PowerSwitch S6000

Dell PowerSwitch S6000 Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6000 Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S6000 System
9.14.1.5
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2019 - 05
Rev. A00
Contents
1 About this Guide...........................................................................................................................................37
Audience............................................................................................................................................................................37
Conventions...................................................................................................................................................................... 37
Related Documents..........................................................................................................................................................37
2 Conguration Fundamentals........................................................................................................................ 38
Accessing the Command Line........................................................................................................................................38
CLI Modes.........................................................................................................................................................................38
Navigating CLI Modes...............................................................................................................................................40
The do Command............................................................................................................................................................ 43
Undoing Commands........................................................................................................................................................ 43
Obtaining Help..................................................................................................................................................................44
Entering and Editing Commands....................................................................................................................................44
Command History............................................................................................................................................................45
Filtering show Command Outputs.................................................................................................................................45
Example of the grep Keyword.................................................................................................................................. 45
Multiple Users in Conguration Mode...........................................................................................................................46
Conguring alias command.............................................................................................................................................46
Viewing alias conguration........................................................................................................................................47
3 Getting Started............................................................................................................................................49
Console Access................................................................................................................................................................50
Serial Console.............................................................................................................................................................50
Default Conguration....................................................................................................................................................... 51
Conguring a Host Name................................................................................................................................................ 51
Accessing the System Remotely.................................................................................................................................... 51
Accessing the System Remotely.............................................................................................................................. 51
Congure the Management Port IP Address......................................................................................................... 52
Congure a Management Route..............................................................................................................................52
Conguring a Username and Password..................................................................................................................52
Conguring the Enable Password..................................................................................................................................53
Conguration File Management.....................................................................................................................................54
Copy Files to and from the System......................................................................................................................... 54
Mounting an NFS File System..................................................................................................................................55
Save the Running-Conguration..............................................................................................................................56
Congure the Overload Bit for a Startup Scenario................................................................................................57
Viewing Files............................................................................................................................................................... 57
Managing the File System.............................................................................................................................................. 58
View Command History.................................................................................................................................................. 58
Upgrading Dell EMC Networking OS............................................................................................................................ 60
Using HTTP for File Transfers........................................................................................................................................60
Verify Software Images Before Installation....................................................................................................................61
Contents
3
4 Management................................................................................................................................................63
Conguring Privilege Levels............................................................................................................................................63
Creating a Custom Privilege Level...........................................................................................................................64
Removing a Command from EXEC Mode.............................................................................................................. 64
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................64
Allowing Access to CONFIGURATION Mode Commands....................................................................................64
Allowing Access to Dierent Modes........................................................................................................................64
Applying a Privilege Level to a Username............................................................................................................... 66
Applying a Privilege Level to a Terminal Line.......................................................................................................... 66
Conguring Logging........................................................................................................................................................ 66
Audit and Security Logs............................................................................................................................................ 67
Conguring Logging Format ...................................................................................................................................69
Setting Up a Secure Connection to a Syslog Server.............................................................................................69
Log Messages in the Internal Buer..............................................................................................................................70
Conguration Task List for System Log Management.......................................................................................... 70
Disabling System Logging............................................................................................................................................... 70
Sending System Messages to a Syslog Server.............................................................................................................71
Conguring a UNIX System as a Syslog Server......................................................................................................71
Track Login Activity.......................................................................................................................................................... 71
Restrictions for Tracking Login Activity................................................................................................................... 71
Conguring Login Activity Tracking..........................................................................................................................71
Display Login Statistics..............................................................................................................................................72
Limit Concurrent Login Sessions....................................................................................................................................73
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................73
Conguring Concurrent Session Limit.....................................................................................................................74
Enabling the System to Clear Existing Sessions.....................................................................................................74
Enabling Secured CLI Mode........................................................................................................................................... 75
Changing System Logging Settings...............................................................................................................................75
Display the Logging Buer and the Logging Conguration........................................................................................ 76
Conguring a UNIX Logging Facility Level....................................................................................................................76
Synchronizing Log Messages......................................................................................................................................... 78
Enabling Timestamp on Syslog Messages.................................................................................................................... 78
File Transfer Services....................................................................................................................................................... 81
Conguration Task List for File Transfer Services...................................................................................................81
Enabling the FTP Server............................................................................................................................................81
Conguring FTP Server Parameters....................................................................................................................... 82
Conguring FTP Client Parameters.........................................................................................................................82
Terminal Lines...................................................................................................................................................................83
Denying and Permitting Access to a Terminal Line................................................................................................83
Conguring Login Authentication for Terminal Lines.............................................................................................84
Setting Timeout for EXEC Privilege Mode...................................................................................................................85
Using Telnet to get to Another Network Device..........................................................................................................85
Lock CONFIGURATION Mode....................................................................................................................................... 86
Viewing the Conguration Lock Status...................................................................................................................86
Recovering from a Forgotten Password on the S6000.............................................................................................. 87
4
Contents
Recovering from a Forgotten Enable Password...........................................................................................................87
Recovering from a Failed Start on the S6000............................................................................................................. 88
Restoring the Factory Default Settings.........................................................................................................................88
Important Points to Remember................................................................................................................................88
Restoring Factory Default Environment Variables................................................................................................. 89
Viewing the Reason for Last System Reboot.............................................................................................................. 90
Disabling Syslog Messages for SNMP Authentication Failure Events...................................................................... 90
5 802.1X.......................................................................................................................................................... 91
Port-Authentication Process.......................................................................................................................................... 93
EAP over RADIUS......................................................................................................................................................93
Conguring 802.1X...........................................................................................................................................................94
Related Conguration Tasks..................................................................................................................................... 94
Important Points to Remember......................................................................................................................................94
Enabling 802.1X................................................................................................................................................................ 95
Conguring dot1x Prole ................................................................................................................................................96
Conguring MAC addresses for a do1x Prole............................................................................................................. 97
Conguring the Static MAB and MAB Prole ............................................................................................................. 97
Conguring Critical VLAN ..............................................................................................................................................98
Conguring Request Identity Re-Transmissions...........................................................................................................99
Conguring a Quiet Period after a Failed Authentication..................................................................................... 99
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................100
Re-Authenticating a Port............................................................................................................................................... 101
Conguring Timeouts.....................................................................................................................................................102
Conguring Dynamic VLAN Assignment with Port Authentication......................................................................... 103
Guest and Authentication-Fail VLANs.........................................................................................................................104
Conguring a Guest VLAN......................................................................................................................................104
Conguring an Authentication-Fail VLAN............................................................................................................. 104
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 106
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 106
Guidelines for Conguring ACL VLAN Groups............................................................................................................107
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................107
Conguring ACL VLAN Groups.............................................................................................................................. 107
Conguring FP Blocks for VLAN Parameters.......................................................................................................108
Viewing CAM Usage...................................................................................................................................................... 109
Allocating FP Blocks for VLAN Processes................................................................................................................... 110
7 Access Control Lists (ACLs)........................................................................................................................112
IP Access Control Lists (ACLs)......................................................................................................................................113
CAM Usage................................................................................................................................................................114
Implementing ACLs on Dell EMC Networking OS.................................................................................................114
Important Points to Remember.....................................................................................................................................116
Conguration Task List for Route Maps.................................................................................................................116
Conguring Match Routes.......................................................................................................................................118
Conguring Set Conditions..................................................................................................................................... 120
Contents
5
Congure a Route Map for Route Redistribution..................................................................................................121
Congure a Route Map for Route Tagging............................................................................................................ 121
Continue Clause........................................................................................................................................................122
IP Fragment Handling.................................................................................................................................................... 122
IP Fragments ACL Examples...................................................................................................................................122
Layer 4 ACL Rules Examples...................................................................................................................................123
Congure a Standard IP ACL........................................................................................................................................ 123
Conguring a Standard IP ACL Filter..................................................................................................................... 124
Congure an Extended IP ACL.....................................................................................................................................125
Conguring Filters with a Sequence Number.......................................................................................................125
Conguring Filters Without a Sequence Number.................................................................................................128
Congure Layer 2 and Layer 3 ACLs............................................................................................................................129
Assign an IP ACL to an Interface..................................................................................................................................129
Applying an IP ACL.........................................................................................................................................................130
Counting ACL Hits....................................................................................................................................................130
Congure Ingress ACLs.................................................................................................................................................. 131
Congure Egress ACLs...................................................................................................................................................131
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 132
IP Prex Lists.................................................................................................................................................................. 133
Implementation Information.................................................................................................................................... 133
Conguration Task List for Prex Lists.................................................................................................................. 133
ACL Remarks...................................................................................................................................................................137
Conguring a Remark...............................................................................................................................................137
Deleting a Remark.................................................................................................................................................... 138
ACL Resequencing......................................................................................................................................................... 138
Resequencing an ACL or Prex List.......................................................................................................................139
Route Maps.....................................................................................................................................................................140
Implementation Information.................................................................................................................................... 140
Conguring UDF ACL.................................................................................................................................................... 140
Conguring IP Mirror Access Group............................................................................................................................ 143
Sample Conguration...............................................................................................................................................143
Example of viewing IP mirror–access–group applied to an Interface................................................................144
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 145
How BFD Works............................................................................................................................................................. 145
BFD Packet Format..................................................................................................................................................146
BFD Sessions............................................................................................................................................................ 147
BFD Three-Way Handshake.................................................................................................................................... 148
Session State Changes............................................................................................................................................150
Important Points to Remember....................................................................................................................................150
Congure BFD................................................................................................................................................................. 151
Congure BFD for Physical Ports........................................................................................................................... 151
Congure BFD for Static Routes............................................................................................................................153
Congure BFD for IPv6 Static Routes...................................................................................................................156
Congure BFD for OSPF.........................................................................................................................................159
Congure BFD for OSPFv3.....................................................................................................................................163
6
Contents
Congure BFD for IS-IS...........................................................................................................................................166
Congure BFD for BGP...........................................................................................................................................168
Congure BFD for VRRP.........................................................................................................................................176
Conguring Protocol Liveness................................................................................................................................ 178
9 Border Gateway Protocol (BGP)................................................................................................................ 179
BGP IP version 4 (BGPv4) Overview.......................................................................................................................... 179
BGP Autonomous Systems..................................................................................................................................... 179
AS4 Number Representation................................................................................................................................... 181
Four-Byte AS Numbers............................................................................................................................................183
BGP router ID............................................................................................................................................................183
Sessions and Peers...................................................................................................................................................183
Establish a Session................................................................................................................................................... 184
BGP Attributes for selecting Best Path.................................................................................................................184
Multiprotocol BGP....................................................................................................................................................189
BGP global and address family conguration........................................................................................................190
Implement BGP with Dell EMC Networking OS...................................................................................................192
Conguration Information....................................................................................................................................... 195
Basic BGP conguration tasks..................................................................................................................................... 195
Prerequisite for conguring a BGP network......................................................................................................... 195
Restrictions............................................................................................................................................................... 196
Enabling BGP............................................................................................................................................................ 196
Enabling four-byte autonomous system numbers................................................................................................198
Changing a BGP router ID.......................................................................................................................................199
Conguring AS4 Number Representations...........................................................................................................199
Conguring a BGP peer...........................................................................................................................................201
Example-Conguring BGP routing between peers............................................................................................. 202
BGP peer group....................................................................................................................................................... 203
Advanced BGP conguration tasks.............................................................................................................................209
Route-refresh and Soft-reconguration................................................................................................................210
Aggregating Routes..................................................................................................................................................212
Filtering BGP.............................................................................................................................................................214
Conguring BGP Fast Fall-Over............................................................................................................................. 221
Conguring Passive Peering...................................................................................................................................222
Enabling Graceful Restart.......................................................................................................................................223
Redistributing Routes..............................................................................................................................................224
Enabling Additional Paths....................................................................................................................................... 225
Conguring IP Community Lists............................................................................................................................ 226
Conguring an IP Extended Community List........................................................................................................227
Congure BGP attributes....................................................................................................................................... 228
Enabling Multipath...................................................................................................................................................232
Route Reectors......................................................................................................................................................233
Enabling Route Flap Dampening............................................................................................................................ 234
Changing BGP keepalive and hold timers.............................................................................................................236
Setting the extended timer.....................................................................................................................................237
Enabling or disabling BGP neighbors.....................................................................................................................238
Contents
7
Route Map Continue............................................................................................................................................... 239
Conguring BGP Confederations.......................................................................................................................... 239
Conguring a BGP VRF address family................................................................................................................ 240
Maintaining Existing AS Numbers During an AS Migration................................................................................. 241
Allowing an AS Number to Appear in its Own AS Path.......................................................................................242
Enabling MBGP Congurations..............................................................................................................................243
MBGP support for IPv6.......................................................................................................................................... 243
Conguring IPv6 MBGP between peers...............................................................................................................244
Example-Conguring IPv4 and IPv6 neighbors................................................................................................... 245
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor..........................................247
BGP Regular Expression Optimization..................................................................................................................249
Debugging BGP........................................................................................................................................................249
10 Content Addressable Memory (CAM).......................................................................................................252
CAM Allocation...............................................................................................................................................................252
Test CAM Usage............................................................................................................................................................254
View CAM Proles.........................................................................................................................................................254
View CAM-ACL Settings.............................................................................................................................................. 255
View CAM Usage...........................................................................................................................................................256
Conguring CAM Threshold and Silence Period........................................................................................................257
Setting CAM Threshold and Silence Period..........................................................................................................257
CAM Optimization......................................................................................................................................................... 258
Troubleshoot CAM Proling..........................................................................................................................................258
QoS CAM Region Limitation...................................................................................................................................258
Syslog Error When the Table is Full....................................................................................................................... 259
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................259
Syslog Warning for Discrepancies Between Congured Extended Prexes....................................................259
Unied Forwarding Table (UFT) Modes..................................................................................................................... 259
Conguring UFT Modes......................................................................................................................................... 259
11 Control Plane Policing (CoPP)...................................................................................................................261
Congure Control Plane Policing................................................................................................................................. 262
Conguring CoPP for Protocols............................................................................................................................ 263
Conguring CoPP for CPU Queues...................................................................................................................... 265
Protocol to CPU Queue Mapping..........................................................................................................................266
Conguring Protocol to CPU Queue Mapping.....................................................................................................266
Displaying CoPP Conguration ............................................................................................................................. 267
12 Data Center Bridging (DCB).....................................................................................................................269
Ethernet Enhancements in Data Center Bridging..................................................................................................... 269
Priority-Based Flow Control................................................................................................................................... 270
Enhanced Transmission Selection...........................................................................................................................271
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................272
Data Center Bridging in a Trac Flow...................................................................................................................273
Enabling Data Center Bridging..................................................................................................................................... 273
DCB Maps and its Attributes.................................................................................................................................. 274
8
Contents
Data Center Bridging: Default Conguration..............................................................................................................275
Conguring Priority-Based Flow Control.................................................................................................................... 275
Conguring Lossless Queues........................................................................................................................................276
Conguring PFC in a DCB Map....................................................................................................................................278
PFC Conguration Notes........................................................................................................................................278
PFC Prerequisites and Restrictions....................................................................................................................... 279
Conguring PFC without a DCB Map.........................................................................................................................279
Conguring Lossless QueuesExample:..................................................................................................................279
Priority-Based Flow Control Using Dynamic Buer Method.............................................................................. 281
Behavior of Tagged Packets.........................................................................................................................................282
Conguration Example for DSCP and PFC Priorities................................................................................................282
SNMP Support for PFC and Buer Statistics Tracking............................................................................................283
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................284
PFC and ETS Conguration Examples........................................................................................................................285
Using PFC to Manage Converged Ethernet Trac.................................................................................................. 285
Operations on Untagged Packets................................................................................................................................285
Generation of PFC for a Priority for Untagged Packets...........................................................................................286
Congure Enhanced Transmission Selection..............................................................................................................286
ETS Prerequisites and Restrictions....................................................................................................................... 286
Creating an ETS Priority Group..............................................................................................................................286
ETS Operation with DCBx...................................................................................................................................... 287
Conguring Bandwidth Allocation for DCBx CIN.................................................................................................288
Conguring ETS in a DCB Map..............................................................................................................................289
Hierarchical Scheduling in ETS Output Policies.........................................................................................................290
Using ETS to Manage Converged Ethernet Trac...................................................................................................290
Applying DCB Policies in a Switch Stack.....................................................................................................................291
Congure a DCBx Operation.........................................................................................................................................291
DCBx Operation........................................................................................................................................................291
DCBx Port Roles.......................................................................................................................................................291
DCB Conguration Exchange................................................................................................................................ 293
Conguration Source Election................................................................................................................................293
Propagation of DCB Information............................................................................................................................294
Auto-Detection and Manual Conguration of the DCBx Version...................................................................... 294
DCBx Example......................................................................................................................................................... 294
DCBx Prerequisites and Restrictions.....................................................................................................................295
Conguring DCBx....................................................................................................................................................295
Verifying the DCB Conguration................................................................................................................................. 299
QoS dot1p Trac Classication and Queue Assignment.......................................................................................... 307
Conguring the Dynamic Buer Method................................................................................................................... 308
Sample DCB Conguration...........................................................................................................................................309
PFC and ETS Conguration Command Examples................................................................................................ 311
13 Dynamic Host Conguration Protocol (DHCP)..........................................................................................312
DHCP Packet Format and Options.............................................................................................................................. 312
Assign an IP Address using DHCP................................................................................................................................314
Implementation Information.......................................................................................................................................... 315
Contents
9
Congure the System to be a DHCP Server.............................................................................................................. 315
Conguring the Server for Automatic Address Allocation...................................................................................316
Specifying a Default Gateway................................................................................................................................. 317
Congure a Method of Hostname Resolution...................................................................................................... 318
Using DNS for Address Resolution.........................................................................................................................318
Using NetBIOS WINS for Address Resolution...................................................................................................... 318
Creating Manual Binding Entries............................................................................................................................ 318
Debugging the DHCP Server..................................................................................................................................319
Using DHCP Clear Commands............................................................................................................................... 319
Congure the System to be a DHCP Client................................................................................................................319
Conguring the DHCP Client System...................................................................................................................320
DHCP Client on a Management Interface.............................................................................................................321
DHCP Client Operation with Other Features.......................................................................................................322
DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................ 323
Conguring Route Leaking between VRFs on DHCP Relay Agent................................................................... 323
Non-default VRF conguration for DHCPv6 helper address................................................................................... 324
Conguring DHCP relay source interface................................................................................................................... 324
Global DHCP relay source IPv4 or IPv6 conguration ....................................................................................... 324
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................325
Congure the System for User Port Stacking (Option 230)....................................................................................326
Congure Secure DHCP............................................................................................................................................... 326
Option 82.................................................................................................................................................................. 327
DHCPv6 relay agent options.................................................................................................................................. 328
DHCP Snooping.......................................................................................................................................................328
Conguring the DHCP secondary-subnet............................................................................................................332
Drop DHCP Packets on Snooped VLANs Only....................................................................................................333
Dynamic ARP Inspection.........................................................................................................................................333
Conguring Dynamic ARP Inspection................................................................................................................... 334
Source Address Validation............................................................................................................................................ 335
Enabling IP Source Address Validation..................................................................................................................335
DHCP MAC Source Address Validation................................................................................................................ 336
Enabling IP+MAC Source Address Validation.......................................................................................................336
Viewing the Number of SAV Dropped Packets....................................................................................................337
Clearing the Number of SAV Dropped Packets................................................................................................... 337
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 338
ECMP for Flow-Based Anity.....................................................................................................................................338
Conguring the Hash Algorithm............................................................................................................................ 338
Enabling Deterministic ECMP Next Hop.............................................................................................................. 338
Conguring the Hash Algorithm Seed.................................................................................................................. 339
Link Bundle Monitoring................................................................................................................................................. 339
Managing ECMP Group Paths...............................................................................................................................340
Creating an ECMP Group Bundle..........................................................................................................................340
Modifying the ECMP Group Threshold.................................................................................................................340
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table.......................................341
Support for ECMP in host table............................................................................................................................ 342
10
Contents
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 342
RTAG7............................................................................................................................................................................. 342
Flow-based Hashing for ECMP....................................................................................................................................343
15 FIP Snooping............................................................................................................................................346
Fibre Channel over Ethernet........................................................................................................................................ 346
Ensure Robustness in a Converged Ethernet Network............................................................................................346
FIP Snooping on Ethernet Bridges.............................................................................................................................. 348
FIP Snooping in a Switch Stack...................................................................................................................................350
Using FIP Snooping....................................................................................................................................................... 350
FIP Snooping Prerequisites.....................................................................................................................................350
Important Points to Remember............................................................................................................................. 350
Enabling the FCoE Transit Feature.........................................................................................................................351
Enable FIP Snooping on VLANs.............................................................................................................................352
Congure the FC-MAP Value................................................................................................................................ 352
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................352
Congure a Port for a Bridge-to-FCF Link...........................................................................................................352
Impact on Other Software Features..................................................................................................................... 352
FIP Snooping Restrictions...................................................................................................................................... 353
Conguring FIP Snooping.......................................................................................................................................353
Displaying FIP Snooping Information...........................................................................................................................354
FCoE Transit Conguration Example.......................................................................................................................... 359
16 Flex Hash and Optimized Boot-Up............................................................................................................ 361
Flex Hash Capability Overview..................................................................................................................................... 361
Conguring the Flex Hash Mechanism........................................................................................................................361
Conguring Fast Boot and LACP Fast Switchover...................................................................................................362
Optimizing the Boot Time.............................................................................................................................................362
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................362
Guidelines for Conguring Optimized Booting Mechanism................................................................................363
Interoperation of Applications with Fast Boot and System States..........................................................................364
LACP and IPv4 Routing.......................................................................................................................................... 364
LACP and IPv6 Routing.......................................................................................................................................... 364
BGP Graceful Restart............................................................................................................................................. 365
Cold Boot Caused by Power Cycling the System............................................................................................... 365
Unexpected Reload of the System........................................................................................................................365
Software Upgrade................................................................................................................................................... 365
LACP Fast Switchover............................................................................................................................................365
Changes to BGP Multipath.................................................................................................................................... 366
Delayed Installation of ECMP Routes Into BGP...................................................................................................366
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 366
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 367
17 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 368
Protocol Overview.........................................................................................................................................................368
Ring Status............................................................................................................................................................... 369
Contents
11
Multiple FRRP Rings............................................................................................................................................... 369
Important FRRP Points........................................................................................................................................... 370
Important FRRP Concepts...................................................................................................................................... 371
Implementing FRRP.......................................................................................................................................................372
FRRP Conguration.......................................................................................................................................................372
Creating the FRRP Group.......................................................................................................................................372
Conguring the Control VLAN............................................................................................................................... 372
Conguring and Adding the Member VLANs....................................................................................................... 374
Setting the FRRP Timers........................................................................................................................................375
Clearing the FRRP Counters.................................................................................................................................. 375
Viewing the FRRP Conguration...........................................................................................................................375
Viewing the FRRP Information...............................................................................................................................375
Troubleshooting FRRP...................................................................................................................................................376
Conguration Checks..............................................................................................................................................376
Sample Conguration and Topology............................................................................................................................ 376
FRRP Support on VLT................................................................................................................................................... 377
Example Scenario.....................................................................................................................................................378
Important Points to Remember..............................................................................................................................379
18 GARP VLAN Registration Protocol (GVRP)..............................................................................................380
Important Points to Remember................................................................................................................................... 380
Congure GVRP............................................................................................................................................................. 381
Related Conguration Tasks....................................................................................................................................381
Enabling GVRP Globally................................................................................................................................................ 382
Enabling GVRP on a Layer 2 Interface........................................................................................................................382
Congure GVRP Registration.......................................................................................................................................382
Congure a GARP Timer.............................................................................................................................................. 383
19 Internet Group Management Protocol (IGMP)......................................................................................... 384
IGMP Implementation Information...............................................................................................................................384
IGMP Protocol Overview..............................................................................................................................................384
IGMP Version 2........................................................................................................................................................ 384
IGMP Version 3........................................................................................................................................................ 386
Congure IGMP............................................................................................................................................................. 389
Related Conguration Tasks...................................................................................................................................389
Viewing IGMP Enabled Interfaces...............................................................................................................................390
Selecting an IGMP Version...........................................................................................................................................390
Viewing IGMP Groups....................................................................................................................................................391
Viewing IGMP Snooping Groups.................................................................................................................................. 391
Adjusting Timers............................................................................................................................................................. 391
Adjusting Query and Response Timers..................................................................................................................391
Enabling IGMP Immediate-Leave.................................................................................................................................392
IGMP Snooping..............................................................................................................................................................393
IGMP Snooping Implementation Information....................................................................................................... 393
Conguring IGMP Snooping...................................................................................................................................393
Removing a Group-Port Association.....................................................................................................................394
12
Contents
Disabling Multicast Flooding...................................................................................................................................394
Specifying a Port as Connected to a Multicast Router...................................................................................... 394
Conguring the Switch as Querier........................................................................................................................ 395
Fast Convergence after MSTP Topology Changes...................................................................................................395
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................395
Protocol Separation.................................................................................................................................................396
Enabling and Disabling Management Egress Interface Selection...................................................................... 397
Handling of Management Route Conguration................................................................................................... 398
Handling of Switch-Initiated Trac....................................................................................................................... 398
Handling of Switch-Destined Trac......................................................................................................................399
Handling of Transit Trac (Trac Separation).................................................................................................... 400
Mapping of Management Applications and Trac Type.....................................................................................400
Behavior of Various Applications for Switch-Initiated Trac .............................................................................401
Behavior of Various Applications for Switch-Destined Trac ...........................................................................402
Interworking of EIS With Various Applications.....................................................................................................402
Designating a Multicast Router Interface...................................................................................................................403
20 Interfaces................................................................................................................................................ 404
Basic Interface Conguration.......................................................................................................................................404
Advanced Interface Conguration...............................................................................................................................404
Interface Types...............................................................................................................................................................405
View Basic Interface Information.................................................................................................................................405
Resetting an Interface to its Factory Default State...................................................................................................407
Enabling a Physical Interface........................................................................................................................................408
Physical Interfaces.........................................................................................................................................................408
Conguration Task List for Physical Interfaces....................................................................................................408
40G to 1G Breakout Cable Adaptor.......................................................................................................................408
Overview of Layer Modes...................................................................................................................................... 409
Conguring Layer 2 (Data Link) Mode.................................................................................................................. 410
Conguring Layer 2 (Interface) Mode................................................................................................................... 410
Conguring Layer 3 (Network) Mode................................................................................................................... 410
Conguring Layer 3 (Interface) Mode.................................................................................................................... 411
Automatic recovery of an Err-disabled interface........................................................................................................412
Conguring an automatic recovery for an Err-disabled interface.......................................................................412
Egress Interface Selection (EIS)...................................................................................................................................413
Important Points to Remember.............................................................................................................................. 413
Conguring EIS.........................................................................................................................................................413
Management Interfaces.................................................................................................................................................414
Conguring Management Interfaces..................................................................................................................... 414
Conguring a Management Interface on an Ethernet Port................................................................................ 415
VLAN Interfaces............................................................................................................................................................. 416
Loopback Interfaces.......................................................................................................................................................417
Null Interfaces................................................................................................................................................................. 417
Port Channel Interfaces.................................................................................................................................................417
Port Channel Denition and Standards..................................................................................................................418
Port Channel Benets..............................................................................................................................................418
Contents
13
Port Channel Implementation................................................................................................................................. 418
Interfaces in Port Channels.....................................................................................................................................419
Conguration Tasks for Port Channel Interfaces..................................................................................................419
Creating a Port Channel.......................................................................................................................................... 419
Adding a Physical Interface to a Port Channel.....................................................................................................420
Reassigning an Interface to a New Port Channel.................................................................................................421
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 422
Adding or Removing a Port Channel from a VLAN............................................................................................. 422
Assigning an IP Address to a Port Channel.......................................................................................................... 423
Deleting or Disabling a Port Channel..................................................................................................................... 424
Load Balancing Through Port Channels................................................................................................................424
Changing the Hash Algorithm................................................................................................................................ 424
Bulk Conguration......................................................................................................................................................... 425
Interface Range........................................................................................................................................................425
Bulk Conguration Examples..................................................................................................................................426
Dening Interface Range Macros................................................................................................................................ 427
Dene the Interface Range.....................................................................................................................................427
Choosing an Interface-Range Macro.................................................................................................................... 427
Monitoring and Maintaining Interfaces........................................................................................................................428
Maintenance Using TDR......................................................................................................................................... 429
Non Dell-Qualied Transceivers................................................................................................................................... 429
Splitting 40G Ports without Reload.............................................................................................................................430
Splitting QSFP Ports to SFP+ Ports........................................................................................................................... 432
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................432
Important Points to Remember..............................................................................................................................433
Example Scenarios...................................................................................................................................................433
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................ 437
Link Dampening..............................................................................................................................................................437
Important Points to Remember............................................................................................................................. 438
Conguration Example of Link Dampening...........................................................................................................438
Enabling Link Dampening........................................................................................................................................440
Link Bundle Monitoring.................................................................................................................................................. 441
Using Ethernet Pause Frames for Flow Control........................................................................................................ 442
Enabling Pause Frames........................................................................................................................................... 442
Congure the MTU Size on an Interface....................................................................................................................443
Port-Pipes.......................................................................................................................................................................444
Auto-Negotiation on Ethernet Interfaces................................................................................................................... 444
Setting the Speed of Ethernet Interfaces............................................................................................................ 444
Set Auto-Negotiation Options............................................................................................................................... 445
View Advanced Interface Information.........................................................................................................................446
Conguring the Interface Sampling Size...............................................................................................................447
Conguring the Trac Sampling Size Globally...........................................................................................................448
Dynamic Counters......................................................................................................................................................... 449
Clearing Interface Counters....................................................................................................................................449
Compressing Conguration Files................................................................................................................................. 450
14
Contents
21 IPv4 Routing............................................................................................................................................ 453
IP Addresses...................................................................................................................................................................454
Implementation Information....................................................................................................................................454
Conguration Tasks for IP Addresses..........................................................................................................................454
Assigning IP Addresses to an Interface.......................................................................................................................454
Conguring Static Routes............................................................................................................................................ 455
Adding description for IPv4 and IPv6 static routes.............................................................................................456
Congure Static Routes for the Management Interface.......................................................................................... 457
Using the Congured Source IP Address in ICMP Messages..................................................................................457
Conguring the ICMP Source Interface................................................................................................................457
Conguring the Duration to Establish a TCP Connection........................................................................................ 458
Enabling Directed Broadcast........................................................................................................................................ 458
Resolution of Host Names............................................................................................................................................459
Enabling Dynamic Resolution of Host Names............................................................................................................459
Specifying the Local System Domain and a List of Domains................................................................................... 459
Conguring DNS with Traceroute............................................................................................................................... 460
ARP.................................................................................................................................................................................. 461
Conguration Tasks for ARP.........................................................................................................................................461
Conguring Static ARP Entries.....................................................................................................................................461
Enabling Proxy ARP.......................................................................................................................................................462
Clearing ARP Cache......................................................................................................................................................462
ARP Learning via Gratuitous ARP................................................................................................................................462
Enabling ARP Learning via Gratuitous ARP................................................................................................................462
ARP Learning via ARP Request................................................................................................................................... 463
Conguring ARP Retries...............................................................................................................................................463
ICMP............................................................................................................................................................................... 464
Conguration Tasks for ICMP...................................................................................................................................... 464
Enabling ICMP Unreachable Messages...................................................................................................................... 464
ICMP Redirects..............................................................................................................................................................464
UDP Helper.....................................................................................................................................................................466
Congure UDP Helper............................................................................................................................................ 466
Important Points to Remember............................................................................................................................. 466
Enabling UDP Helper.....................................................................................................................................................466
Conguring a Broadcast Address................................................................................................................................ 466
Congurations Using UDP Helper................................................................................................................................467
UDP Helper with Broadcast-All Addresses.................................................................................................................467
UDP Helper with Subnet Broadcast Addresses.........................................................................................................468
UDP Helper with Congured Broadcast Addresses..................................................................................................468
UDP Helper with No Congured Broadcast Addresses............................................................................................469
Troubleshooting UDP Helper........................................................................................................................................469
22 IPv6 Routing............................................................................................................................................ 470
Protocol Overview......................................................................................................................................................... 470
Extended Address Space.........................................................................................................................................471
Stateless Autoconguration.................................................................................................................................... 471
Contents
15
IPv6 Headers.............................................................................................................................................................471
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support....................................................................472
IPv6 Header Fields...................................................................................................................................................473
Extension Header Fields..........................................................................................................................................475
Addressing................................................................................................................................................................ 476
Implementing IPv6 with Dell EMC Networking OS................................................................................................... 477
ICMPv6........................................................................................................................................................................... 478
Path MTU discovery......................................................................................................................................................479
IPv6 Neighbor Discovery.............................................................................................................................................. 479
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................480
Conguring the IPv6 Recursive DNS Server....................................................................................................... 480
Debugging IPv6 RDNSS Information Sent to the Host ......................................................................................481
Displaying IPv6 RDNSS Information.......................................................................................................................481
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 482
Conguration Tasks for IPv6........................................................................................................................................ 482
Adjusting Your CAM-Prole....................................................................................................................................482
Assigning an IPv6 Address to an Interface........................................................................................................... 483
Assigning a Static IPv6 Route................................................................................................................................484
Conguring Telnet with IPv6..................................................................................................................................484
SNMP over IPv6......................................................................................................................................................485
Displaying IPv6 Information....................................................................................................................................485
Displaying an IPv6 Interface Information.............................................................................................................. 485
Showing IPv6 Routes..............................................................................................................................................486
Showing the Running-Conguration for an Interface......................................................................................... 487
Clearing IPv6 Routes...............................................................................................................................................488
Disabling ND Entry Timeout................................................................................................................................... 488
Conguring IPv6 RA Guard.......................................................................................................................................... 489
Conguring IPv6 RA Guard on an Interface.........................................................................................................490
Monitoring IPv6 RA Guard...................................................................................................................................... 491
23 iSCSI Optimization...................................................................................................................................492
iSCSI Optimization Overview....................................................................................................................................... 492
Monitoring iSCSI Trac Flows...............................................................................................................................494
Application of Quality of Service to iSCSI Trac Flows..................................................................................... 494
Information Monitored in iSCSI Trac Flows.......................................................................................................494
Detection and Auto-Conguration for Dell EqualLogic Arrays...........................................................................495
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................495
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................496
Enable and Disable iSCSI Optimization.................................................................................................................496
Default iSCSI Optimization Values............................................................................................................................... 497
iSCSI Optimization Prerequisites..................................................................................................................................497
Conguring iSCSI Optimization....................................................................................................................................497
Displaying iSCSI Optimization Information................................................................................................................. 499
24 Intermediate System to Intermediate System...........................................................................................501
IS-IS Protocol Overview................................................................................................................................................ 501
16
Contents
IS-IS Addressing............................................................................................................................................................. 501
Multi-Topology IS-IS...................................................................................................................................................... 502
Transition Mode....................................................................................................................................................... 502
Interface Support.................................................................................................................................................... 503
Adjacencies...............................................................................................................................................................503
Graceful Restart............................................................................................................................................................ 503
Timers....................................................................................................................................................................... 503
Implementation Information......................................................................................................................................... 503
Conguration Information.............................................................................................................................................504
Conguration Tasks for IS-IS................................................................................................................................. 505
Conguring the Distance of a Route......................................................................................................................512
Changing the IS-Type...............................................................................................................................................513
Redistributing IPv4 Routes......................................................................................................................................515
Redistributing IPv6 Routes......................................................................................................................................516
Conguring Authentication Passwords..................................................................................................................517
Setting the Overload Bit.......................................................................................................................................... 517
Debugging IS-IS........................................................................................................................................................518
IS-IS Metric Styles..........................................................................................................................................................519
Congure Metric Values................................................................................................................................................ 519
Maximum Values in the Routing Table................................................................................................................... 519
Change the IS-IS Metric Style in One Level Only.................................................................................................519
Leaks from One Level to Another...........................................................................................................................521
Sample Congurations.................................................................................................................................................. 522
25 In-Service Software Upgrade...................................................................................................................524
ISSU Introduction...........................................................................................................................................................524
Warmboot Limitations............................................................................................................................................. 524
Fastboot 2.0 (Zero Loss Upgrade).............................................................................................................................. 524
L2 ISSU........................................................................................................................................................................... 525
L3 ISSU........................................................................................................................................................................... 525
CoPP............................................................................................................................................................................... 526
Mirroring ow control packets..................................................................................................................................... 526
PFC..................................................................................................................................................................................526
QoS..................................................................................................................................................................................526
Tunnel Conguration..................................................................................................................................................... 526
26 Link Aggregation Control Protocol (LACP).............................................................................................. 528
Introduction to Dynamic LAGs and LACP.................................................................................................................. 528
Important Points to Remember............................................................................................................................. 528
LACP Modes............................................................................................................................................................ 529
Conguring LACP Commands...............................................................................................................................529
LACP Conguration Tasks............................................................................................................................................530
Creating a LAG.........................................................................................................................................................530
Conguring the LAG Interfaces as Dynamic........................................................................................................530
Setting the LACP Long Timeout............................................................................................................................ 531
Monitoring and Debugging LACP...........................................................................................................................531
Contents
17
Shared LAG State Tracking.......................................................................................................................................... 532
Conguring Shared LAG State Tracking...............................................................................................................532
Important Points about Shared LAG State Tracking........................................................................................... 534
LACP Basic Conguration Example............................................................................................................................ 534
Congure a LAG on ALPHA................................................................................................................................... 534
27 Layer 2.....................................................................................................................................................543
Manage the MAC Address Table................................................................................................................................. 543
Clearing the MAC Address Table........................................................................................................................... 543
Setting the Aging Time for Dynamic Entries........................................................................................................543
Conguring a Static MAC Address........................................................................................................................544
Displaying the MAC Address Table........................................................................................................................ 544
MAC Learning Limit.......................................................................................................................................................544
Setting the MAC Learning Limit............................................................................................................................ 545
mac learning-limit Dynamic.................................................................................................................................... 545
mac learning-limit mac-address-sticky................................................................................................................. 545
mac learning-limit station-move............................................................................................................................ 546
mac learning-limit no-station-move...................................................................................................................... 546
Learning Limit Violation Actions.............................................................................................................................546
Setting Station Move Violation Actions................................................................................................................ 547
Recovering from Learning Limit and Station Move Violations........................................................................... 547
Disabling MAC Address Learning on the System.................................................................................................548
Enabling port security............................................................................................................................................. 548
NIC Teaming................................................................................................................................................................... 548
Congure Redundant Pairs.......................................................................................................................................... 549
Important Points about Conguring Redundant Pairs.........................................................................................551
Far-End Failure Detection.............................................................................................................................................552
FEFD State Changes...............................................................................................................................................553
Conguring FEFD.................................................................................................................................................... 554
Enabling FEFD on an Interface.............................................................................................................................. 554
Debugging FEFD......................................................................................................................................................555
28 Link Layer Discovery Protocol (LLDP)..................................................................................................... 557
802.1AB (LLDP) Overview............................................................................................................................................557
Protocol Data Units................................................................................................................................................. 557
Optional TLVs.................................................................................................................................................................558
Management TLVs.................................................................................................................................................. 558
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 560
TIA Organizationally Specic TLVs........................................................................................................................560
Congure LLDP............................................................................................................................................................. 564
Related Conguration Tasks...................................................................................................................................564
Important Points to Remember............................................................................................................................. 564
LLDP Compatibility..................................................................................................................................................565
CONFIGURATION versus INTERFACE Congurations............................................................................................565
Enabling LLDP................................................................................................................................................................565
Disabling and Undoing LLDP..................................................................................................................................566
18
Contents
Enabling LLDP on Management Ports........................................................................................................................566
Disabling and Undoing LLDP on Management Ports..........................................................................................566
Advertising TLVs............................................................................................................................................................566
Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................568
Reserved Unrecognized LLDP TLVs..................................................................................................................... 568
Organizational Specic Unrecognized LLDP TLVs..............................................................................................568
Viewing Unrecognized LLDP TLVs........................................................................................................................568
Viewing the LLDP Conguration................................................................................................................................. 569
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................569
Examples of Viewing Information Advertised by Neighbors.............................................................................. 569
Conguring LLDPDU Intervals......................................................................................................................................571
Conguring LLDP Notication Interval....................................................................................................................... 572
Conguring Transmit and Receive Mode....................................................................................................................572
Conguring the Time to Live Value..............................................................................................................................573
Debugging LLDP............................................................................................................................................................ 573
Relevant Management Objects....................................................................................................................................575
29 Microsoft Network Load Balancing..........................................................................................................580
NLB Unicast Mode Scenario........................................................................................................................................580
NLB Multicast Mode Scenario.....................................................................................................................................580
Limitations of the NLB Feature.....................................................................................................................................581
Microsoft Clustering.......................................................................................................................................................581
Enable and Disable VLAN Flooding ............................................................................................................................. 581
Conguring a Switch for NLB ......................................................................................................................................581
Enabling a Switch for Multicast NLB.................................................................................................................... 582
30 Multicast Source Discovery Protocol (MSDP).........................................................................................583
Protocol Overview.........................................................................................................................................................583
Anycast RP.....................................................................................................................................................................584
Implementation Information......................................................................................................................................... 585
Congure Multicast Source Discovery Protocol........................................................................................................585
Related Conguration Tasks...................................................................................................................................585
Enable MSDP.................................................................................................................................................................589
Manage the Source-Active Cache..............................................................................................................................590
Viewing the Source-Active Cache........................................................................................................................ 590
Limiting the Source-Active Cache.........................................................................................................................590
Clearing the Source-Active Cache.........................................................................................................................591
Enabling the Rejected Source-Active Cache........................................................................................................591
Accept Source-Active Messages that Fail the RFP Check...................................................................................... 591
Specifying Source-Active Messages...........................................................................................................................594
Limiting the Source-Active Messages from a Peer...................................................................................................595
Preventing MSDP from Caching a Local Source.......................................................................................................595
Preventing MSDP from Caching a Remote Source.................................................................................................. 596
Preventing MSDP from Advertising a Local Source................................................................................................. 596
Logging Changes in Peership States...........................................................................................................................597
Terminating a Peership..................................................................................................................................................597
Contents
19
Clearing Peer Statistics.................................................................................................................................................598
Debugging MSDP..........................................................................................................................................................598
MSDP with Anycast RP................................................................................................................................................599
Conguring Anycast RP............................................................................................................................................... 600
Reducing Source-Active Message Flooding......................................................................................................... 601
Specifying the RP Address Used in SA Messages...............................................................................................601
MSDP Sample Congurations......................................................................................................................................603
31 Multiple Spanning Tree Protocol (MSTP)................................................................................................. 606
Protocol Overview.........................................................................................................................................................606
Spanning Tree Variations...............................................................................................................................................607
Implementation Information....................................................................................................................................607
Congure Multiple Spanning Tree Protocol................................................................................................................ 607
Related Conguration Tasks...................................................................................................................................608
Enable Multiple Spanning Tree Globally...................................................................................................................... 608
Adding and Removing Interfaces.................................................................................................................................608
Creating Multiple Spanning Tree Instances................................................................................................................ 609
Inuencing MSTP Root Selection................................................................................................................................ 610
Interoperate with Non-Dell Bridges..............................................................................................................................610
Changing the Region Name or Revision.......................................................................................................................611
Modifying Global Parameters.........................................................................................................................................611
Modifying the Interface Parameters............................................................................................................................ 612
Setting STP path cost as constant..............................................................................................................................613
Conguring an EdgePort............................................................................................................................................... 614
Flush MAC Addresses after a Topology Change........................................................................................................ 614
MSTP Sample Congurations.......................................................................................................................................615
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration........................................................................................615
Debugging and Verifying MSTP Congurations......................................................................................................... 618
32 Multicast Features................................................................................................................................... 620
Enabling IP Multicast.....................................................................................................................................................620
Implementation Information..........................................................................................................................................620
Multicast Policies............................................................................................................................................................621
IPv4 Multicast Policies.............................................................................................................................................621
Understanding Multicast Traceroute (mtrace)...........................................................................................................628
Important Points to Remember............................................................................................................................. 629
Printing Multicast Traceroute (mtrace) Paths........................................................................................................... 629
Supported Error Codes.................................................................................................................................................630
mtrace Scenarios............................................................................................................................................................631
33 Object Tracking........................................................................................................................................637
Object Tracking Overview.............................................................................................................................................637
Track Layer 2 Interfaces..........................................................................................................................................638
Track Layer 3 Interfaces..........................................................................................................................................638
Track IPv4 and IPv6 Routes................................................................................................................................... 639
20
Contents
/