addresses to an Interface.......................................................................................................................359
Conguring Static Routes............................................................................................................................................ 360
Congure Static Routes for the Management Interface...........................................................................................361
IPv4 Path MTU Discovery Overview.......................................................................................................................... 362
Using the Congured Source IP Address in ICMP Messages..................................................................................362
Conguring the ICMP Source Interface............................................................................................................... 362
Conguring the Duration to Establish a TCP Connection........................................................................................ 363
Enabling Directed Broadcast........................................................................................................................................ 363
Resolution of Host Names............................................................................................................................................363
Enabling Dynamic Resolution of Host Names............................................................................................................364
Specifying the Local System Domain and a List of Domains................................................................................... 364
Conguring DNS with Traceroute............................................................................................................................... 365
ARP................................................................................................................................................................................. 365
Conguration Tasks for ARP........................................................................................................................................ 366
Conguring Static ARP Entries....................................................................................................................................366
Enabling Proxy ARP.......................................................................................................................................................366
Clearing ARP Cache...................................................................................................................................................... 367
ARP Learning via Gratuitous ARP................................................................................................................................367
Enabling ARP Learning via Gratuitous ARP................................................................................................................367
ARP Learning via ARP Request................................................................................................................................... 367
Conguring ARP Retries...............................................................................................................................................368
ICMP............................................................................................................................................................................... 369
Conguration Tasks for ICMP......................................................................................................................................369
Enabling ICMP Unreachable Messages...................................................................................................................... 369
UDP Helper.....................................................................................................................................................................369
Congure UDP Helper............................................................................................................................................ 369
Important Points to Remember..............................................................................................................................370
Enabling UDP Helper..................................................................................................................................................... 370
Contents
13
Conguring a Broadcast Address................................................................................................................................ 370
Congurations Using UDP Helper................................................................................................................................ 371
UDP Helper with Broadcast-All Addresses..................................................................................................................371
UDP Helper with Subnet Broadcast Addresses.........................................................................................................372
UDP Helper with Congured Broadcast Addresses.................................................................................................. 372
UDP Helper with No Congured Broadcast Addresses............................................................................................ 373
Troubleshooting UDP Helper........................................................................................................................................ 373
22 IPv6 Routing............................................................................................................................................ 374
Protocol Overview......................................................................................................................................................... 374
Extended Address Space........................................................................................................................................375
Stateless Autoconguration....................................................................................................................................375
IPv6 Headers............................................................................................................................................................375
IPv6 Header Fields...................................................................................................................................................376
Extension Header Fields..........................................................................................................................................378
Addressing................................................................................................................................................................ 379
Implementing IPv6 with Dell Networking OS.............................................................................................................380
ICMPv6............................................................................................................................................................................381
Path MTU Discovery..................................................................................................................................................... 382
IPv6 Neighbor Discovery.............................................................................................................................................. 382
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................383
Conguration Task List for IPv6 RDNSS.................................................................................................................... 383
Conguring the IPv6 Recursive DNS Server....................................................................................................... 383
Debugging IPv6 RDNSS Information Sent to the Host ..................................................................................... 384
Displaying IPv6 RDNSS Information......................................................................................................................385
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 385
Conguration Tasks for IPv6........................................................................................................................................ 386
Adjusting Your CAM-Prole....................................................................................................................................386
Assigning an IPv6 Address to an Interface........................................................................................................... 387
Assigning a Static IPv6 Route................................................................................................................................ 387
Conguring Telnet with IPv6..................................................................................................................................388
SNMP over IPv6......................................................................................................................................................388
Displaying IPv6 Information....................................................................................................................................388
Displaying an IPv6 Interface Information.............................................................................................................. 389
Showing IPv6 Routes..............................................................................................................................................389
Showing the Running-Conguration for an Interface..........................................................................................391
Clearing IPv6 Routes................................................................................................................................................391
Disabling ND Entry Timeout....................................................................................................................................391
Conguring IPv6 RA Guard.......................................................................................................................................... 392
Conguring IPv6 RA Guard on an Interface.........................................................................................................393
Monitoring IPv6 RA Guard......................................................................................................................................394
23 iSCSI Optimization.................................................................................................................................. 395
iSCSI Optimization Overview.......................................................................................................................................395
Monitoring iSCSI Trac Flows............................................................................................................................... 397
Application of Quality of Service to iSCSI Trac Flows......................................................................................397
14
Contents
Information Monitored in iSCSI Trac Flows....................................................................................................... 397
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 398
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................398
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................399
Enable and Disable iSCSI Optimization.................................................................................................................399
Default iSCSI Optimization Values...............................................................................................................................400
iSCSI Optimization Prerequisites................................................................................................................................. 400
Conguring iSCSI Optimization................................................................................................................................... 400
Displaying iSCSI Optimization Information..................................................................................................................402
24 Intermediate System to Intermediate System.......................................................................................... 404
IS-IS Protocol Overview............................................................................................................................................... 404
IS-IS Addressing.............................................................................................................................................................404
Multi-Topology IS-IS...................................................................................................................................................... 405
Transition Mode....................................................................................................................................................... 405
Interface Support.................................................................................................................................................... 406
Adjacencies...............................................................................................................................................................406
Graceful Restart............................................................................................................................................................ 406
Timers....................................................................................................................................................................... 406
Implementation Information......................................................................................................................................... 406
Conguration Information.............................................................................................................................................407
Conguration Tasks for IS-IS..................................................................................................................................408
Conguring the Distance of a Route......................................................................................................................415
Changing the IS-Type...............................................................................................................................................416
Redistributing IPv4 Routes......................................................................................................................................418
Redistributing IPv6 Routes......................................................................................................................................419
Conguring Authentication Passwords.................................................................................................................420
Setting the Overload Bit......................................................................................................................................... 420
Debugging IS-IS........................................................................................................................................................421
IS-IS Metric Styles.........................................................................................................................................................422
Congure Metric Values................................................................................................................................................422
Maximum Values in the Routing Table...................................................................................................................422
Change the IS-IS Metric Style in One Level Only................................................................................................422
Leaks from One Level to Another.......................................................................................................................... 424
Sample Congurations.................................................................................................................................................. 425
25 Link Aggregation Control Protocol (LACP)...............................................................................................427
Introduction to Dynamic LAGs and LACP...................................................................................................................427
Important Points to Remember..............................................................................................................................427
LACP Modes............................................................................................................................................................ 428
Conguring LACP Commands............................................................................................................................... 428
LACP Conguration Tasks............................................................................................................................................ 429
Creating a LAG.........................................................................................................................................................429
Conguring the LAG Interfaces as Dynamic........................................................................................................ 429
Setting the LACP Long Timeout............................................................................................................................430
Monitoring and Debugging LACP..........................................................................................................................430
Contents
15
Shared LAG State Tracking........................................................................................................................................... 431
Conguring Shared LAG State Tracking................................................................................................................431
Important Points about Shared LAG State Tracking........................................................................................... 433
LACP Basic Conguration Example.............................................................................................................................433
Congure a LAG on ALPHA................................................................................................................................... 433
26 Layer 2.....................................................................................................................................................442
Manage the MAC Address Table................................................................................................................................. 442
Clearing the MAC Address Table........................................................................................................................... 442
Setting the Aging Time for Dynamic Entries........................................................................................................442
Conguring a Static MAC Address........................................................................................................................443
Displaying the MAC Address Table........................................................................................................................ 443
MAC Learning Limit....................................................................................................................................................... 443
Setting the MAC Learning Limit.............................................................................................................................444
mac learning-limit Dynamic.....................................................................................................................................444
mac learning-limit mac-address-sticky................................................................................................................. 444
mac learning-limit station-move............................................................................................................................ 445
mac learning-limit no-station-move...................................................................................................................... 445
Learning Limit Violation Actions.............................................................................................................................445
Setting Station Move Violation Actions................................................................................................................ 446
Recovering from Learning Limit and Station Move Violations........................................................................... 446
Disabling MAC Address Learning on the System.................................................................................................447
NIC Teaming................................................................................................................................................................... 447
Congure Redundant Pairs...........................................................................................................................................448
Important Points about Conguring Redundant Pairs........................................................................................ 450
Far-End Failure Detection..............................................................................................................................................451
FEFD State Changes...............................................................................................................................................452
Conguring FEFD.................................................................................................................................................... 453
Enabling FEFD on an Interface...............................................................................................................................453
Debugging FEFD......................................................................................................................................................454
27 Link Layer Discovery Protocol (LLDP)..................................................................................................... 456
802.1AB (LLDP) Overview............................................................................................................................................456
Protocol Data Units................................................................................................................................................. 456
Optional TLVs................................................................................................................................................................. 457
Management TLVs...................................................................................................................................................457
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 459
TIA Organizationally Specic TLVs........................................................................................................................ 459
Congure LLDP..............................................................................................................................................................463
Related Conguration Tasks...................................................................................................................................463
Important Points to Remember............................................................................................................................. 463
LLDP Compatibility..................................................................................................................................................464
CONFIGURATION versus INTERFACE Congurations............................................................................................ 464
Enabling LLDP................................................................................................................................................................464
Disabling and Undoing LLDP..................................................................................................................................465
Enabling LLDP on Management Ports........................................................................................................................465
16
Contents
Disabling and Undoing LLDP on Management Ports..........................................................................................465
Advertising TLVs............................................................................................................................................................ 465
Viewing the LLDP Conguration................................................................................................................................. 466
Viewing Information Advertised by Adjacent LLDP Agents......................................................................................467
Conguring LLDPDU Intervals..................................................................................................................................... 468
Conguring Transmit and Receive Mode....................................................................................................................469
Conguring the Time to Live Value............................................................................................................................. 469
Debugging LLDP............................................................................................................................................................ 470
Relevant Management Objects.................................................................................................................................... 471
28 Microsoft Network Load Balancing.......................................................................................................... 476
NLB Unicast Mode Scenario........................................................................................................................................ 476
NLB Multicast Mode Scenario..................................................................................................................................... 476
Limitations of the NLB Feature.................................................................................................................................... 477
Microsoft Clustering...................................................................................................................................................... 477
Enable and Disable VLAN Flooding .............................................................................................................................477
Conguring a Switch for NLB ..................................................................................................................................... 477
Enabling a Switch for Multicast NLB.....................................................................................................................478
29 Multicast Source Discovery Protocol (MSDP)......................................................................................... 479
Protocol Overview......................................................................................................................................................... 479
Anycast RP.....................................................................................................................................................................480
Implementation Information.......................................................................................................................................... 481
Congure Multicast Source Discovery Protocol.........................................................................................................481
Related Conguration Tasks....................................................................................................................................481
Enable MSDP................................................................................................................................................................. 485
Manage the Source-Active Cache.............................................................................................................................. 486
Viewing the Source-Active Cache.........................................................................................................................486
Limiting the Source-Active Cache.........................................................................................................................486
Clearing the Source-Active Cache........................................................................................................................ 487
Enabling the Rejected Source-Active Cache........................................................................................................487
Accept Source-Active Messages that Fail the RFP Check......................................................................................487
Specifying Source-Active Messages...........................................................................................................................490
Limiting the Source-Active Messages from a Peer....................................................................................................491
Preventing MSDP from Caching a Local Source........................................................................................................491
Preventing MSDP from Caching a Remote Source.................................................................................................. 492
Preventing MSDP from Advertising a Local Source..................................................................................................492
Logging Changes in Peership States...........................................................................................................................493
Terminating a Peership..................................................................................................................................................493
Clearing Peer Statistics.................................................................................................................................................494
Debugging MSDP.......................................................................................................................................................... 494
MSDP with Anycast RP................................................................................................................................................495
Conguring Anycast RP................................................................................................................................................496
Reducing Source-Active Message Flooding.........................................................................................................497
Specifying the RP Address Used in SA Messages...............................................................................................497
MSDP Sample Congurations......................................................................................................................................499
Contents
17
30 Multiple Spanning Tree Protocol (MSTP)................................................................................................ 502
Protocol Overview.........................................................................................................................................................502
Spanning Tree Variations.............................................................................................................................................. 503
Implementation Information................................................................................................................................... 503
Congure Multiple Spanning Tree Protocol................................................................................................................503
Related Conguration Tasks...................................................................................................................................504
Enable Multiple Spanning Tree Globally...................................................................................................................... 504
Adding and Removing Interfaces.................................................................................................................................504
Creating Multiple Spanning Tree Instances................................................................................................................505
Inuencing MSTP Root Selection............................................................................................................................... 506
Interoperate with Non-Dell Bridges.............................................................................................................................506
Changing the Region Name or Revision..................................................................................................................... 507
Modifying Global Parameters....................................................................................................................................... 507
Modifying the Interface Parameters........................................................................................................................... 508
Conguring an EdgePort.............................................................................................................................................. 509
Flush MAC Addresses after a Topology Change........................................................................................................ 510
MSTP Sample Congurations.......................................................................................................................................510
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.........................................................................................511
Debugging and Verifying MSTP Congurations......................................................................................................... 514
31 Multicast Features.................................................................................................................................... 516
Enabling IP Multicast......................................................................................................................................................516
Implementation Information.......................................................................................................................................... 516
Multicast Policies............................................................................................................................................................517
IPv4 Multicast Policies............................................................................................................................................. 517
Understanding Multicast Traceroute (mtrace).....................................................................................................524
Printing Multicast Traceroute (mtrace) Paths..................................................................................................... 525
Supported Error Codes........................................................................................................................................... 526
mtrace Scenarios..................................................................................................................................................... 527
32 Object Tracking........................................................................................................................................533
Object Tracking Overview............................................................................................................................................ 533
Track Layer 2 Interfaces..........................................................................................................................................534
Track Layer 3 Interfaces..........................................................................................................................................534
Track IPv4 and IPv6 Routes...................................................................................................................................535
Set Tracking Delays................................................................................................................................................. 536
VRRP Object Tracking............................................................................................................................................ 536
Object Tracking Conguration..................................................................................................................................... 536
Tracking a Layer 2 Interface................................................................................................................................... 536
Tracking a Layer 3 Interface................................................................................................................................... 537
Track an IPv4/IPv6 Route...................................................................................................................................... 539
Displaying Tracked Objects...........................................................................................................................................542
33 Open Shortest Path First (OSPFv2 and OSPFv3)....................................................................................544
18
Contents
Protocol Overview.........................................................................................................................................................544
Autonomous System (AS) Areas........................................................................................................................... 544
Area Types................................................................................................................................................................ 545
Networks and Neighbors........................................................................................................................................546
Router Types............................................................................................................................................................ 546
Designated and Backup Designated Routers....................................................................................................... 548
Link-State Advertisements (LSAs)........................................................................................................................548
Router Priority and Cost.........................................................................................................................................549
OSPF with Dell Networking OS...................................................................................................................................550
Graceful Restart....................................................................................................................................................... 551
Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................552
Multi-Process OSPFv2 with VRF..........................................................................................................................552
OSPF ACK Packing................................................................................................................................................. 552
Setting OSPF Adjacency with Cisco Routers...................................................................................................... 552
Conguration Information.............................................................................................................................................553
Conguration Task List for OSPFv2 (OSPF for IPv4)........................................................................................ 553
Conguration Task List for OSPFv3 (OSPF for IPv6)...............................................................................................567
Enabling IPv6 Unicast Routing...............................................................................................................................568
Applying cost for OSPFv3......................................................................................................................................568
Assigning IPv6 Addresses on an Interface........................................................................................................... 569
Assigning Area ID on an Interface..........................................................................................................................569
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................569
Assigning OSPFv3 Process ID and Router ID to a VRF...................................................................................... 570
Conguring Stub Areas........................................................................................................................................... 570
Conguring Passive-Interface.................................................................................................................................571
Redistributing Routes...............................................................................................................................................571
Conguring a Default Route....................................................................................................................................571
Enabling OSPFv3 Graceful Restart....................................................................................................................... 572
OSPFv3 Authentication Using IPsec..................................................................................................................... 574
Troubleshooting OSPFv3........................................................................................................................................580
34 Policy-based Routing (PBR).................................................................................................................... 582
Overview.........................................................................................................................................................................582
Implementing PBR.........................................................................................................................................................583
Conguration Task List for Policy-based Routing......................................................................................................583
PBR Exceptions (Permit)....................................................................................................................................... 583
Create a Redirect List..............................................................................................................................................584
Create a Rule for a Redirect-list.............................................................................................................................584
Apply a Redirect-list to an Interface using a Redirect-group............................................................................. 586
Sample Conguration....................................................................................................................................................588
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD..... 589
35 PIM Sparse-Mode (PIM-SM).................................................................................................................. 592
Implementation Information..........................................................................................................................................592
Protocol Overview.........................................................................................................................................................592
Requesting Multicast Trac...................................................................................................................................592
Contents
19
Refuse Multicast Trac..........................................................................................................................................593
Send Multicast Trac............................................................................................................................................. 593
Conguring PIM-SM..................................................................................................................................................... 593
Related Conguration Tasks...................................................................................................................................594
Enable PIM-SM..............................................................................................................................................................594
Conguring S,G Expiry Timers..................................................................................................................................... 594
Conguring a Static Rendezvous Point......................................................................................................................595
Overriding Bootstrap Router Updates.................................................................................................................. 595
Conguring a Designated Router................................................................................................................................ 596
Creating Multicast Boundaries and Domains............................................................................................................. 596
36 PIM Source-Specic Mode (PIM-SSM).................................................................................................. 597
Implementation Information..........................................................................................................................................597
Important Points to Remember..............................................................................................................................597
Congure PIM-SSM......................................................................................................................................................598
Related Conguration Tasks...................................................................................................................................598
Enabling PIM-SSM........................................................................................................................................................ 598
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................598
Conguring PIM-SSM with IGMPv2.................................................................................................................... 599
Electing an RP using the BSR Mechanism.................................................................................................................600
Enabling RP to Server Specic Multicast Groups...............................................................................................600
37 Power over Ethernet (PoE)..................................................................................................................... 602
Conguring PoE or PoE+..............................................................................................................................................602
Enable PoE/PoE+....................................................................................................................................................603
Upgrading the PoE Controller................................................................................................................................ 603
Manage Ports using Power Priority and Power Budget...........................................................................................604
Determine the Power Priority................................................................................................................................ 604
Manage Inline Power...............................................................................................................................................605
Set the Threshold Limit for the PoE Power Budget........................................................................................... 605
Manage Power Priorities........................................................................................................................................ 606
Power Allocation to Ports.......................................................................................................................................606
Power Allocation to Additional Ports..................................................................................................................... 607
Manage Legacy Devices............................................................................................................................................... 607
Suspend Power Delivery on a Port..............................................................................................................................607
Restore Power Delivery on a Port............................................................................................................................... 608
Display the Power Details............................................................................................................................................. 608
38 Port Monitoring....................................................................................................................................... 609
Important Points to Remember................................................................................................................................... 609
Port Monitoring.............................................................................................................................................................. 610
Conguring Port Monitoring......................................................................................................................................... 612
Conguring Monitor Multicast Queue......................................................................................................................... 613
Enabling Flow-Based Monitoring..................................................................................................................................614
Remote Port Mirroring...................................................................................................................................................615
Remote Port Mirroring Example.............................................................................................................................615
20
Contents
/