Dell PowerSwitch S6010-ON Administrator Guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6010-ON Administrator Guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S6010–ON
System
9.14.2.6
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
2020 - 03
Rev. A00
1 About this Guide......................................................................................................................... 32
Audience............................................................................................................................................................................... 32
Conventions......................................................................................................................................................................... 32
Related Documents.............................................................................................................................................................32
2 Configuration Fundamentals....................................................................................................... 33
Accessing the Command Line............................................................................................................................................33
CLI Modes............................................................................................................................................................................ 33
Navigating CLI Modes...................................................................................................................................................35
The do Command................................................................................................................................................................ 37
Undoing Commands............................................................................................................................................................38
Obtaining Help..................................................................................................................................................................... 38
Entering and Editing Commands....................................................................................................................................... 38
Command History................................................................................................................................................................39
Filtering show Command Outputs.................................................................................................................................... 39
Multiple Users in Configuration Mode.............................................................................................................................. 40
3 Getting Started.......................................................................................................................... 41
Console Access....................................................................................................................................................................42
Serial Console.................................................................................................................................................................42
Default Configuration..........................................................................................................................................................43
Configuring a Host Name................................................................................................................................................... 43
Accessing the System Remotely.......................................................................................................................................43
Configure the Management Port IP Address.............................................................................................................43
Configure a Management Route................................................................................................................................. 44
Configuring a Username and Password......................................................................................................................44
Configuring the Enable Password..................................................................................................................................... 45
Configuration File Management........................................................................................................................................ 45
Copy Files to and from the System.............................................................................................................................45
Mounting an NFS File System..................................................................................................................................... 46
Save the Running-Configuration................................................................................................................................. 47
Configure the Overload Bit for a Startup Scenario...................................................................................................48
Viewing Files...................................................................................................................................................................48
Managing the File System..................................................................................................................................................49
View Command History......................................................................................................................................................49
Upgrading Dell EMC Networking OS................................................................................................................................50
Using HTTP for File Transfers............................................................................................................................................51
Verify Software Images Before Installation...................................................................................................................... 51
4 Management..............................................................................................................................53
Configuring Privilege Levels...............................................................................................................................................53
Removing a Command from EXEC Mode..................................................................................................................54
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................... 54
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 54
Contents
Contents 3
Allowing Access to Different Modes...........................................................................................................................54
Applying a Privilege Level to a Username...................................................................................................................55
Applying a Privilege Level to a Terminal Line............................................................................................................. 55
Configuring Logging............................................................................................................................................................56
Audit and Security Logs................................................................................................................................................56
Configuring Logging Format .................................................................................................................................57
Setting Up a Secure Connection to a Syslog Server.......................................................................................58
Log Messages in the Internal Buffer.................................................................................................................................59
Disabling System Logging.................................................................................................................................................. 59
Sending System Messages to a Syslog Server............................................................................................................... 59
Configuring a UNIX System as a Syslog Server........................................................................................................ 59
Track Login Activity............................................................................................................................................................ 60
Restrictions for Tracking Login Activity..................................................................................................................... 60
Configuring Login Activity Tracking............................................................................................................................ 60
Display Login Statistics................................................................................................................................................. 60
Limit Concurrent Login Sessions.......................................................................................................................................62
Restrictions for Limiting the Number of Concurrent Sessions................................................................................62
Configuring Concurrent Session Limit........................................................................................................................ 62
Enabling the System to Clear Existing Sessions........................................................................................................62
Enabling Secured CLI Mode...............................................................................................................................................63
Changing System Logging Settings..................................................................................................................................63
Display the Logging Buffer and the Logging Configuration...........................................................................................64
Configuring a UNIX Logging Facility Level.......................................................................................................................65
Synchronizing Log Messages............................................................................................................................................ 66
Enabling Timestamp on Syslog Messages....................................................................................................................... 66
File Transfer Services......................................................................................................................................................... 69
Enabling the FTP Server...............................................................................................................................................69
Configuring FTP Server Parameters...........................................................................................................................69
Configuring FTP Client Parameters............................................................................................................................ 70
Terminal Lines...................................................................................................................................................................... 70
Denying and Permitting Access to a Terminal Line...................................................................................................70
Configuring Login Authentication for Terminal Lines.................................................................................................71
Setting Timeout for EXEC Privilege Mode.......................................................................................................................72
Using Telnet to get to Another Network Device.............................................................................................................72
Lock CONFIGURATION Mode...........................................................................................................................................73
Restoring the Factory Default Settings............................................................................................................................74
Restoring Factory Default Environment Variables.................................................................................................... 74
Viewing the Reason for Last System Reboot..................................................................................................................75
Disabling Syslog Messages for SNMP Authentication Failure Events..........................................................................76
5 802.1X....................................................................................................................................... 77
Port-Authentication Process............................................................................................................................................. 78
EAP over RADIUS..........................................................................................................................................................79
Configuring 802.1X.............................................................................................................................................................. 79
Important Points to Remember.........................................................................................................................................80
Enabling 802.1X................................................................................................................................................................... 80
Configuring Request Identity Re-Transmissions.............................................................................................................. 81
Configuring a Quiet Period after a Failed Authentication.........................................................................................82
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................83
Re-Authenticating a Port................................................................................................................................................... 83
4
Contents
Configuring Timeouts..........................................................................................................................................................84
Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................85
Guest and Authentication-Fail VLANs..............................................................................................................................86
Configuring a Guest VLAN........................................................................................................................................... 86
Configuring an Authentication-Fail VLAN.................................................................................................................. 86
6 Access Control Lists (ACLs)........................................................................................................88
IP Access Control Lists (ACLs)......................................................................................................................................... 89
CAM Usage.................................................................................................................................................................... 89
Implementing ACLs on Dell EMC Networking OS.....................................................................................................90
Important Points to Remember..........................................................................................................................................91
Configuration Task List for Route Maps..................................................................................................................... 91
Configuring Match Routes........................................................................................................................................... 93
Configuring Set Conditions.......................................................................................................................................... 94
Configure a Route Map for Route Redistribution..................................................................................................... 95
Configure a Route Map for Route Tagging................................................................................................................95
Continue Clause.............................................................................................................................................................96
IP Fragment Handling......................................................................................................................................................... 96
IP Fragments ACL Examples........................................................................................................................................96
Layer 4 ACL Rules Examples........................................................................................................................................97
Configure a Standard IP ACL.............................................................................................................................................97
Configuring a Standard IP ACL Filter..........................................................................................................................98
Configure an Extended IP ACL..........................................................................................................................................99
Configuring Filters with a Sequence Number............................................................................................................99
Configuring Filters Without a Sequence Number....................................................................................................100
Configure Layer 2 and Layer 3 ACLs............................................................................................................................... 101
Assign an IP ACL to an Interface..................................................................................................................................... 102
Applying an IP ACL............................................................................................................................................................ 102
Counting ACL Hits....................................................................................................................................................... 102
Configure Ingress ACLs.....................................................................................................................................................103
Configure Egress ACLs..................................................................................................................................................... 103
Applying Egress Layer 3 ACLs (Control-Plane)....................................................................................................... 104
IP Prefix Lists......................................................................................................................................................................104
Configuration Task List for Prefix Lists.....................................................................................................................105
ACL Remarks......................................................................................................................................................................108
Configuring a Remark..................................................................................................................................................108
Deleting a Remark........................................................................................................................................................108
ACL Resequencing.............................................................................................................................................................109
Resequencing an ACL or Prefix List.......................................................................................................................... 109
Route Maps......................................................................................................................................................................... 110
Flow-Based Monitoring.......................................................................................................................................................111
Enabling Flow-Based Monitoring................................................................................................................................ 112
Configuring IP Mirror Access Group................................................................................................................................ 113
Sample Configuration................................................................................................................................................... 114
Example of viewing IP mirror–access–group applied to an Interface....................................................................114
7 Bidirectional Forwarding Detection (BFD)....................................................................................115
How BFD Works................................................................................................................................................................. 115
BFD Packet Format......................................................................................................................................................116
Contents
5
BFD Sessions................................................................................................................................................................. 117
BFD Three-Way Handshake........................................................................................................................................118
Session State Changes................................................................................................................................................ 119
Important Points to Remember........................................................................................................................................ 119
Configure BFD.....................................................................................................................................................................119
Configure BFD for Physical Ports..............................................................................................................................120
Configure BFD for Static Routes................................................................................................................................121
Configure BFD for IPv6 Static Routes...................................................................................................................... 124
Configure BFD for OSPF............................................................................................................................................ 126
Configure BFD for OSPFv3........................................................................................................................................ 132
Configure BFD for IS-IS...............................................................................................................................................134
Configure BFD for BGP...............................................................................................................................................136
Configure BFD for VRRP............................................................................................................................................ 143
Configuring Protocol Liveness....................................................................................................................................145
8 Border Gateway Protocol (BGP).................................................................................................146
BGP IP version 4 (BGPv4) Overview..............................................................................................................................146
BGP Autonomous Systems.........................................................................................................................................146
AS4 Number Representation......................................................................................................................................148
Four-Byte AS Numbers...............................................................................................................................................150
BGP router ID............................................................................................................................................................... 150
Sessions and Peers......................................................................................................................................................150
Establish a Session.......................................................................................................................................................150
BGP Attributes for selecting Best Path.....................................................................................................................151
Multiprotocol BGP....................................................................................................................................................... 156
BGP global and address family configuration........................................................................................................... 157
Implement BGP with Dell EMC Networking OS...................................................................................................... 158
Configuration Information............................................................................................................................................161
Basic BGP configuration tasks..........................................................................................................................................161
Prerequisite for configuring a BGP network............................................................................................................. 161
Restrictions....................................................................................................................................................................161
Enabling BGP.................................................................................................................................................................161
Enabling four-byte autonomous system numbers................................................................................................... 163
Changing a BGP router ID...........................................................................................................................................164
Configuring AS4 Number Representations...............................................................................................................164
Configuring a BGP peer.............................................................................................................................................. 165
Example-Configuring BGP routing between peers..................................................................................................166
BGP peer group............................................................................................................................................................167
Advanced BGP configuration tasks................................................................................................................................. 174
Route-refresh and Soft-reconfiguration................................................................................................................... 174
Aggregating Routes..................................................................................................................................................... 176
Filtering BGP.................................................................................................................................................................178
Configuring BGP Fast Fall-Over.................................................................................................................................183
Configuring Passive Peering.......................................................................................................................................184
Enabling Graceful Restart........................................................................................................................................... 185
Redistributing Routes.................................................................................................................................................. 186
Enabling Additional Paths............................................................................................................................................186
Configuring IP Community Lists.................................................................................................................................187
Configuring an IP Extended Community List............................................................................................................188
Configure BGP attributes........................................................................................................................................... 189
6
Contents
Enabling Multipath....................................................................................................................................................... 192
Route Reflectors.......................................................................................................................................................... 193
Enabling Route Flap Dampening.................................................................................................................................194
Changing BGP keepalive and hold timers................................................................................................................. 196
Setting the extended timer.........................................................................................................................................196
Enabling or disabling BGP neighbors......................................................................................................................... 197
Route Map Continue....................................................................................................................................................198
Configuring BGP Confederations...............................................................................................................................198
Configuring a BGP VRF address family.....................................................................................................................199
Maintaining Existing AS Numbers During an AS Migration....................................................................................200
Allowing an AS Number to Appear in its Own AS Path...........................................................................................201
Enabling MBGP Configurations.................................................................................................................................202
MBGP support for IPv6..............................................................................................................................................202
Configuring IPv6 MBGP between peers..................................................................................................................202
Example-Configuring IPv4 and IPv6 neighbors.......................................................................................................203
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor............................................ 205
BGP Regular Expression Optimization..................................................................................................................... 206
Debugging BGP........................................................................................................................................................... 207
9 Content Addressable Memory (CAM).........................................................................................209
CAM Allocation..................................................................................................................................................................209
Test CAM Usage................................................................................................................................................................210
View CAM Profiles..............................................................................................................................................................211
View CAM-ACL Settings................................................................................................................................................... 211
View CAM Usage............................................................................................................................................................... 213
Configuring CAM Threshold and Silence Period............................................................................................................214
CAM Optimization............................................................................................................................................................. 215
Troubleshoot CAM Profiling............................................................................................................................................. 215
QoS CAM Region Limitation.......................................................................................................................................215
Syslog Error When the Table is Full........................................................................................................................... 215
Syslog Warning Upon 90 Percent Utilization of CAM.............................................................................................216
Syslog Warning for Discrepancies Between Configured Extended Prefixes........................................................216
Unified Forwarding Table (UFT) Modes......................................................................................................................... 216
Configuring UFT Modes..............................................................................................................................................216
10 Control Plane Policing (CoPP).................................................................................................. 217
Configure Control Plane Policing..................................................................................................................................... 218
Configuring CoPP for Protocols.................................................................................................................................219
Configuring CoPP for CPU Queues..........................................................................................................................220
Displaying CoPP Configuration ..................................................................................................................................221
11 Data Center Bridging (DCB)..................................................................................................... 223
Ethernet Enhancements in Data Center Bridging.........................................................................................................223
Priority-Based Flow Control.......................................................................................................................................224
Enhanced Transmission Selection.............................................................................................................................225
Data Center Bridging Exchange Protocol (DCBx)..................................................................................................226
Data Center Bridging in a Traffic Flow..................................................................................................................... 226
Enabling Data Center Bridging.........................................................................................................................................227
DCB Maps and its Attributes..................................................................................................................................... 227
Contents
7
Data Center Bridging: Default Configuration.................................................................................................................228
Configuring Priority-Based Flow Control....................................................................................................................... 228
Configuring Lossless Queues.....................................................................................................................................229
Configuring PFC in a DCB Map.......................................................................................................................................230
Applying a DCB Map on a Port.........................................................................................................................................231
Configuring PFC without a DCB Map............................................................................................................................ 232
Priority-Based Flow Control Using Dynamic Buffer Method.......................................................................................233
Behavior of Tagged Packets............................................................................................................................................234
Configuration Example for DSCP and PFC Priorities................................................................................................... 234
SNMP Support for PFC and Buffer Statistics Tracking.............................................................................................. 235
Performing PFC Using DSCP Bits Instead of 802.1p Bits............................................................................................236
PFC and ETS Configuration Examples........................................................................................................................... 237
Using PFC to Manage Converged Ethernet Traffic..................................................................................................... 237
Operations on Untagged Packets................................................................................................................................... 237
Generation of PFC for a Priority for Untagged Packets.............................................................................................. 237
Configure Enhanced Transmission Selection.................................................................................................................237
ETS Prerequisites and Restrictions...........................................................................................................................238
Creating an ETS Priority Group................................................................................................................................. 238
ETS Operation with DCBx..........................................................................................................................................239
Configuring Bandwidth Allocation for DCBx CIN.................................................................................................... 239
Configuring ETS in a DCB Map................................................................................................................................. 240
Hierarchical Scheduling in ETS Output Policies............................................................................................................. 241
Using ETS to Manage Converged Ethernet Traffic...................................................................................................... 241
Applying DCB Policies in a Switch Stack........................................................................................................................ 241
Configure a DCBx Operation............................................................................................................................................241
DCBx Operation...........................................................................................................................................................242
DCBx Port Roles..........................................................................................................................................................242
DCB Configuration Exchange.................................................................................................................................... 243
Configuration Source Election................................................................................................................................... 243
Propagation of DCB Information............................................................................................................................... 244
Auto-Detection and Manual Configuration of the DCBx Version......................................................................... 244
DCBx Example............................................................................................................................................................. 245
DCBx Prerequisites and Restrictions........................................................................................................................245
Configuring DCBx........................................................................................................................................................245
Verifying the DCB Configuration.....................................................................................................................................248
QoS dot1p Traffic Classification and Queue Assignment.............................................................................................256
Configuring the Dynamic Buffer Method.......................................................................................................................257
Sample DCB Configuration.............................................................................................................................................. 257
12 Dynamic Host Configuration Protocol (DHCP)...........................................................................260
DHCP Packet Format and Options.................................................................................................................................260
Assign an IP Address using DHCP................................................................................................................................... 261
Implementation Information.............................................................................................................................................262
Configure the System to be a DHCP Server.................................................................................................................263
Configuring the Server for Automatic Address Allocation.....................................................................................263
Specifying a Default Gateway....................................................................................................................................264
Configure a Method of Hostname Resolution.........................................................................................................264
Using DNS for Address Resolution........................................................................................................................... 264
Using NetBIOS WINS for Address Resolution.........................................................................................................265
Creating Manual Binding Entries............................................................................................................................... 265
8
Contents
Debugging the DHCP Server.....................................................................................................................................265
Using DHCP Clear Commands.................................................................................................................................. 265
Configure the System to be a DHCP Client.................................................................................................................. 266
Configuring the DHCP Client System.......................................................................................................................266
DHCP Client on a Management Interface................................................................................................................267
DHCP Client Operation with Other Features.......................................................................................................... 268
DHCP Relay When DHCP Server and Client are in Different VRFs...........................................................................268
Configuring Route Leaking between VRFs on DHCP Relay Agent...................................................................... 269
Non-default VRF configuration for DHCPv6 helper address...................................................................................... 270
Configuring DHCP relay source interface...................................................................................................................... 270
Global DHCP relay source IPv4 or IPv6 configuration ...........................................................................................270
Interface level DHCP relay source IPv4 or IPv6 configuration ..............................................................................271
Configure the System for User Port Stacking (Option 230).......................................................................................272
Configure Secure DHCP...................................................................................................................................................272
Option 82 (DHCPv4 relay options)........................................................................................................................... 272
DHCPv6 relay agent options......................................................................................................................................273
DHCP Snooping...........................................................................................................................................................273
Drop DHCP Packets on Snooped VLANs Only........................................................................................................277
Dynamic ARP Inspection.............................................................................................................................................277
Configuring Dynamic ARP Inspection....................................................................................................................... 278
Source Address Validation................................................................................................................................................279
Enabling IP Source Address Validation..................................................................................................................... 279
DHCP MAC Source Address Validation................................................................................................................... 280
Enabling IP+MAC Source Address Validation..........................................................................................................280
Viewing the Number of SAV Dropped Packets.......................................................................................................280
Clearing the Number of SAV Dropped Packets....................................................................................................... 281
13 Equal Cost Multi-Path (ECMP).................................................................................................282
ECMP for Flow-Based Affinity........................................................................................................................................282
Configuring the Hash Algorithm................................................................................................................................ 282
Enabling Deterministic ECMP Next Hop.................................................................................................................. 282
Configuring the Hash Algorithm Seed...................................................................................................................... 282
Link Bundle Monitoring.....................................................................................................................................................283
Managing ECMP Group Paths.................................................................................................................................. 283
Creating an ECMP Group Bundle..............................................................................................................................284
Modifying the ECMP Group Threshold.................................................................................................................... 284
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table........................................285
Support for ECMP in host table................................................................................................................................285
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ........................................................................... 285
14 FIP Snooping.......................................................................................................................... 286
Fibre Channel over Ethernet............................................................................................................................................286
Ensure Robustness in a Converged Ethernet Network............................................................................................... 286
FIP Snooping on Ethernet Bridges..................................................................................................................................287
FIP Snooping in a Switch Stack...................................................................................................................................... 289
Using FIP Snooping...........................................................................................................................................................289
FIP Snooping Prerequisites........................................................................................................................................ 289
Important Points to Remember.................................................................................................................................289
Enabling the FCoE Transit Feature...........................................................................................................................290
Contents
9
Enable FIP Snooping on VLANs................................................................................................................................ 290
Configure the FC-MAP Value.....................................................................................................................................291
Configure a Port for a Bridge-to-Bridge Link...........................................................................................................291
Configure a Port for a Bridge-to-FCF Link...............................................................................................................291
Impact on Other Software Features......................................................................................................................... 291
FIP Snooping Restrictions...........................................................................................................................................291
Configuring FIP Snooping...........................................................................................................................................292
Displaying FIP Snooping Information.............................................................................................................................. 292
FCoE Transit Configuration Example..............................................................................................................................297
15 Flex Hash and Optimized Boot-Up............................................................................................ 299
Flex Hash Capability Overview........................................................................................................................................299
Configuring the Flex Hash Mechanism.......................................................................................................................... 299
Configuring Fast Boot and LACP Fast Switchover......................................................................................................300
Optimizing the Boot Time................................................................................................................................................ 300
Interoperation of Applications with Fast Boot and System States............................................................................. 301
RDMA Over Converged Ethernet (RoCE) Overview...................................................................................................303
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces........................................................................................ 304
16 Force10 Resilient Ring Protocol (FRRP)....................................................................................305
Protocol Overview............................................................................................................................................................ 305
Ring Status...................................................................................................................................................................306
Multiple FRRP Rings................................................................................................................................................... 306
Important FRRP Points...............................................................................................................................................307
Important FRRP Concepts.........................................................................................................................................308
Implementing FRRP.......................................................................................................................................................... 308
FRRP Configuration..........................................................................................................................................................309
Creating the FRRP Group..........................................................................................................................................309
Configuring the Control VLAN.................................................................................................................................. 309
Configuring and Adding the Member VLANs........................................................................................................... 310
Setting the FRRP Timers.............................................................................................................................................311
Clearing the FRRP Counters....................................................................................................................................... 311
Viewing the FRRP Configuration................................................................................................................................ 311
Viewing the FRRP Information....................................................................................................................................311
Troubleshooting FRRP...................................................................................................................................................... 312
Sample Configuration and Topology................................................................................................................................312
FRRP Support on VLT.......................................................................................................................................................313
17 GARP VLAN Registration Protocol (GVRP)................................................................................ 316
Configure GVRP.................................................................................................................................................................316
Enabling GVRP Globally.....................................................................................................................................................317
Enabling GVRP on a Layer 2 Interface............................................................................................................................318
Configure GVRP Registration...........................................................................................................................................318
Configure a GARP Timer...................................................................................................................................................318
18 Internet Group Management Protocol (IGMP)........................................................................... 320
IGMP Protocol Overview................................................................................................................................................. 320
IGMP Version 2............................................................................................................................................................320
IGMP Version 3............................................................................................................................................................ 321
10
Contents
Configure IGMP.................................................................................................................................................................324
Viewing IGMP Enabled Interfaces...................................................................................................................................324
Selecting an IGMP Version.............................................................................................................................................. 325
Viewing IGMP Groups...................................................................................................................................................... 326
Adjusting Timers................................................................................................................................................................326
Adjusting Query and Response Timers.....................................................................................................................326
Enabling IGMP Immediate-Leave.................................................................................................................................... 327
IGMP Snooping..................................................................................................................................................................327
Configuring IGMP Snooping.......................................................................................................................................327
Removing a Group-Port Association.........................................................................................................................328
Disabling Multicast Flooding.......................................................................................................................................328
Specifying a Port as Connected to a Multicast Router..........................................................................................328
Configuring the Switch as Querier............................................................................................................................329
Fast Convergence after MSTP Topology Changes......................................................................................................329
Egress Interface Selection (EIS) for HTTP and IGMP Applications...........................................................................329
Designating a Multicast Router Interface...................................................................................................................... 335
19 Interfaces...............................................................................................................................336
Interface Types..................................................................................................................................................................337
View Basic Interface Information.................................................................................................................................... 337
Resetting an Interface to its Factory Default State..................................................................................................... 339
Enabling a Physical Interface........................................................................................................................................... 339
Physical Interfaces............................................................................................................................................................ 339
Configuration Task List for Physical Interfaces.......................................................................................................340
40G to 1G Breakout Cable Adaptor.......................................................................................................................... 340
Overview of Layer Modes..........................................................................................................................................340
Configuring Layer 2 (Data Link) Mode......................................................................................................................341
Configuring Layer 2 (Interface) Mode.......................................................................................................................341
Configuring Layer 3 (Network) Mode.......................................................................................................................341
Configuring Layer 3 (Interface) Mode......................................................................................................................342
Automatic recovery of an Err-disabled interface.......................................................................................................... 342
Configuring an automatic recovery for an Err-disabled interface.........................................................................343
Egress Interface Selection (EIS)..................................................................................................................................... 344
Configuring EIS............................................................................................................................................................ 344
Management Interfaces................................................................................................................................................... 344
Configuring Management Interfaces........................................................................................................................ 344
Configuring a Management Interface on an Ethernet Port...................................................................................346
VLAN Interfaces................................................................................................................................................................346
Loopback Interfaces..........................................................................................................................................................347
Null Interfaces....................................................................................................................................................................347
Configuring Port Delay..................................................................................................................................................... 348
Port Channel Interfaces................................................................................................................................................... 348
Port Channel Definition and Standards.................................................................................................................... 348
Port Channel Benefits.................................................................................................................................................348
Port Channel Implementation.................................................................................................................................... 348
Interfaces in Port Channels........................................................................................................................................349
Configuration Tasks for Port Channel Interfaces....................................................................................................349
Creating a Port Channel............................................................................................................................................. 349
Adding a Physical Interface to a Port Channel........................................................................................................350
Reassigning an Interface to a New Port Channel....................................................................................................351
Contents
11
Configuring the Minimum Oper Up Links in a Port Channel..................................................................................352
Adding or Removing a Port Channel from a VLAN.................................................................................................352
Assigning an IP Address to a Port Channel..............................................................................................................353
Deleting or Disabling a Port Channel.........................................................................................................................353
Load Balancing Through Port Channels................................................................................................................... 354
Changing the Hash Algorithm....................................................................................................................................354
Bulk Configuration.............................................................................................................................................................355
Interface Range...........................................................................................................................................................355
Bulk Configuration Examples..................................................................................................................................... 355
Defining Interface Range Macros....................................................................................................................................357
Define the Interface Range........................................................................................................................................ 357
Choosing an Interface-Range Macro........................................................................................................................357
Monitoring and Maintaining Interfaces...........................................................................................................................357
Maintenance Using TDR.............................................................................................................................................358
Non Dell-Qualified Transceivers...................................................................................................................................... 359
Splitting 40G Ports without Reload................................................................................................................................359
Splitting QSFP Ports to SFP+ Ports.............................................................................................................................. 360
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port......................................................................................361
Link Dampening................................................................................................................................................................. 363
Enabling Link Dampening............................................................................................................................................366
Link Bundle Monitoring..................................................................................................................................................... 367
Using Ethernet Pause Frames for Flow Control............................................................................................................367
Enabling Pause Frames...............................................................................................................................................368
Configure the MTU Size on an Interface.......................................................................................................................368
Port-Pipes.......................................................................................................................................................................... 369
Auto-Negotiation on Ethernet Interfaces...................................................................................................................... 369
Setting the Speed of Ethernet Interfaces................................................................................................................369
Set Auto-Negotiation Options................................................................................................................................... 370
View Advanced Interface Information.............................................................................................................................371
Configuring the Interface Sampling Size.................................................................................................................. 372
Configuring the Traffic Sampling Size Globally..............................................................................................................373
Dynamic Counters............................................................................................................................................................. 374
Clearing Interface Counters....................................................................................................................................... 374
Compressing Configuration Files.....................................................................................................................................375
Discard Counters............................................................................................................................................................... 377
Display discard counters............................................................................................................................................. 377
20 IPv4 Routing.......................................................................................................................... 380
IP Addresses....................................................................................................................................................................... 381
Configuration Tasks for IP Addresses............................................................................................................................. 381
Assigning IP Addresses to an Interface...........................................................................................................................381
Configuring Static Routes................................................................................................................................................382
Adding description for IPv4 and IPv6 static routes................................................................................................ 383
Configure Static Routes for the Management Interface.............................................................................................383
IPv4 Path MTU Discovery Overview..............................................................................................................................384
Using the Configured Source IP Address in ICMP Messages..................................................................................... 384
Configuring the Duration to Establish a TCP Connection........................................................................................... 385
Enabling Directed Broadcast........................................................................................................................................... 385
Resolution of Host Names............................................................................................................................................... 385
Enabling Dynamic Resolution of Host Names............................................................................................................... 386
12
Contents
Specifying the Local System Domain and a List of Domains.......................................................................................386
Configuring DNS with Traceroute.................................................................................................................................. 386
ARP..................................................................................................................................................................................... 387
Configuration Tasks for ARP........................................................................................................................................... 387
Configuring Static ARP Entries....................................................................................................................................... 387
Enabling Proxy ARP.......................................................................................................................................................... 388
Clearing ARP Cache..........................................................................................................................................................388
ARP Learning via Gratuitous ARP...................................................................................................................................388
Enabling ARP Learning via Gratuitous ARP................................................................................................................... 389
ARP Learning via ARP Request.......................................................................................................................................389
Configuring ARP Retries.................................................................................................................................................. 390
ICMP...................................................................................................................................................................................390
Configuration Tasks for ICMP.........................................................................................................................................390
Enabling ICMP Unreachable Messages..........................................................................................................................390
ICMP Redirects................................................................................................................................................................. 390
UDP Helper......................................................................................................................................................................... 391
Enabling UDP Helper.........................................................................................................................................................392
Configurations Using UDP Helper...................................................................................................................................392
UDP Helper with Broadcast-All Addresses....................................................................................................................392
UDP Helper with Subnet Broadcast Addresses............................................................................................................393
UDP Helper with Configured Broadcast Addresses..................................................................................................... 393
UDP Helper with No Configured Broadcast Addresses...............................................................................................394
Troubleshooting UDP Helper........................................................................................................................................... 394
21 IPv6 Routing...........................................................................................................................395
Protocol Overview............................................................................................................................................................ 395
Extended Address Space........................................................................................................................................... 395
Stateless Autoconfiguration.......................................................................................................................................395
IPv6 Headers................................................................................................................................................................396
Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support...................................................................... 396
IPv6 Header Fields.......................................................................................................................................................397
Extension Header Fields............................................................................................................................................. 398
Addressing....................................................................................................................................................................399
Implementing IPv6 with Dell EMC Networking OS...................................................................................................... 400
ICMPv6...............................................................................................................................................................................402
Path MTU discovery.........................................................................................................................................................402
IPv6 Neighbor Discovery..................................................................................................................................................402
IPv6 Neighbor Discovery of MTU Packets.............................................................................................................. 403
Configuring the IPv6 Recursive DNS Server...........................................................................................................403
Debugging IPv6 RDNSS Information Sent to the Host .........................................................................................404
Displaying IPv6 RDNSS Information......................................................................................................................... 404
Secure Shell (SSH) Over an IPv6 Transport.................................................................................................................405
Configuration Tasks for IPv6...........................................................................................................................................405
Adjusting Your CAM-Profile.......................................................................................................................................405
Assigning an IPv6 Address to an Interface.............................................................................................................. 406
Assigning a Static IPv6 Route................................................................................................................................... 406
Configuring Telnet with IPv6..................................................................................................................................... 407
SNMP over IPv6..........................................................................................................................................................407
Displaying IPv6 Information........................................................................................................................................407
Displaying an IPv6 Interface Information..................................................................................................................408
Contents
13
Showing IPv6 Routes................................................................................................................................................. 408
Showing the Running-Configuration for an Interface............................................................................................ 409
Clearing IPv6 Routes................................................................................................................................................... 410
Disabling ND Entry Timeout........................................................................................................................................410
Configuring IPv6 RA Guard.............................................................................................................................................. 410
Configuring IPv6 RA Guard on an Interface............................................................................................................. 412
Monitoring IPv6 RA Guard..........................................................................................................................................412
22 iSCSI Optimization.................................................................................................................. 413
iSCSI Optimization Overview........................................................................................................................................... 413
Monitoring iSCSI Traffic Flows...................................................................................................................................414
Application of Quality of Service to iSCSI Traffic Flows.........................................................................................414
Information Monitored in iSCSI Traffic Flows.......................................................................................................... 415
Detection and Auto-Configuration for Dell EqualLogic Arrays...............................................................................415
Configuring Detection and Ports for Dell Compellent Arrays.................................................................................416
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer................................................................... 416
Enable and Disable iSCSI Optimization......................................................................................................................417
Default iSCSI Optimization Values................................................................................................................................... 417
iSCSI Optimization Prerequisites......................................................................................................................................417
Configuring iSCSI Optimization........................................................................................................................................418
Displaying iSCSI Optimization Information......................................................................................................................419
23 Intermediate System to Intermediate System............................................................................ 421
IS-IS Protocol Overview....................................................................................................................................................421
IS-IS Addressing................................................................................................................................................................. 421
Multi-Topology IS-IS......................................................................................................................................................... 422
Transition Mode...........................................................................................................................................................422
Interface Support........................................................................................................................................................ 422
Adjacencies...................................................................................................................................................................422
Graceful Restart................................................................................................................................................................ 423
Timers........................................................................................................................................................................... 423
Implementation Information............................................................................................................................................. 423
Configuration Information................................................................................................................................................ 424
Configuration Tasks for IS-IS.....................................................................................................................................424
Configuring the Distance of a Route......................................................................................................................... 431
Changing the IS-Type..................................................................................................................................................431
Redistributing IPv4 Routes.........................................................................................................................................433
Redistributing IPv6 Routes.........................................................................................................................................433
Configuring Authentication Passwords.................................................................................................................... 434
Setting the Overload Bit.............................................................................................................................................434
Debugging IS-IS...........................................................................................................................................................435
IS-IS Metric Styles............................................................................................................................................................ 436
Configure Metric Values...................................................................................................................................................436
Maximum Values in the Routing Table..................................................................................................................... 436
Change the IS-IS Metric Style in One Level Only................................................................................................... 436
Leaks from One Level to Another............................................................................................................................. 438
Sample Configurations......................................................................................................................................................438
24 Link Aggregation Control Protocol (LACP)................................................................................ 441
14
Contents
Introduction to Dynamic LAGs and LACP.......................................................................................................................441
Important Points to Remember..................................................................................................................................441
LACP Modes.................................................................................................................................................................441
Configuring LACP Commands...................................................................................................................................442
LACP Configuration Tasks............................................................................................................................................... 442
Creating a LAG............................................................................................................................................................ 442
Configuring the LAG Interfaces as Dynamic............................................................................................................443
Setting the LACP Long Timeout............................................................................................................................... 443
Monitoring and Debugging LACP..............................................................................................................................444
Shared LAG State Tracking............................................................................................................................................. 444
Configuring Shared LAG State Tracking..................................................................................................................445
Important Points about Shared LAG State Tracking..............................................................................................446
LACP Basic Configuration Example................................................................................................................................446
Configure a LAG on ALPHA.......................................................................................................................................446
25 Layer 2.................................................................................................................................. 454
Manage the MAC Address Table.................................................................................................................................... 454
Clearing the MAC Address Table.............................................................................................................................. 454
Setting the Aging Time for Dynamic Entries............................................................................................................454
Configuring a Static MAC Address........................................................................................................................... 454
Displaying the MAC Address Table...........................................................................................................................455
MAC Learning Limit.......................................................................................................................................................... 455
Setting the MAC Learning Limit................................................................................................................................455
mac learning-limit Dynamic........................................................................................................................................ 456
mac learning-limit mac-address-sticky.....................................................................................................................456
mac learning-limit station-move................................................................................................................................456
mac learning-limit no-station-move.......................................................................................................................... 456
Learning Limit Violation Actions.................................................................................................................................457
Setting Station Move Violation Actions....................................................................................................................457
Recovering from Learning Limit and Station Move Violations...............................................................................457
Enabling port security................................................................................................................................................. 458
NIC Teaming...................................................................................................................................................................... 458
Configure Redundant Pairs..............................................................................................................................................459
Far-End Failure Detection................................................................................................................................................ 462
FEFD State Changes.................................................................................................................................................. 462
Configuring FEFD........................................................................................................................................................ 463
Enabling FEFD on an Interface.................................................................................................................................. 464
Debugging FEFD..........................................................................................................................................................464
26 Link Layer Discovery Protocol (LLDP)...................................................................................... 466
802.1AB (LLDP) Overview...............................................................................................................................................466
Protocol Data Units.....................................................................................................................................................466
Optional TLVs.................................................................................................................................................................... 467
Management TLVs......................................................................................................................................................467
TIA-1057 (LLDP-MED) Overview................................................................................................................................... 468
TIA Organizationally Specific TLVs........................................................................................................................... 469
Configure LLDP................................................................................................................................................................. 472
CONFIGURATION versus INTERFACE Configurations............................................................................................... 472
Enabling LLDP....................................................................................................................................................................473
Contents
15
Disabling and Undoing LLDP...................................................................................................................................... 473
Enabling LLDP on Management Ports............................................................................................................................473
Disabling and Undoing LLDP on Management Ports..............................................................................................474
Advertising TLVs............................................................................................................................................................... 474
Storing and Viewing Unrecognized LLDP TLVs............................................................................................................475
Viewing the LLDP Configuration..................................................................................................................................... 476
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................... 476
Examples of Viewing Information Advertised by Neighbors.................................................................................. 476
Configuring LLDPDU Intervals.........................................................................................................................................479
Configuring LLDP Notification Interval...........................................................................................................................479
Configuring LLDP Notification Interval...........................................................................................................................480
Configuring Transmit and Receive Mode.......................................................................................................................480
Configuring the Time to Live Value................................................................................................................................. 481
Debugging LLDP................................................................................................................................................................ 481
Relevant Management Objects.......................................................................................................................................482
27 Microsoft Network Load Balancing........................................................................................... 487
Configuring a Switch for NLB ........................................................................................................................................ 488
Enabling a Switch for Multicast NLB........................................................................................................................488
28 Multicast Source Discovery Protocol (MSDP)........................................................................... 490
Anycast RP......................................................................................................................................................................... 491
Implementation Information.............................................................................................................................................492
Configure Multicast Source Discovery Protocol...........................................................................................................492
Related Configuration Tasks......................................................................................................................................492
Enable MSDP.....................................................................................................................................................................496
Manage the Source-Active Cache..................................................................................................................................497
Viewing the Source-Active Cache............................................................................................................................ 497
Limiting the Source-Active Cache............................................................................................................................ 497
Clearing the Source-Active Cache............................................................................................................................497
Enabling the Rejected Source-Active Cache...........................................................................................................498
Accept Source-Active Messages that Fail the RFP Check.........................................................................................498
Specifying Source-Active Messages..............................................................................................................................500
Limiting the Source-Active Messages from a Peer.......................................................................................................501
Preventing MSDP from Caching a Local Source...........................................................................................................501
Preventing MSDP from Caching a Remote Source......................................................................................................501
Preventing MSDP from Advertising a Local Source.................................................................................................... 502
Logging Changes in Peership States..............................................................................................................................503
Terminating a Peership.....................................................................................................................................................503
Clearing Peer Statistics.................................................................................................................................................... 503
Debugging MSDP..............................................................................................................................................................504
MSDP with Anycast RP................................................................................................................................................... 504
Configuring Anycast RP...................................................................................................................................................505
Reducing Source-Active Message Flooding............................................................................................................506
Specifying the RP Address Used in SA Messages..................................................................................................506
MSDP Sample Configurations.........................................................................................................................................508
29 Multicast Listener Discovery Protocol....................................................................................... 511
MLD timers......................................................................................................................................................................... 514
16
Contents
Reducing Host Response Burstiness.........................................................................................................................514
Configuring MLD Version..................................................................................................................................................514
Clearing MLD groups.........................................................................................................................................................515
Debugging MLD................................................................................................................................................................. 515
Explicit Tracking.................................................................................................................................................................515
Reducing Leave Latency...................................................................................................................................................515
Displaying MLD groups table............................................................................................................................................515
Displaying MLD Interfaces................................................................................................................................................516
30 Multiple Spanning Tree Protocol (MSTP).................................................................................. 517
Spanning Tree Variations.................................................................................................................................................. 518
Implementation Information........................................................................................................................................518
Configure Multiple Spanning Tree Protocol................................................................................................................... 518
Related Configuration Tasks.......................................................................................................................................518
Enable Multiple Spanning Tree Globally.......................................................................................................................... 519
Adding and Removing Interfaces.....................................................................................................................................519
Creating Multiple Spanning Tree Instances....................................................................................................................519
Influencing MSTP Root Selection....................................................................................................................................521
Interoperate with Non-Dell Bridges.................................................................................................................................521
Changing the Region Name or Revision......................................................................................................................... 521
Modifying Global Parameters.......................................................................................................................................... 522
Modifying the Interface Parameters...............................................................................................................................523
Setting STP path cost as constant.................................................................................................................................523
Configuring an EdgePort..................................................................................................................................................524
Flush MAC Addresses after a Topology Change.......................................................................................................... 524
MSTP Sample Configurations......................................................................................................................................... 525
Debugging and Verifying MSTP Configurations........................................................................................................... 529
31 Multicast Features...................................................................................................................531
Enabling IP Multicast......................................................................................................................................................... 531
Implementation Information..............................................................................................................................................531
Multicast Policies...............................................................................................................................................................532
IPv4 Multicast Policies................................................................................................................................................532
Understanding Multicast Traceroute (mtrace).............................................................................................................539
Printing Multicast Traceroute (mtrace) Paths..............................................................................................................539
Supported Error Codes..................................................................................................................................................... 541
mtrace Scenarios............................................................................................................................................................... 541
32 Multicast Listener Discovery Protocol...................................................................................... 547
MLD timers........................................................................................................................................................................ 550
Reducing Host Response Burstiness........................................................................................................................550
Clearing MLD groups........................................................................................................................................................550
Debugging MLD................................................................................................................................................................. 551
Explicit Tracking.................................................................................................................................................................551
Reducing Leave Latency...................................................................................................................................................551
Displaying MLD groups table............................................................................................................................................551
Displaying MLD Interfaces................................................................................................................................................551
MLD Snooping...................................................................................................................................................................552
Enable MLD Snooping................................................................................................................................................ 552
Contents
17
Disable MLD Snooping................................................................................................................................................552
Configure the switch as a querier............................................................................................................................. 552
Specify port as connected to multicast router........................................................................................................553
Enable Snooping Explicit Tracking............................................................................................................................ 553
Display the MLD Snooping Table.............................................................................................................................. 553
33 Object Tracking......................................................................................................................554
Object Tracking Overview............................................................................................................................................... 554
Track Layer 2 Interfaces............................................................................................................................................ 555
Track Layer 3 Interfaces............................................................................................................................................ 555
Track IPv4 and IPv6 Routes...................................................................................................................................... 555
Set Tracking Delays.................................................................................................................................................... 556
VRRP Object Tracking................................................................................................................................................557
Object Tracking Configuration........................................................................................................................................ 557
Tracking a Layer 2 Interface...................................................................................................................................... 557
Tracking a Layer 3 Interface......................................................................................................................................558
Track an IPv4/IPv6 Route......................................................................................................................................... 559
Displaying Tracked Objects..............................................................................................................................................562
34 Open Shortest Path First (OSPFv2 and OSPFv3)...................................................................... 564
Protocol Overview............................................................................................................................................................ 564
Autonomous System (AS) Areas.............................................................................................................................. 564
Area Types................................................................................................................................................................... 565
Networks and Neighbors........................................................................................................................................... 566
Router Types............................................................................................................................................................... 566
Designated and Backup Designated Routers...........................................................................................................567
Link-State Advertisements (LSAs)........................................................................................................................... 567
Router Priority and Cost.............................................................................................................................................568
OSPF with Dell EMC Networking OS............................................................................................................................ 569
Graceful Restart..........................................................................................................................................................569
Fast Convergence (OSPFv2, IPv4 Only)................................................................................................................. 570
Multi-Process OSPFv2 with VRF..............................................................................................................................570
RFC-2328 Compliant OSPF Flooding........................................................................................................................571
OSPF ACK Packing..................................................................................................................................................... 572
Setting OSPF Adjacency with Cisco Routers..........................................................................................................572
Configuration Information................................................................................................................................................ 572
Configuration Task List for OSPFv2 (OSPF for IPv4)........................................................................................... 573
OSPFv3 NSSA...................................................................................................................................................................584
Configuration Task List for OSPFv3 (OSPF for IPv6).................................................................................................585
Enabling IPv6 Unicast Routing.................................................................................................................................. 585
Applying cost for OSPFv3..........................................................................................................................................585
Assigning IPv6 Addresses on an Interface...............................................................................................................586
Assigning Area ID on an Interface............................................................................................................................. 586
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................... 586
Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................... 587
Configuring Stub Areas...............................................................................................................................................587
Configuring Passive-Interface................................................................................................................................... 587
Redistributing Routes................................................................................................................................................. 588
Configuring a Default Route...................................................................................................................................... 588
18
Contents
Enabling OSPFv3 Graceful Restart...........................................................................................................................588
OSPFv3 Authentication Using IPsec........................................................................................................................ 590
Troubleshooting OSPFv3...........................................................................................................................................595
MIB Support for OSPFv3.................................................................................................................................................596
Viewing the OSPFv3 MIB...........................................................................................................................................597
35 Policy-based Routing (PBR)....................................................................................................598
Overview............................................................................................................................................................................ 598
Implementing PBR............................................................................................................................................................ 599
Configuration Task List for Policy-based Routing........................................................................................................ 599
Create a Redirect List.................................................................................................................................................600
Create a Rule for a Redirect-list................................................................................................................................600
Apply a Redirect-list to an Interface using a Redirect-group.................................................................................601
Sample Configuration....................................................................................................................................................... 603
36 PIM Sparse-Mode (PIM-SM)................................................................................................... 608
Implementation Information.............................................................................................................................................608
Protocol Overview............................................................................................................................................................ 608
Requesting Multicast Traffic..................................................................................................................................... 608
Refuse Multicast Traffic.............................................................................................................................................608
Send Multicast Traffic................................................................................................................................................ 609
Configuring PIM-SM.........................................................................................................................................................609
Related Configuration Tasks......................................................................................................................................609
Enable PIM-SM................................................................................................................................................................. 609
Configuring S,G Expiry Timers.......................................................................................................................................... 611
Configuring a Static Rendezvous Point.......................................................................................................................... 612
Overriding Bootstrap Router Updates...................................................................................................................... 612
Configuring a Designated Router.....................................................................................................................................613
Creating Multicast Boundaries and Domains..................................................................................................................614
Electing an RP using the BSR Mechanism..................................................................................................................... 614
37 PIM Source-Specific Mode (PIM-SSM).....................................................................................616
Implementation Information..............................................................................................................................................616
Configure PIM-SSM.......................................................................................................................................................... 616
Enabling PIM-SSM.............................................................................................................................................................617
Use PIM-SSM with IGMP Version 2 Hosts.................................................................................................................... 617
Electing an RP using the BSR Mechanism..................................................................................................................... 618
Enabling RP to Server Specific Multicast Groups................................................................................................... 619
38 Port Monitoring...................................................................................................................... 621
Important Points to Remember....................................................................................................................................... 621
Port Monitoring..................................................................................................................................................................621
Configuring Port Monitoring............................................................................................................................................623
Configuring Monitor Multicast Queue............................................................................................................................ 624
Enabling Flow-Based Monitoring.....................................................................................................................................624
Remote Port Mirroring..................................................................................................................................................... 625
Remote Port Mirroring Example................................................................................................................................626
Configuring Remote Port Mirroring.......................................................................................................................... 626
Displaying Remote-Port Mirroring Configurations..................................................................................................628
Contents
19
Configuration procedure for Remote Port Mirroring..............................................................................................628
Encapsulated Remote Port Monitoring..........................................................................................................................632
ERPM Behavior on a typical Dell EMC Networking OS .............................................................................................. 634
Port Monitoring on VLT................................................................................................................................................... 635
39 Per-VLAN Spanning Tree Plus (PVST+)....................................................................................638
Protocol Overview............................................................................................................................................................ 638
Implementation Information.............................................................................................................................................639
Configure Per-VLAN Spanning Tree Plus......................................................................................................................639
Enabling PVST+.................................................................................................................................................................639
Disabling PVST+................................................................................................................................................................639
Influencing PVST+ Root Selection..................................................................................................................................640
Modifying Global PVST+ Parameters..............................................................................................................................641
Modifying Interface PVST+ Parameters........................................................................................................................642
Configuring an EdgePort..................................................................................................................................................642
PVST+ in Multi-Vendor Networks.................................................................................................................................. 643
Enabling PVST+ Extend System ID................................................................................................................................ 643
PVST+ Sample Configurations........................................................................................................................................644
40 Quality of Service (QoS)......................................................................................................... 646
Implementation Information.............................................................................................................................................648
Port-Based QoS Configurations......................................................................................................................................648
Setting dot1p Priorities for Incoming Traffic............................................................................................................648
Honoring dot1p Priorities on Ingress Traffic.............................................................................................................649
Configuring Port-Based Rate Policing......................................................................................................................649
Configuring Port-Based Rate Shaping..................................................................................................................... 649
Policy-Based QoS Configurations...................................................................................................................................650
Classify Traffic.............................................................................................................................................................650
Dot1p to Queue Mapping Requirement....................................................................................................................653
Create a QoS Policy....................................................................................................................................................654
DSCP Color Maps....................................................................................................................................................... 656
Create Policy Maps.....................................................................................................................................................658
Enabling QoS Rate Adjustment.......................................................................................................................................660
Enabling Strict-Priority Queueing.................................................................................................................................... 661
Queue Classification Requirements for PFC Functionality...........................................................................................661
Support for marking dot1p value in L3 Input Qos Policy...............................................................................................661
Weighted Random Early Detection.................................................................................................................................662
Creating WRED Profiles............................................................................................................................................. 663
Applying a WRED Profile to Traffic...........................................................................................................................663
Displaying Default and Configured WRED Profiles................................................................................................. 663
Displaying WRED Drop Statistics.............................................................................................................................. 664
Displaying egress–queue Statistics...........................................................................................................................664
Pre-Calculating Available QoS CAM Space................................................................................................................... 664
Specifying Policy-Based Rate Shaping in Packets Per Second..................................................................................665
Configuring Policy-Based Rate Shaping........................................................................................................................ 666
Configuring Weights and ECN for WRED .....................................................................................................................666
Configuring WRED and ECN Attributes.........................................................................................................................667
Guidelines for Configuring ECN for Classifying and Color-Marking Packets............................................................ 668
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class.................................... 668
20
Contents
/