Dell C9010 Modular Chassis Switch User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell C9010 Modular Chassis Switch User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Networking Conguration Guide for the
C9010 Series
Version 9.13.0.1P1
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2018 - 03
Rev. A00
Contents
1 About this Guide...........................................................................................................................................36
Audience........................................................................................................................................................................... 36
Conventions......................................................................................................................................................................36
Related Documents......................................................................................................................................................... 36
2 Conguration Fundamentals........................................................................................................................ 37
Accessing the Command Line........................................................................................................................................ 37
CLI Modes.........................................................................................................................................................................37
Navigating CLI Modes............................................................................................................................................... 39
The do Command............................................................................................................................................................ 42
Undoing Commands........................................................................................................................................................ 43
Obtaining Help..................................................................................................................................................................43
Entering and Editing Commands....................................................................................................................................43
Command History............................................................................................................................................................ 44
Filtering show Command Outputs................................................................................................................................. 44
Multiple Users in Conguration Mode...........................................................................................................................46
3 Getting Started............................................................................................................................................47
Console Access................................................................................................................................................................ 47
Serial Console.............................................................................................................................................................48
Mounting an NFS File System........................................................................................................................................49
Important Points to Remember................................................................................................................................49
Default Conguration...................................................................................................................................................... 50
Conguring a Host Name............................................................................................................................................... 50
Accessing the System Remotely.................................................................................................................................... 51
Accessing the System Remotely.............................................................................................................................. 51
Congure the Management Port IP Address..........................................................................................................51
Congure a Management Route...............................................................................................................................51
Conguring a Username and Password.................................................................................................................. 52
Conguring the Enable Password..................................................................................................................................53
Manage Conguration Files............................................................................................................................................53
File Storage.................................................................................................................................................................53
Copy Files to and from the System......................................................................................................................... 54
Save the Running-Conguration............................................................................................................................. 55
Congure the Overload Bit for a Startup Scenario............................................................................................... 55
Viewing Files...............................................................................................................................................................55
Changes in Conguration Files.................................................................................................................................56
Viewing Command History..............................................................................................................................................57
Upgrading the Dell Networking OS................................................................................................................................57
4 Switch Management....................................................................................................................................58
Conguring Privilege Levels........................................................................................................................................... 58
Contents
3
Creating a Custom Privilege Level...........................................................................................................................58
Removing a Command from EXEC Mode.............................................................................................................. 58
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................58
Allowing Access to CONFIGURATION Mode Commands....................................................................................59
Allowing Access to the Following Modes................................................................................................................59
Applying a Privilege Level to a Username...............................................................................................................60
Applying a Privilege Level to a Terminal Line...........................................................................................................61
Conguring Logging......................................................................................................................................................... 61
Audit and Security Logs.............................................................................................................................................61
Conguring Logging Format ...................................................................................................................................63
Setting Up a Secure Connection to a Syslog Server.............................................................................................63
Track Login Activity......................................................................................................................................................... 65
Restrictions for Tracking Login Activity.................................................................................................................. 65
Conguring Login Activity Tracking.........................................................................................................................65
Display Login Statistics..............................................................................................................................................65
Limit Concurrent Login Sessions....................................................................................................................................67
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................67
Conguring Concurrent Session Limit.....................................................................................................................67
Enabling the System to Clear Existing Sessions.................................................................................................... 68
Enabling Secured CLI Mode........................................................................................................................................... 68
Log Messages in the Internal Buer..............................................................................................................................69
Conguration Task List for System Log Management..........................................................................................69
Disabling System Logging............................................................................................................................................... 69
Sending System Messages to a Syslog Server............................................................................................................69
Conguring a UNIX System as a Syslog Server.....................................................................................................70
Display the Logging Buer and the Logging Conguration........................................................................................ 70
Changing System Logging Settings............................................................................................................................... 71
Conguring a UNIX Logging Facility Level.....................................................................................................................71
Synchronizing Log Messages......................................................................................................................................... 72
Enabling Timestamp on Syslog Messages.................................................................................................................... 73
File Transfer Services.......................................................................................................................................................73
Conguration Task List for File Transfer Services..................................................................................................73
Enabling the FTP Server........................................................................................................................................... 74
Conguring FTP Server Parameters........................................................................................................................74
Conguring FTP Client Parameters......................................................................................................................... 74
Terminal Lines................................................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line................................................................................................75
Conguring Login Authentication for Terminal Lines.............................................................................................76
Setting Time Out of EXEC Privilege Mode...................................................................................................................76
Using Telnet to Access Another Network Device........................................................................................................ 77
Lock CONFIGURATION Mode....................................................................................................................................... 78
Viewing the Conguration Lock Status...................................................................................................................78
LPC Bus Quality Degradation......................................................................................................................................... 78
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................79
Recovering from a Forgotten Password ......................................................................................................................80
4
Contents
Ignoring the Startup Conguration and Booting from the Factory-Default Conguration.....................................80
Recovering from a Failed Start....................................................................................................................................... 81
Restoring Factory-Default Settings................................................................................................................................81
Important Point to Remember.................................................................................................................................. 81
Restoring Factory-Default Boot Environment Variables....................................................................................... 82
Using Hashes to Verify Software Images Before Installation..................................................................................... 83
Verifying System Images on C9010 Components........................................................................................................84
When System Images on C9010 Components Do Not Match.............................................................................85
Manually Resetting the System Image on a C9010 Component......................................................................... 85
Logging in to the Virtual Console of a C9010 Component................................................................................... 86
Booting the C9010 from an Image on a Network Server..................................................................................... 86
Conguring C9010 Components to Boot from the RPM CP Image................................................................... 86
Viewing the Reason for Last System Reboot...............................................................................................................87
5 802.1X..........................................................................................................................................................88
The Port-Authentication Process.................................................................................................................................. 90
EAP over RADIUS.......................................................................................................................................................91
Conguring 802.1X...........................................................................................................................................................92
Related Conguration Tasks..................................................................................................................................... 92
Important Points to Remember......................................................................................................................................92
Enabling 802.1X................................................................................................................................................................ 93
Conguring dot1x Prole ................................................................................................................................................95
Conguring MAC addresses for a do1x Prole.............................................................................................................95
Conguring the Static MAB and MAB Prole .............................................................................................................96
Conguring Critical VLAN ..............................................................................................................................................97
Conguring Request Identity Re-Transmissions...........................................................................................................97
Conguring a Quiet Period after a Failed Authentication........................................................................................... 98
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 99
Re-Authenticating a Port.............................................................................................................................................. 100
Conguring Dynamic VLAN Assignment with Port Authentication.........................................................................100
Guest and Authentication-Fail VLANs..........................................................................................................................101
Conguring a Guest VLAN......................................................................................................................................102
Conguring an Authentication-Fail VLAN............................................................................................................. 103
Conguring Timeouts...............................................................................................................................................104
Multi-Host Authentication.............................................................................................................................................105
Conguring Multi-Host AuthenticationConguring Single-Host Authentication............................................. 106
Multi-Supplicant Authentication................................................................................................................................... 107
Conguring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication.............................108
MAC Authentication Bypass.........................................................................................................................................109
MAB in Single-host and Multi-Host Mode............................................................................................................109
MAB in Multi-Supplicant Authentication Mode.....................................................................................................110
Conguring MAC Authentication Bypass...............................................................................................................110
Dynamic CoS with 802.1X...............................................................................................................................................111
6 Access Control Lists (ACLs)........................................................................................................................113
IP Access Control Lists (ACLs)......................................................................................................................................113
Contents
5
CAM Usage................................................................................................................................................................114
User-Congurable CAM Allocation......................................................................................................................... 115
Allocating CAM for Ingress ACLs on the Port Extender...................................................................................... 115
Allocating CAM for Egress ACLs on the Port Extender....................................................................................... 117
Implementing ACLs on Dell EMC Networking OS.................................................................................................118
ACL Optimization to Increase Number of Supported IPv4 ACLs..............................................................................119
Restrictions for ACL Optimization.......................................................................................................................... 119
Optimizing ACL for More Number of IPv4 ACL Rules.........................................................................................120
IP Fragment Handling.................................................................................................................................................... 120
IP Fragments ACL Examples...................................................................................................................................120
Layer 4 ACL Rules Examples................................................................................................................................... 121
Congure a Standard IP ACL........................................................................................................................................ 122
Conguring a Standard IP ACL Filter..................................................................................................................... 123
Congure an Extended IP ACL..................................................................................................................................... 124
Conguring Filters with a Sequence Number....................................................................................................... 124
Conguring Filters Without a Sequence Number.................................................................................................125
Congure Layer 2 and Layer 3 ACLs............................................................................................................................126
Using ACL VLAN Groups...............................................................................................................................................126
Guidelines for Conguring ACL VLAN Groups......................................................................................................126
Conguring an ACL VLAN Group........................................................................................................................... 127
Allocating ACL VLAN CAM..................................................................................................................................... 128
Applying an IP ACL to an Interface.............................................................................................................................. 128
Applying Ingress ACLs on the Port Extender........................................................................................................129
Applying Egress ACLs.............................................................................................................................................. 130
Applying Layer 3 Egress ACLs on Control-Plane Trac......................................................................................130
Counting ACL Hits.....................................................................................................................................................131
IP Prex Lists................................................................................................................................................................... 131
Implementation Information.................................................................................................................................... 132
Conguration Task List for Prex Lists.................................................................................................................. 132
ACL Resequencing......................................................................................................................................................... 135
Resequencing an ACL or Prex List.......................................................................................................................136
Route Maps..................................................................................................................................................................... 137
Implementation Information.....................................................................................................................................137
Important Points to Remember.....................................................................................................................................137
Conguration Task List for Route Maps................................................................................................................ 138
Conguring Match Routes......................................................................................................................................140
Conguring Set Conditions......................................................................................................................................141
Congure a Route Map for Route Redistribution.................................................................................................142
Congure a Route Map for Route Tagging............................................................................................................143
Continue Clause........................................................................................................................................................143
Conguring a UDF ACL................................................................................................................................................. 143
Hot-Lock Behavior......................................................................................................................................................... 145
7 Bidirectional Forwarding Detection (BFD).................................................................................................. 146
How BFD Works............................................................................................................................................................. 146
BFD Packet Format..................................................................................................................................................147
6
Contents
BFD Sessions............................................................................................................................................................ 148
BFD Three-Way Handshake.................................................................................................................................... 149
Session State Changes.............................................................................................................................................151
Important Points to Remember..................................................................................................................................... 151
Congure BFD................................................................................................................................................................. 151
Congure BFD for Physical Ports...........................................................................................................................152
Congure BFD for Static Routes............................................................................................................................153
Congure BFD for IPv6 Static Routes...................................................................................................................156
Congure BFD for OSPF.........................................................................................................................................158
Congure BFD for OSPFv3.....................................................................................................................................162
Congure BFD for IS-IS...........................................................................................................................................165
Congure BFD for BGP........................................................................................................................................... 167
Congure BFD for VRRP.........................................................................................................................................173
Conguring Protocol Liveness................................................................................................................................ 176
8 Border Gateway Protocol IPv4 (BGPv4).....................................................................................................177
Autonomous Systems (AS)............................................................................................................................................177
Sessions and Peers.........................................................................................................................................................179
Establish a Session................................................................................................................................................... 179
Route Reectors.............................................................................................................................................................180
Communities.............................................................................................................................................................. 181
BGP Attributes................................................................................................................................................................ 181
Best Path Selection Criteria.....................................................................................................................................181
Weight........................................................................................................................................................................183
Local Preference.......................................................................................................................................................183
Multi-Exit Discriminators (MEDs)...........................................................................................................................184
Origin..........................................................................................................................................................................185
AS Path......................................................................................................................................................................185
Next Hop................................................................................................................................................................... 186
Multiprotocol BGP..........................................................................................................................................................186
Implement BGP ............................................................................................................................................................. 186
Additional Path (Add-Path) Support......................................................................................................................186
Advertise IGP Cost as MED for Redistributed Routes.........................................................................................187
Ignore Router-ID for Some Best-Path Calculations..............................................................................................187
Four-Byte AS Numbers............................................................................................................................................187
AS4 Number Representation.................................................................................................................................. 188
AS Number Migration.............................................................................................................................................. 189
BGP4 Management Information Base (MIB)........................................................................................................ 191
Important Points to Remember...............................................................................................................................191
Conguration Information..............................................................................................................................................192
BGP Conguration......................................................................................................................................................... 192
Enabling BGP............................................................................................................................................................ 193
Conguring AS4 Number Representations........................................................................................................... 196
Conguring Peer Groups......................................................................................................................................... 197
Conguring BGP Fast Fail-Over............................................................................................................................ 200
Conguring Passive Peering................................................................................................................................... 201
Contents
7
Maintaining Existing AS Numbers During an AS Migration................................................................................ 202
Allowing an AS Number to Appear in its Own AS Path...................................................................................... 203
Enabling Neighbor Graceful Restart......................................................................................................................204
Filtering on an AS-Path Attribute.......................................................................................................................... 204
Regular Expressions as Filters................................................................................................................................206
Redistributing Routes.............................................................................................................................................. 207
Enabling Additional Paths....................................................................................................................................... 208
Conguring IP Community Lists............................................................................................................................ 208
Conguring an IP Extended Community List....................................................................................................... 209
Filtering Routes with Community Lists..................................................................................................................210
Manipulating the COMMUNITY Attribute..............................................................................................................211
Changing MED Attributes....................................................................................................................................... 212
Changing the LOCAL_PREFERENCE Attribute...................................................................................................212
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............. 213
Changing the WEIGHT Attribute............................................................................................................................214
Enabling Multipath....................................................................................................................................................214
Filtering BGP Routes................................................................................................................................................214
Filtering BGP Routes Using Route Maps...............................................................................................................216
Filtering BGP Routes Using AS-PATH Information.............................................................................................. 216
Conguring BGP Route Reectors.........................................................................................................................217
Aggregating Routes..................................................................................................................................................218
Conguring BGP Confederations...........................................................................................................................218
Enabling Route Flap Dampening.............................................................................................................................219
Changing BGP Timers..............................................................................................................................................221
Enabling BGP Neighbor Soft-Reconguration......................................................................................................221
Enabling or disabling BGP neighbors.....................................................................................................................222
Route Map Continue............................................................................................................................................... 224
Enabling MBGP Congurations....................................................................................................................................224
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor......................................... 225
BGP Regular Expression Optimization........................................................................................................................225
Debugging BGP............................................................................................................................................................. 225
Storing Last and Bad PDUs....................................................................................................................................226
Capturing PDUs....................................................................................................................................................... 227
PDU Counters.......................................................................................................................................................... 228
Sample Congurations.................................................................................................................................................. 228
9 Content Addressable Memory (CAM)........................................................................................................ 237
CAM Allocation...............................................................................................................................................................237
Test CAM Usage............................................................................................................................................................239
View CAM-ACL Settings.............................................................................................................................................. 239
View CAM Usage...........................................................................................................................................................240
Conguring CAM Threshold and Silence Period........................................................................................................240
Setting CAM Threshold and Silence Period.......................................................................................................... 241
Return to the Default CAM Conguration..................................................................................................................242
CAM Optimization......................................................................................................................................................... 242
Applications for CAM Proling..................................................................................................................................... 242
8
Contents
LAG HashingLAG Hashing Based on Bidirectional Flow..................................................................................... 242
Unied Forwarding Table (UFT) Modes......................................................................................................................243
Conguring UFT Modes..........................................................................................................................................243
10 Control Plane Policing (CoPP)................................................................................................................. 245
CoPP Implementation................................................................................................................................................... 245
Protocol-based Control Plane Policing..................................................................................................................245
Queue-based Control Plane Policing.....................................................................................................................245
CoPP Example................................................................................................................................................................247
Congure Control Plane Policing................................................................................................................................. 248
Conguring CoPP for Protocols............................................................................................................................ 248
Examples of Conguring CoPP for Protocols...................................................................................................... 249
Conguring CoPP for CPU Queues...................................................................................................................... 250
Examples of Conguring CoPP for CPU Queues.................................................................................................251
Displaying CoPP Conguration.............................................................................................................................. 252
Troubleshooting CoPP Operation................................................................................................................................ 255
Enabling CPU Trac Statistics.............................................................................................................................. 255
Viewing CPU Trac Statistics............................................................................................................................... 255
Troubleshooting CPU Packet Loss........................................................................................................................ 256
Viewing Per-Protocol CoPP Counters.................................................................................................................. 257
Viewing Per-Queue CoPP Counters..................................................................................................................... 260
11 Data Center Bridging (DCB)...................................................................................................................... 261
Enabling Data Center Bridging......................................................................................................................................261
Ethernet Enhancements in Data Center Bridging..................................................................................................... 262
Priority-Based Flow Control................................................................................................................................... 263
Enhanced Transmission Selection..........................................................................................................................264
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................265
Data Center Bridging in a Trac Flow.................................................................................................................. 265
QoS dot1p Trac Classication and Queue Assignment..........................................................................................266
SNMP Support for PFC and Buer Statistics Tracking............................................................................................266
DCB Maps and its Attributes........................................................................................................................................267
DCB Map: Conguration Procedure......................................................................................................................267
Important Points to Remember............................................................................................................................. 268
Applying a DCB Map on a Port.............................................................................................................................. 268
Conguring PFC without a DCB Map...................................................................................................................269
Conguring Lossless Queues................................................................................................................................. 269
Applying a DCB Map on a Line Card...................................................................................................................... 271
Data Center Bridging: Default Conguration...............................................................................................................271
Conguration Notes: PFC and ETS in a DCB Map....................................................................................................272
PFC Conguration Notes........................................................................................................................................272
ETS Conguration Notes........................................................................................................................................ 273
ETS Prerequisites and Restrictions........................................................................................................................273
Priority-Group Conguration Notes.......................................................................................................................274
Conguring Priority-Based Flow Control.................................................................................................................... 274
Conguring Lossless Queues..................................................................................................................................275
Contents
9
Conguring Enhanced Transmission Selection...........................................................................................................275
Creating an ETS Priority Group..............................................................................................................................276
ETS Operation with DCBx.......................................................................................................................................277
Congure a DCBx Operation........................................................................................................................................ 277
DCBx Operation........................................................................................................................................................277
DCBx Port Roles...................................................................................................................................................... 278
DCB Conguration Exchange.................................................................................................................................279
Conguration Source Election................................................................................................................................279
Propagation of DCB Information........................................................................................................................... 280
Auto-Detection and Manual Conguration of the DCBx Version...................................................................... 280
Behavior of Tagged Packets....................................................................................................................................281
Conguration Example for DSCP and PFC Priorities...........................................................................................281
DCBx Example..........................................................................................................................................................282
DCBx Prerequisites and Restrictions.....................................................................................................................283
Conguring DCBx....................................................................................................................................................283
Verifying the DCB Conguration................................................................................................................................. 286
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................296
PFC and ETS Conguration Examples........................................................................................................................296
Using PFC and ETS to Manage Data Center Trac................................................................................................. 297
PFC and ETS Conguration Command Examples...............................................................................................298
Using PFC and ETS to Manage Converged Ethernet Trac.............................................................................298
Hierarchical Scheduling in ETS Output Policies................................................................................................... 299
Priority-Based Flow Control Using Dynamic Buer Method................................................................................... 299
Pause and Resume of Trac..................................................................................................................................299
Buer Sizes for Lossless or PFC Packets............................................................................................................ 300
Conguring the Dynamic Buer Method................................................................................................................... 300
12 Debugging and Diagnostics...................................................................................................................... 302
Oine Diagnostics.........................................................................................................................................................302
Running Port Extender Oine Diagnostics on the Switch.................................................................................302
Running Oine Diagnostics on a Standalone Switch......................................................................................... 309
TRACE Logs................................................................................................................................................................... 329
Auto Save on Reload, Crash, or Rollover..............................................................................................................330
Uploading Trace Logs.............................................................................................................................................. 330
Last Restart Reason......................................................................................................................................................330
show hardware Commands...........................................................................................................................................331
Environmental Monitoring.............................................................................................................................................333
Displaying Port Extender Environment Information ........................................................................................... 333
Display Power Supply Status..................................................................................................................................333
Display Fan Status................................................................................................................................................... 334
Display Transceiver Type......................................................................................................................................... 334
Recognize an Over-Temperature Condition..........................................................................................................336
Troubleshoot an Over-Temperature Condition......................................................................................................337
Troubleshooting Packet Loss........................................................................................................................................339
Displaying Drop Counters........................................................................................................................................339
Displaying Dataplane Statistics.............................................................................................................................. 340
10
Contents
Displaying Line-Card Counters...............................................................................................................................342
Accessing Application Core Dumps.............................................................................................................................342
Mini Core Dumps........................................................................................................................................................... 343
Full Kernel Core Dumps.................................................................................................................................................344
Enabling TCP Dumps.....................................................................................................................................................344
Accessing Port Extender Core and Mini Core Dumps.............................................................................................. 345
13 Dynamic Host Conguration Protocol (DHCP).........................................................................................346
DHCP Packet Format and Options............................................................................................................................. 346
Assign an IP Address using DHCP...............................................................................................................................348
Implementation Information..........................................................................................................................................349
Congure the System to be a DHCP Server..............................................................................................................349
Conguring the Server for Automatic Address Allocation..................................................................................350
Specifying a Default Gateway.................................................................................................................................351
Congure a Method of Hostname Resolution...................................................................................................... 351
Using DNS for Address Resolution.........................................................................................................................351
Using NetBIOS WINS for Address Resolution..................................................................................................... 352
Creating Manual Binding Entries............................................................................................................................352
Debugging the DHCP Server.................................................................................................................................352
Using DHCP Clear Commands.............................................................................................................................. 353
Congure the System to be a Relay Agent................................................................................................................ 353
Congure the System to be a DHCP Client...............................................................................................................355
DHCP Client on a Management Interface............................................................................................................355
DHCP Client Operation with Other Features.......................................................................................................355
Congure Secure DHCP...............................................................................................................................................356
Option 82..................................................................................................................................................................356
DHCP Snooping....................................................................................................................................................... 357
Drop DHCP Packets on Snooped VLANs Only....................................................................................................359
Dynamic ARP Inspection........................................................................................................................................ 360
Conguring Dynamic ARP Inspection....................................................................................................................361
Source Address Validation............................................................................................................................................ 362
Enabling IP Source Address Validation..................................................................................................................362
DHCP MAC Source Address Validation................................................................................................................ 363
Enabling IP+MAC Source Address Validation.......................................................................................................363
Viewing the Number of SAV Dropped Packets....................................................................................................364
Clearing the Number of SAV Dropped Packets...................................................................................................364
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 365
ECMP for Flow-Based Anity.....................................................................................................................................365
Enabling Deterministic ECMP Next Hop.............................................................................................................. 365
Conguring the Hash Algorithm Seed.................................................................................................................. 365
Link Bundle Monitoring........................................................................................................................................... 366
Managing ECMP Group Paths.....................................................................................................................................366
Creating an ECMP Group Bundle................................................................................................................................ 367
Modifying the ECMP Group Threshold.......................................................................................................................367
BGP Multipath Operation with Link Bankwidth.........................................................................................................368
Contents
11
Dynamic Re-calculation of Link Bankwidth................................................................................................................ 369
Weighted ECMP for Static Routes..............................................................................................................................370
ECMP Support in L3 Host and LPM Tables............................................................................................................... 370
15 FCoE Transit............................................................................................................................................. 371
Fibre Channel over Ethernet......................................................................................................................................... 371
Ensure Robustness in a Converged Ethernet Network.............................................................................................371
FIP Snooping on Ethernet Bridges.............................................................................................................................. 373
FIP Snooping in a Switch Stack................................................................................................................................... 375
Using FIP Snooping....................................................................................................................................................... 375
FIP Snooping Prerequisites.....................................................................................................................................375
Important Points to Remember..............................................................................................................................375
Enabling the FCoE Transit Feature........................................................................................................................ 376
Enable FIP Snooping on VLANs............................................................................................................................. 376
Congure the FC-MAP Value.................................................................................................................................376
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 377
Congure a Port for a Bridge-to-FCF Link........................................................................................................... 377
Impact on Other Software Features......................................................................................................................377
FIP Snooping Restrictions.......................................................................................................................................377
Conguring FIP Snooping............................................................................................................................................. 378
Displaying FIP Snooping Information........................................................................................................................... 379
FCoE Transit Conguration Example...........................................................................................................................384
16 FIPS Cryptography...................................................................................................................................386
Conguration Tasks....................................................................................................................................................... 386
Preparing the System....................................................................................................................................................386
Enabling FIPS Mode...................................................................................................................................................... 387
Generating Host-Keys................................................................................................................................................... 387
Monitoring FIPS Mode Status......................................................................................................................................387
Disabling FIPS Mode..................................................................................................................................................... 388
17 Flex Hash and Optimized Boot-Up............................................................................................................389
Flex Hash Capability Overview.................................................................................................................................... 389
Conguring the Flex Hash Mechanism.......................................................................................................................389
LACP Fast Switchover..................................................................................................................................................390
Conguring LACP Fast Switchover............................................................................................................................ 390
LACP............................................................................................................................................................................... 390
LACP Fast Switchover............................................................................................................................................390
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 390
Sample Congurations.................................................................................................................................................. 392
................................................................................................................................................................................... 392
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces......................................................................................395
18 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 396
Protocol Overview.........................................................................................................................................................396
Ring Status............................................................................................................................................................... 397
12
Contents
Multiple FRRP Rings................................................................................................................................................397
Important FRRP Points...........................................................................................................................................398
Implementing FRRP.................................................................................................................................................398
Important FRRP Concepts.....................................................................................................................................399
FRRP Conguration...................................................................................................................................................... 400
Creating the FRRP Group...................................................................................................................................... 400
Conguring the Control VLAN...............................................................................................................................400
Conguring and Adding the Member VLANs....................................................................................................... 401
Setting the FRRP Timers........................................................................................................................................402
Clearing the FRRP Counters..................................................................................................................................403
Viewing the FRRP Conguration...........................................................................................................................403
Viewing the FRRP Information...............................................................................................................................403
Troubleshooting FRRP.................................................................................................................................................. 403
Conguration Checks..............................................................................................................................................403
Sample Conguration and Topology............................................................................................................................404
FRRP Support on VLT.................................................................................................................................................. 405
Example Scenario.................................................................................................................................................... 406
Important Points to Remember..............................................................................................................................407
19 GARP VLAN Registration Protocol (GVRP)..............................................................................................408
Important Points to Remember................................................................................................................................... 408
Congure GVRP............................................................................................................................................................ 409
Related Conguration Tasks...................................................................................................................................409
Enabling GVRP Globally.................................................................................................................................................410
Enabling GVRP on a Layer 2 Interface.........................................................................................................................410
Congure GVRP Registration....................................................................................................................................... 410
Congure a GARP Timer................................................................................................................................................411
20 High Availability (HA)............................................................................................................................... 412
High Availability on Chassis........................................................................................................................................... 412
High Availability in a PE Stack.......................................................................................................................................412
Online Insertion and Removal........................................................................................................................................413
RPM Online Insertion............................................................................................................................................... 413
Line Card Online Insertion........................................................................................................................................413
Pre-conguring a Slot for a Line-Card Type..........................................................................................................413
Replacing a Line Card...............................................................................................................................................414
Hitless Behavior.............................................................................................................................................................. 414
Graceful Restart............................................................................................................................................................. 415
Software Resiliency........................................................................................................................................................415
System Health Monitoring.......................................................................................................................................415
Failure and Event Logging....................................................................................................................................... 415
Trace Log...................................................................................................................................................................415
Core Dumps.............................................................................................................................................................. 416
System Log................................................................................................................................................................416
Control Plane Redundancy............................................................................................................................................416
Control-Plane Failover............................................................................................................................................. 416
Contents
13
RPM Synchronization...............................................................................................................................................417
Forcing an RPM Failover..........................................................................................................................................417
Specifying an Auto-Failover Limit...........................................................................................................................418
Disabling Auto-Reboot............................................................................................................................................. 418
21 Internet Group Management Protocol (IGMP).......................................................................................... 419
IGMP Implementation Information............................................................................................................................... 419
IGMP Protocol Overview...............................................................................................................................................419
IGMP Version 2.........................................................................................................................................................419
IGMP Version 3.........................................................................................................................................................421
Congure IGMP............................................................................................................................................................. 424
Related Conguration Tasks................................................................................................................................... 424
Viewing IGMP Enabled Interfaces............................................................................................................................... 425
Selecting an IGMP Version........................................................................................................................................... 425
Viewing IGMP Groups...................................................................................................................................................425
Enabling IGMP Immediate-Leave.................................................................................................................................426
IGMP Snooping..............................................................................................................................................................426
IGMP Snooping Implementation Information....................................................................................................... 426
Conguring IGMP Snooping...................................................................................................................................426
Removing a Group-Port Association..................................................................................................................... 427
Disabling Multicast Flooding...................................................................................................................................428
Specifying a Port as Connected to a Multicast Router...................................................................................... 428
Conguring the Switch as Querier........................................................................................................................ 428
Fast Convergence after MSTP Topology Changes...................................................................................................429
Designating a Multicast Router Interface................................................................................................................... 429
22 Interfaces................................................................................................................................................ 430
Basic Interface Conguration.......................................................................................................................................430
Advanced Interface Conguration...............................................................................................................................430
Port Numbering.............................................................................................................................................................. 431
Interface Types...............................................................................................................................................................434
View Basic Interface Information.................................................................................................................................434
Resetting an Interface to its Factory Default State...................................................................................................440
Enabling a Physical Interface.........................................................................................................................................441
Physical Interfaces..........................................................................................................................................................441
Port Pipes..................................................................................................................................................................441
Setting the Speed of Ethernet Interfaces............................................................................................................. 441
Conguration Task List for Physical Interfaces.................................................................................................... 442
Overview of Layer Modes.......................................................................................................................................442
Conguring Layer 2 (Data Link) Mode..................................................................................................................443
Conguring Layer 2 (Interface) Mode...................................................................................................................443
Conguring Layer 3 (Network) Mode...................................................................................................................444
Conguring Layer 3 (Interface) Mode...................................................................................................................444
Egress Interface Selection (EIS)..................................................................................................................................445
Important Points to Remember............................................................................................................................. 445
Conguring EIS........................................................................................................................................................ 445
14
Contents
Management Interfaces................................................................................................................................................446
Conguring a Dedicated Management Interface ................................................................................................446
Conguring a Management Interface on an Ethernet Port................................................................................447
Port Extender Interfaces.............................................................................................................................................. 448
VLAN Interfaces.............................................................................................................................................................448
Loopback Interfaces...................................................................................................................................................... 449
Null Interfaces................................................................................................................................................................ 450
Port Channel Interfaces................................................................................................................................................450
Port Channel Denition and Standards.................................................................................................................450
Port Channel Benets.............................................................................................................................................450
Port Channel Implementation................................................................................................................................ 450
10/40 Gbps Interfaces in Port Channels................................................................................................................451
Conguration Tasks for Port Channel Interfaces..................................................................................................451
Creating a Port Channel.......................................................................................................................................... 451
Adding a Physical Interface to a Port Channel.....................................................................................................452
Reassigning an Interface to a New Port Channel................................................................................................454
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 454
Adding or Removing a Port Channel from a VLAN............................................................................................. 455
Assigning an IP Address to a Port Channel.......................................................................................................... 455
Deleting or Disabling a Port Channel.....................................................................................................................456
Load Balancing Through Port Channels............................................................................................................... 456
Changing the Hash Algorithm................................................................................................................................456
Bulk Conguration......................................................................................................................................................... 457
Interface Range........................................................................................................................................................457
Bulk Conguration Examples..................................................................................................................................457
Dening Interface Range Macros................................................................................................................................ 459
Dene the Interface Range.................................................................................................................................... 459
Choosing an Interface-Range Macro.................................................................................................................... 459
Monitoring and Maintaining Interfaces....................................................................................................................... 460
Maintenance Using TDR..........................................................................................................................................461
Displaying Trac Statistics on HiGig Ports................................................................................................................. 461
Link Bundle Monitoring................................................................................................................................................. 462
Monitoring HiGig Link Bundles.....................................................................................................................................462
Guidelines for Monitoring HiGig Link-Bundles .....................................................................................................463
Enabling HiGig Link-Bundle Monitoring.................................................................................................................464
Non Dell-Qualied Transceivers................................................................................................................................... 464
Splitting QSFP Ports to SFP+ Ports........................................................................................................................... 465
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................................465
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................467
Link Dampening..............................................................................................................................................................467
Important Points to Remember..............................................................................................................................467
Enabling Link Dampening........................................................................................................................................ 467
Using Ethernet Pause Frames for Flow Control........................................................................................................ 469
Threshold Settings...................................................................................................................................................470
Enabling Pause Frames........................................................................................................................................... 470
Contents
15
Congure the MTU Size on an Interface.....................................................................................................................471
Auto-Negotiation on Ethernet Interfaces....................................................................................................................471
Set Auto-Negotiation Options................................................................................................................................472
Provisioning Combo Ports............................................................................................................................................ 472
View Advanced Interface Information.........................................................................................................................473
Conguring the Interface Sampling Size...............................................................................................................474
Conguring the Trac Sampling Size Globally...........................................................................................................475
Dynamic Counters..........................................................................................................................................................476
Clearing Interface Counters....................................................................................................................................477
23 Internet Protocol Security (IPSec)...........................................................................................................478
Conguring IPSec .........................................................................................................................................................478
24 IPv4 Routing............................................................................................................................................ 480
IP Addresses...................................................................................................................................................................480
Implementation Information....................................................................................................................................480
Conguration Tasks for IP Addresses.......................................................................................................................... 481
Assigning IP Addresses to an Interface........................................................................................................................481
Conguring Static Routes.............................................................................................................................................482
Congure Static Routes for the Management Interface.......................................................................................... 483
Enabling Directed Broadcast........................................................................................................................................ 483
Resolution of Host Names............................................................................................................................................484
Enabling Dynamic Resolution of Host Names............................................................................................................484
Specifying the Local System Domain and a List of Domains................................................................................... 484
Conguring DNS with Traceroute............................................................................................................................... 485
ARP................................................................................................................................................................................. 486
Conguration Tasks for ARP.................................................................................................................................. 486
Conguring Static ARP Entries..............................................................................................................................486
Conguring ARP Inspection Trust..........................................................................................................................487
Conguring ARP Timeout....................................................................................................................................... 487
Enabling Proxy ARP.................................................................................................................................................488
Clearing ARP Cache................................................................................................................................................488
ARP Learning via Gratuitous ARP..........................................................................................................................488
Enabling ARP Learning via Gratuitous ARP..........................................................................................................489
ARP Learning via ARP Request............................................................................................................................. 489
Conguring ARP Retries.........................................................................................................................................490
ICMP............................................................................................................................................................................... 490
Conguration Tasks for ICMP................................................................................................................................490
Enabling ICMP Unreachable Messages................................................................................................................ 490
25 IPv6 Routing............................................................................................................................................492
Protocol Overview......................................................................................................................................................... 492
Extended Address Space........................................................................................................................................493
Stateless Autoconguration................................................................................................................................... 493
IPv6 Headers............................................................................................................................................................493
IPv6 Header Fields...................................................................................................................................................494
16
Contents
Extension Header Fields......................................................................................................................................... 496
IPv6 Addressing....................................................................................................................................................... 497
IPv6 Implementation on the Dell Networking OS......................................................................................................498
Conguring the LPM Table for IPv6 Extended Prexes...........................................................................................499
ICMPv6...........................................................................................................................................................................499
Path MTU Discovery.....................................................................................................................................................500
IPv6 Neighbor Discovery..............................................................................................................................................500
IPv6 Neighbor Discovery of MTU Packets........................................................................................................... 501
Conguring the IPv6 Recursive DNS Server........................................................................................................501
Secure Shell (SSH) Over an IPv6 Transport..............................................................................................................503
Conguration Tasks for IPv6........................................................................................................................................503
Adjusting Your CAM Prole.................................................................................................................................... 503
Assigning an IPv6 Address to an Interface...........................................................................................................504
Assigning a Static IPv6 Route................................................................................................................................505
Conguring Telnet with IPv6..................................................................................................................................505
SNMP over IPv6......................................................................................................................................................505
Displaying IPv6 Information....................................................................................................................................506
Displaying an IPv6 Conguration...........................................................................................................................506
Displaying IPv6 Routes............................................................................................................................................507
Displaying the Running Conguration for an Interface....................................................................................... 508
Clearing IPv6 Routes...............................................................................................................................................509
Disabling ND Entry Timeout...................................................................................................................................509
Conguring IPv6 RA Guard..........................................................................................................................................509
Conguring IPv6 RA Guard on an Interface...........................................................................................................511
Monitoring IPv6 RA Guard...................................................................................................................................... 512
26 Intermediate System to Intermediate System........................................................................................... 513
IS-IS Protocol Overview................................................................................................................................................ 513
IS-IS Addressing..............................................................................................................................................................513
Multi-Topology IS-IS....................................................................................................................................................... 514
Transition Mode........................................................................................................................................................ 514
Interface Support..................................................................................................................................................... 515
Adjacencies............................................................................................................................................................... 515
Graceful Restart............................................................................................................................................................. 515
Timers........................................................................................................................................................................ 515
Implementation Information.......................................................................................................................................... 515
Conguration Information..............................................................................................................................................516
Conguration Tasks for IS-IS...................................................................................................................................517
Conguring the Distance of a Route.....................................................................................................................524
Changing the IS-Type.............................................................................................................................................. 525
Redistributing IPv4 Routes..................................................................................................................................... 527
Redistributing IPv6 Routes.....................................................................................................................................528
Conguring Authentication Passwords.................................................................................................................529
Setting the Overload Bit......................................................................................................................................... 529
Debugging IS-IS.......................................................................................................................................................530
IS-IS Metric Styles..........................................................................................................................................................531
Contents
17
Congure Metric Values................................................................................................................................................ 531
Maximum Values in the Routing Table.................................................................................................................. 532
Change the IS-IS Metric Style in One Level Only................................................................................................532
Leaks from One Level to Another..........................................................................................................................533
Sample Congurations.................................................................................................................................................. 534
27 iSCSI Optimization................................................................................................................................... 537
iSCSI Optimization Overview....................................................................................................................................... 537
Default iSCSI Optimization Values...............................................................................................................................539
iSCSI Optimization Prerequisites................................................................................................................................. 540
Conguring iSCSI Optimization................................................................................................................................... 540
Displaying iSCSI Optimization Information................................................................................................................. 542
Enable and Disable iSCSI Optimization....................................................................................................................... 543
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.......................................................................544
Monitoring iSCSI Trac Flows.....................................................................................................................................544
Information Monitored in iSCSI Trac Flows.............................................................................................................544
Detection and Auto-Conguration for Dell EqualLogic Arrays.................................................................................545
Conguring Detection and Ports for Dell Compellent Arrays...................................................................................545
Application of Quality of Service to iSCSI Trac Flows........................................................................................... 546
28 Link Aggregation Control Protocol (LACP).............................................................................................. 547
Introduction to Dynamic LAGs and LACP...................................................................................................................547
Important Points to Remember..............................................................................................................................547
LACP Modes............................................................................................................................................................ 548
Conguring LACP Commands...............................................................................................................................548
LACP Conguration Tasks............................................................................................................................................549
Creating a LAG.........................................................................................................................................................549
Conguring the LAG Interfaces as Dynamic........................................................................................................549
Setting the LACP Long Timeout........................................................................................................................... 550
Monitoring and Debugging LACP..........................................................................................................................550
Shared LAG State Tracking...........................................................................................................................................551
Conguring Shared LAG State Tracking................................................................................................................551
Important Points about Shared LAG State Tracking...........................................................................................553
LACP Basic Conguration Example............................................................................................................................ 553
Congure a LAG on ALPHA................................................................................................................................... 553
29 Layer 2..................................................................................................................................................... 561
Manage the MAC Address Table..................................................................................................................................561
Clearing the MAC Address Table............................................................................................................................561
Setting the Aging Time for Dynamic Entries.........................................................................................................561
Conguring a Static MAC Address........................................................................................................................562
Displaying the MAC Address Table........................................................................................................................562
MAC Learning Limit.......................................................................................................................................................562
Setting the MAC Learning Limit............................................................................................................................ 563
mac learning-limit Dynamic.................................................................................................................................... 563
mac learning-limit mac-address-sticky................................................................................................................. 563
18
Contents
mac learning-limit station-move............................................................................................................................ 564
mac learning-limit no-station-move...................................................................................................................... 564
Learning Limit Violation Actions.............................................................................................................................564
Setting Station Move Violation Actions................................................................................................................ 564
Recovering from Learning Limit and Station Move Violations...........................................................................565
Disabling MAC Address Learning on the System................................................................................................ 565
NIC Teaming...................................................................................................................................................................566
Congure Redundant Pairs...........................................................................................................................................567
Important Points about Conguring Redundant Pairs........................................................................................569
Far-End Failure Detection............................................................................................................................................. 570
FEFD State Changes................................................................................................................................................571
Conguring FEFD.....................................................................................................................................................572
Enabling FEFD on an Interface...............................................................................................................................572
Debugging FEFD......................................................................................................................................................573
30 Link Layer Discovery Protocol (LLDP)..................................................................................................... 575
802.1AB (LLDP) Overview............................................................................................................................................575
Protocol Data Units................................................................................................................................................. 575
Optional TLVs................................................................................................................................................................. 576
Management TLVs...................................................................................................................................................576
TIA-1057 (LLDP-MED) Overview.................................................................................................................................578
TIA Organizationally Specic TLVs........................................................................................................................ 578
Congure LLDP..............................................................................................................................................................582
Related Conguration Tasks...................................................................................................................................582
Important Points to Remember............................................................................................................................. 582
LLDP Compatibility..................................................................................................................................................583
CONFIGURATION versus INTERFACE Congurations............................................................................................ 583
Enabling LLDP................................................................................................................................................................584
Disabling and Undoing LLDP.................................................................................................................................. 584
Enabling LLDP on Management Ports........................................................................................................................584
Disabling and Undoing LLDP on Management Ports.......................................................................................... 584
Advertising TLVs............................................................................................................................................................585
Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................586
Reserved Unrecognized LLDP TLVs..................................................................................................................... 586
Organizational Specic Unrecognized LLDP TLVs..............................................................................................586
Viewing Unrecognized LLDP TLVs........................................................................................................................ 587
Viewing the LLDP Conguration..................................................................................................................................587
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................587
Examples of Viewing Information Advertised by Neighbors.............................................................................. 588
Conguring LLDPDU Intervals.....................................................................................................................................589
Conguring LLDP Notication Interval.......................................................................................................................590
Conguring Transmit and Receive Mode................................................................................................................... 590
Conguring a Time to Live............................................................................................................................................ 591
Debugging LLDP............................................................................................................................................................592
Relevant Management Objects................................................................................................................................... 593
Contents
19
31 Multicast Source Discovery Protocol (MSDP)..........................................................................................598
Protocol Overview.........................................................................................................................................................598
Anycast RP.....................................................................................................................................................................599
Implementation Information......................................................................................................................................... 600
Congure Multicast Source Discovery Protocol........................................................................................................600
Related Conguration Tasks...................................................................................................................................600
Enable MSDP.................................................................................................................................................................604
Manage the Source-Active Cache..............................................................................................................................605
Viewing the Source-Active Cache........................................................................................................................ 605
Limiting the Source-Active Cache.........................................................................................................................605
Clearing the Source-Active Cache........................................................................................................................606
Enabling the Rejected Source-Active Cache.......................................................................................................606
Accept Source-Active Messages that Fail the RFP Check..................................................................................... 606
Specifying Source-Active Messages........................................................................................................................... 610
Limiting the Source-Active Messages from a Peer.................................................................................................... 611
Preventing MSDP from Caching a Local Source........................................................................................................ 611
Preventing MSDP from Caching a Remote Source...................................................................................................612
Preventing MSDP from Advertising a Local Source.................................................................................................. 612
Logging Changes in Peership States............................................................................................................................613
Terminating a Peership...................................................................................................................................................613
Clearing Peer Statistics..................................................................................................................................................614
Debugging MSDP...........................................................................................................................................................614
MSDP with Anycast RP................................................................................................................................................ 615
Conguring Anycast RP................................................................................................................................................ 616
Reducing Source-Active Message Flooding..........................................................................................................617
Specifying the RP Address Used in SA Messages............................................................................................... 617
MSDP Sample Congurations...................................................................................................................................... 619
32 Multiple Spanning Tree Protocol (MSTP).................................................................................................624
Protocol Overview......................................................................................................................................................... 624
Spanning Tree Variations.............................................................................................................................................. 625
Implementation Information....................................................................................................................................625
Congure Multiple Spanning Tree Protocol................................................................................................................625
Related Conguration Tasks...................................................................................................................................625
Enable Multiple Spanning Tree Globally...................................................................................................................... 626
Adding and Removing Interfaces.................................................................................................................................626
Creating Multiple Spanning Tree Instances................................................................................................................ 626
Inuencing MSTP Root Selection................................................................................................................................627
Interoperate with Non-Dell Bridges.............................................................................................................................628
Changing the Region Name or Revision..................................................................................................................... 628
Modifying Global Parameters....................................................................................................................................... 629
Modifying the Interface Parameters........................................................................................................................... 630
Conguring an EdgePort............................................................................................................................................... 631
Flush MAC Addresses after a Topology Change....................................................................................................... 632
MSTP Sample Congurations......................................................................................................................................632
20
Contents
/