Dell PowerSwitch S6100-ON Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6100-ON Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S6100–ON
System
9.14.2.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2019 - 04
Rev. A00
Contents
1 About this Guide...........................................................................................................................................37
Audience............................................................................................................................................................................37
Conventions...................................................................................................................................................................... 37
Related Documents..........................................................................................................................................................37
2 Conguration Fundamentals........................................................................................................................ 38
Accessing the Command Line........................................................................................................................................38
CLI Modes.........................................................................................................................................................................38
Navigating CLI Modes...............................................................................................................................................40
The do Command............................................................................................................................................................ 43
Undoing Commands........................................................................................................................................................ 43
Obtaining Help..................................................................................................................................................................44
Entering and Editing Commands....................................................................................................................................44
Command History............................................................................................................................................................45
Filtering show Command Outputs.................................................................................................................................45
Example of the grep Keyword.................................................................................................................................. 46
Multiple Users in Conguration Mode...........................................................................................................................46
Conguring alias command.............................................................................................................................................47
Viewing alias conguration........................................................................................................................................47
3 Getting Started............................................................................................................................................49
Console Access................................................................................................................................................................50
Serial Console.............................................................................................................................................................50
Micro USB-B Access..................................................................................................................................................51
Default Conguration...................................................................................................................................................... 52
Conguring a Host Name............................................................................................................................................... 52
Accessing the System Remotely....................................................................................................................................52
Accessing the System Remotely..............................................................................................................................52
Congure the Management Port IP Address......................................................................................................... 52
Congure a Management Route..............................................................................................................................53
Conguring a Username and Password..................................................................................................................53
Conguring the Enable Password..................................................................................................................................54
Conguration File Management.....................................................................................................................................54
Copy Files to and from the System......................................................................................................................... 54
Mounting an NFS File System..................................................................................................................................55
Save the Running-Conguration..............................................................................................................................57
Congure the Overload Bit for a Startup Scenario................................................................................................57
Viewing Files............................................................................................................................................................... 57
Managing the File System.............................................................................................................................................. 58
View Command History.................................................................................................................................................. 59
Upgrading Dell EMC Networking OS............................................................................................................................ 59
Using HTTP for File Transfers........................................................................................................................................ 59
Contents
3
Verify Software Images Before Installation...................................................................................................................60
4 Management................................................................................................................................................62
Conguring Privilege Levels............................................................................................................................................62
Creating a Custom Privilege Level...........................................................................................................................63
Removing a Command from EXEC Mode.............................................................................................................. 63
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................63
Allowing Access to CONFIGURATION Mode Commands....................................................................................63
Allowing Access to Dierent Modes........................................................................................................................63
Applying a Privilege Level to a Username...............................................................................................................65
Applying a Privilege Level to a Terminal Line.......................................................................................................... 65
Conguring Logging........................................................................................................................................................ 65
Audit and Security Logs............................................................................................................................................ 66
Conguring Logging Format ...................................................................................................................................67
Setting Up a Secure Connection to a Syslog Server.............................................................................................67
Log Messages in the Internal Buer..............................................................................................................................69
Conguration Task List for System Log Management..........................................................................................69
Disabling System Logging...............................................................................................................................................69
Sending System Messages to a Syslog Server............................................................................................................69
Conguring a UNIX System as a Syslog Server.....................................................................................................69
Track Login Activity..........................................................................................................................................................70
Restrictions for Tracking Login Activity...................................................................................................................70
Conguring Login Activity Tracking......................................................................................................................... 70
Display Login Statistics...............................................................................................................................................71
Limit Concurrent Login Sessions....................................................................................................................................72
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................72
Conguring Concurrent Session Limit.....................................................................................................................72
Enabling the System to Clear Existing Sessions.................................................................................................... 73
Enabling Secured CLI Mode............................................................................................................................................74
Changing System Logging Settings...............................................................................................................................74
Display the Logging Buer and the Logging Conguration........................................................................................ 75
Conguring a UNIX Logging Facility Level....................................................................................................................75
Synchronizing Log Messages......................................................................................................................................... 76
Enabling Timestamp on Syslog Messages.................................................................................................................... 77
File Transfer Services.......................................................................................................................................................77
Conguration Task List for File Transfer Services.................................................................................................. 77
Enabling the FTP Server........................................................................................................................................... 78
Conguring FTP Server Parameters........................................................................................................................78
Conguring FTP Client Parameters......................................................................................................................... 78
Terminal Lines................................................................................................................................................................... 79
Denying and Permitting Access to a Terminal Line................................................................................................79
Conguring Login Authentication for Terminal Lines.............................................................................................80
Setting Timeout for EXEC Privilege Mode....................................................................................................................81
Using Telnet to get to Another Network Device..........................................................................................................82
Lock CONFIGURATION Mode....................................................................................................................................... 82
Viewing the Conguration Lock Status...................................................................................................................82
4
Contents
LPC Bus Quality Degradation......................................................................................................................................... 83
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................83
Restoring the Factory Default Settings.........................................................................................................................84
Important Points to Remember................................................................................................................................84
Restoring Factory Default Environment Variables................................................................................................. 84
Reloading the system...................................................................................................................................................... 86
Viewing the Reason for Last System Reboot...............................................................................................................87
5 802.1X..........................................................................................................................................................88
Port-Authentication Process..........................................................................................................................................90
EAP over RADIUS......................................................................................................................................................90
Conguring 802.1X........................................................................................................................................................... 91
Related Conguration Tasks......................................................................................................................................91
Important Points to Remember...................................................................................................................................... 91
Enabling 802.1X................................................................................................................................................................ 92
Conguring dot1x Prole ................................................................................................................................................93
Conguring MAC addresses for a do1x Prole.............................................................................................................94
Conguring the Static MAB and MAB Prole .............................................................................................................94
Conguring Critical VLAN ..............................................................................................................................................95
Conguring Request Identity Re-Transmissions...........................................................................................................96
Conguring a Quiet Period after a Failed Authentication..................................................................................... 96
Conguring a Quiet Period after a Failed Authentication............................................................................................97
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 98
Re-Authenticating a Port................................................................................................................................................99
Conguring Dynamic VLAN Assignment with Port Authentication.......................................................................... 99
Guest and Authentication-Fail VLANs.........................................................................................................................100
Conguring a Guest VLAN...................................................................................................................................... 101
Conguring an Authentication-Fail VLAN..............................................................................................................101
Conguring Timeouts...............................................................................................................................................102
Multi-Host Authentication.............................................................................................................................................103
Conguring Multi-Host AuthenticationConguring Single-Host Authentication............................................. 104
Multi-Supplicant Authentication...................................................................................................................................106
Conguring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication.............................106
MAC Authentication Bypass......................................................................................................................................... 107
MAB in Single-host and Multi-Host Mode............................................................................................................ 107
MAB in Multi-Supplicant Authentication Mode....................................................................................................108
Conguring MAC Authentication Bypass..............................................................................................................108
Dynamic CoS with 802.1X............................................................................................................................................. 109
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)....................................111
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...................................................................111
Guidelines for Conguring ACL VLAN Groups............................................................................................................ 112
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters................................................112
Conguring ACL VLAN Groups............................................................................................................................... 112
Conguring FP Blocks for VLAN Parameters........................................................................................................113
Viewing CAM Usage....................................................................................................................................................... 114
Contents
5
Allocating FP Blocks for VLAN Processes................................................................................................................... 115
ACL Optimization to Increase Number of Supported IPv4 ACLs..............................................................................116
Restrictions for ACL Optimization.......................................................................................................................... 116
Optimizing ACL for More Number of IPv4 ACL Rules..........................................................................................116
7 Access Control Lists (ACLs)........................................................................................................................118
IP Access Control Lists (ACLs)......................................................................................................................................119
CAM Usage................................................................................................................................................................119
Implementing ACLs on Dell EMC Networking OS................................................................................................120
Congure ACL Range Proles................................................................................................................................ 122
Important Points to Remember.................................................................................................................................... 123
Conguration Task List for Route Maps................................................................................................................ 123
Conguring Match Routes...................................................................................................................................... 125
Conguring Set Conditions..................................................................................................................................... 126
Congure a Route Map for Route Redistribution................................................................................................. 127
Congure a Route Map for Route Tagging............................................................................................................128
Continue Clause........................................................................................................................................................128
IP Fragment Handling.................................................................................................................................................... 129
IP Fragments ACL Examples...................................................................................................................................129
Layer 4 ACL Rules Examples...................................................................................................................................129
Congure a Standard IP ACL........................................................................................................................................130
Conguring a Standard IP ACL Filter......................................................................................................................131
Congure an Extended IP ACL..................................................................................................................................... 132
Conguring Filters with a Sequence Number....................................................................................................... 132
Conguring Filters Without a Sequence Number................................................................................................ 135
Congure Layer 2 and Layer 3 ACLs............................................................................................................................135
Assign an IP ACL to an Interface..................................................................................................................................136
Applying an IP ACL.........................................................................................................................................................136
Counting ACL Hits....................................................................................................................................................137
Congure Ingress ACLs..................................................................................................................................................137
Congure Egress ACLs.................................................................................................................................................. 138
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 139
IP Prex Lists.................................................................................................................................................................. 139
Implementation Information.................................................................................................................................... 140
Conguration Task List for Prex Lists.................................................................................................................. 140
ACL Remarks.................................................................................................................................................................. 143
Conguring a Remark.............................................................................................................................................. 143
Deleting a Remark.................................................................................................................................................... 144
ACL Resequencing......................................................................................................................................................... 145
Resequencing an ACL or Prex List.......................................................................................................................145
Route Maps.....................................................................................................................................................................146
Implementation Information.................................................................................................................................... 146
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 148
How BFD Works............................................................................................................................................................. 148
BFD Packet Format..................................................................................................................................................149
6
Contents
BFD Sessions............................................................................................................................................................ 150
BFD Three-Way Handshake.....................................................................................................................................151
Session State Changes............................................................................................................................................153
Important Points to Remember.................................................................................................................................... 153
Congure BFD................................................................................................................................................................ 154
Congure BFD for Physical Ports...........................................................................................................................154
Congure BFD for Static Routes............................................................................................................................157
Congure BFD for IPv6 Static Routes................................................................................................................... 161
Congure BFD for OSPF.........................................................................................................................................163
Congure BFD for OSPFv3.....................................................................................................................................168
Congure BFD for IS-IS............................................................................................................................................171
Congure BFD for BGP........................................................................................................................................... 173
Congure BFD for VRRP..........................................................................................................................................181
Conguring Protocol Liveness................................................................................................................................ 183
9 Border Gateway Protocol (BGP)................................................................................................................ 184
BGP IP version 4 (BGPv4) Overview.......................................................................................................................... 184
BGP Autonomous Systems.....................................................................................................................................184
AS4 Number Representation.................................................................................................................................. 186
Four-Byte AS Numbers............................................................................................................................................188
BGP router ID............................................................................................................................................................188
Sessions and Peers.................................................................................................................................................. 188
Establish a Session...................................................................................................................................................189
BGP Attributes for selecting Best Path.................................................................................................................189
Multiprotocol BGP....................................................................................................................................................194
BGP global and address family conguration........................................................................................................195
Implement BGP with Dell EMC Networking OS................................................................................................... 197
Conguration Information.......................................................................................................................................200
Basic BGP conguration tasks.....................................................................................................................................200
Prerequisite for conguring a BGP network........................................................................................................ 200
Restrictions............................................................................................................................................................... 201
Enabling BGP............................................................................................................................................................ 201
Enabling four-byte autonomous system numbers............................................................................................... 203
Changing a BGP router ID...................................................................................................................................... 204
Conguring AS4 Number Representations.......................................................................................................... 204
Conguring a BGP peer..........................................................................................................................................206
Example-Conguring BGP routing between peers..............................................................................................207
BGP peer group....................................................................................................................................................... 208
Advanced BGP conguration tasks..............................................................................................................................214
Route-refresh and Soft-reconguration................................................................................................................215
Aggregating Routes..................................................................................................................................................217
Filtering BGP.............................................................................................................................................................219
Conguring BGP Fast Fall-Over............................................................................................................................ 226
Conguring Passive Peering...................................................................................................................................227
Enabling Graceful Restart.......................................................................................................................................228
Redistributing Routes..............................................................................................................................................229
Contents
7
Enabling Additional Paths....................................................................................................................................... 230
Conguring IP Community Lists............................................................................................................................. 231
Conguring an IP Extended Community List....................................................................................................... 232
Congure BGP attributes....................................................................................................................................... 233
Enabling Multipath................................................................................................................................................... 237
Route Reectors......................................................................................................................................................238
Enabling Route Flap Dampening............................................................................................................................ 239
Changing BGP keepalive and hold timers..............................................................................................................241
Setting the extended timer.....................................................................................................................................242
Enabling or disabling BGP neighbors.....................................................................................................................243
Route Map Continue............................................................................................................................................... 244
Conguring BGP Confederations.......................................................................................................................... 244
Conguring a BGP VRF address family................................................................................................................ 245
Maintaining Existing AS Numbers During an AS Migration................................................................................ 246
Allowing an AS Number to Appear in its Own AS Path.......................................................................................247
Enabling MBGP Congurations..............................................................................................................................248
MBGP support for IPv6..........................................................................................................................................248
Conguring IPv6 MBGP between peers.............................................................................................................. 249
Example-Conguring IPv4 and IPv6 neighbors................................................................................................... 249
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor......................................... 252
BGP Regular Expression Optimization..................................................................................................................253
Debugging BGP....................................................................................................................................................... 254
10 Content Addressable Memory (CAM)...................................................................................................... 256
CAM Allocation.............................................................................................................................................................. 256
Test CAM Usage............................................................................................................................................................258
View CAM-ACL Settings.............................................................................................................................................. 258
View CAM Usage...........................................................................................................................................................259
Conguring CAM Threshold and Silence Period........................................................................................................260
Setting CAM Threshold and Silence Period......................................................................................................... 260
CAM Optimization.......................................................................................................................................................... 261
Troubleshoot CAM Proling.......................................................................................................................................... 261
QoS CAM Region Limitation................................................................................................................................... 261
Syslog Error When the Table is Full........................................................................................................................ 261
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................262
Syslog Warning for Discrepancies Between Congured Extended Prexes....................................................262
Unied Forwarding Table (UFT) Modes......................................................................................................................262
Conguring UFT Modes..........................................................................................................................................262
IPv6 CAM ACL Region..................................................................................................................................................263
Important Points to Remember............................................................................................................................. 263
Convert the IPv6 ACL CAM to Double-Wide.......................................................................................................263
Sharing CAM space between IPv4 QoS and IPv6 ACLs.................................................................................... 264
11 Control Plane Policing (CoPP).................................................................................................................. 265
Congure Control Plane Policing................................................................................................................................. 266
Conguring CoPP for Protocols.............................................................................................................................267
8
Contents
Conguring CoPP for CPU Queues...................................................................................................................... 269
Protocol to CPU Queue Mapping.......................................................................................................................... 270
Conguring Protocol to CPU Queue Mapping.....................................................................................................270
Displaying CoPP Conguration .............................................................................................................................. 271
12 Data Center Bridging (DCB)..................................................................................................................... 273
Ethernet Enhancements in Data Center Bridging......................................................................................................273
Priority-Based Flow Control....................................................................................................................................274
Enhanced Transmission Selection..........................................................................................................................275
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................276
Data Center Bridging in a Trac Flow...................................................................................................................277
Enabling Data Center Bridging......................................................................................................................................277
DCB Maps and its Attributes..................................................................................................................................278
Data Center Bridging: Default Conguration..............................................................................................................278
Conguring Priority-Based Flow Control.................................................................................................................... 279
Conguring Lossless Queues................................................................................................................................. 280
Conguring PFC in a DCB Map....................................................................................................................................281
PFC Conguration Notes........................................................................................................................................ 281
PFC Prerequisites and Restrictions....................................................................................................................... 282
Applying a DCB Map on a Port.................................................................................................................................... 282
Conguring PFC without a DCB Map.........................................................................................................................283
Conguring PFC Asymmetric.......................................................................................................................................283
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................284
Pause and Resume of Trac..................................................................................................................................284
Buer Sizes for Lossless or PFC Packets.............................................................................................................284
Shared headroom for lossless or PFC packets.......................................................................................................... 285
Example Scenario.................................................................................................................................................... 285
Conguring Shared Head Room Buer.................................................................................................................287
Viewing Shared Head Room Usage.......................................................................................................................287
Monitoring Buer Statistics for Tracking Purposes.............................................................................................287
Behavior of Tagged Packets.........................................................................................................................................288
SNMP Support for PFC and Buer Statistics Tracking............................................................................................288
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................289
Conguration Example for DSCP and PFC Priorities................................................................................................290
Using PFC to Manage Converged Ethernet Trac.................................................................................................. 290
Generation of PFC for a Priority for Untagged Packets...........................................................................................290
Congure Enhanced Transmission Selection............................................................................................................. 290
Creating an ETS Priority Group.............................................................................................................................. 291
ETS Operation with DCBx......................................................................................................................................292
Conguring ETS in a DCB Map..............................................................................................................................292
Hierarchical Scheduling in ETS Output Policies......................................................................................................... 293
Using ETS to Manage Converged Ethernet Trac...................................................................................................294
Applying DCB Policies in a Switch Stack.................................................................................................................... 294
Congure a DCBx Operation........................................................................................................................................294
DCBx Operation.......................................................................................................................................................295
DCBx Port Roles......................................................................................................................................................295
Contents
9
DCB Conguration Exchange................................................................................................................................ 296
Conguration Source Election................................................................................................................................297
Propagation of DCB Information............................................................................................................................297
Auto-Detection and Manual Conguration of the DCBx Version.......................................................................297
DCBx Example......................................................................................................................................................... 298
DCBx Prerequisites and Restrictions.....................................................................................................................298
Conguring DCBx....................................................................................................................................................299
Verifying the DCB Conguration................................................................................................................................. 302
QoS dot1p Trac Classication and Queue Assignment..........................................................................................309
Conguring the Dynamic Buer Method.................................................................................................................... 310
Sample DCB Conguration............................................................................................................................................ 311
PFC and ETS Conguration Command Examples............................................................................................... 313
13 Dynamic Host Conguration Protocol (DHCP)..........................................................................................314
DHCP Packet Format and Options.............................................................................................................................. 314
Assign an IP Address using DHCP................................................................................................................................316
Implementation Information...........................................................................................................................................317
Congure the System to be a DHCP Server...............................................................................................................317
Conguring the Server for Automatic Address Allocation...................................................................................318
Specifying a Default Gateway.................................................................................................................................319
Congure a Method of Hostname Resolution..................................................................................................... 320
Using DNS for Address Resolution........................................................................................................................320
Using NetBIOS WINS for Address Resolution..................................................................................................... 320
Creating Manual Binding Entries............................................................................................................................320
Debugging the DHCP Server..................................................................................................................................321
Using DHCP Clear Commands............................................................................................................................... 321
Congure the System to be a DHCP Client................................................................................................................321
Conguring the DHCP Client System................................................................................................................... 322
DHCP Client on a Management Interface............................................................................................................ 323
DHCP Client Operation with Other Features....................................................................................................... 324
DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................ 325
Conguring Route Leaking between VRFs on DHCP Relay Agent................................................................... 325
Non-default VRF conguration for DHCPv6 helper address................................................................................... 326
Conguring DHCP relay source interface...................................................................................................................326
Global DHCP relay source IPv4 or IPv6 conguration ....................................................................................... 326
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................327
Congure the System for User Port Stacking (Option 230)....................................................................................328
Congure Secure DHCP............................................................................................................................................... 328
Option 82..................................................................................................................................................................329
DHCPv6 relay agent options..................................................................................................................................329
DHCP Snooping.......................................................................................................................................................330
Drop DHCP Packets on Snooped VLANs Only....................................................................................................335
Dynamic ARP Inspection........................................................................................................................................ 335
Conguring Dynamic ARP Inspection................................................................................................................... 336
Source Address Validation.............................................................................................................................................337
Enabling IP Source Address Validation.................................................................................................................. 337
10
Contents
DHCP MAC Source Address Validation................................................................................................................ 338
Enabling IP+MAC Source Address Validation.......................................................................................................338
Viewing the Number of SAV Dropped Packets....................................................................................................339
Clearing the Number of SAV Dropped Packets................................................................................................... 339
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 340
ECMP for Flow-Based Anity.....................................................................................................................................340
Conguring the Hash Algorithm Seed.................................................................................................................. 340
Link Bundle Monitoring................................................................................................................................................. 340
Managing ECMP Group Paths................................................................................................................................341
Creating an ECMP Group Bundle...........................................................................................................................341
Modifying the ECMP Group Threshold.................................................................................................................342
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................342
Support for ECMP in host table............................................................................................................................ 343
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 343
RTAG7....................................................................................................................................................................... 343
Flow-based Hashing for ECMP..............................................................................................................................344
15 FIP Snooping............................................................................................................................................348
Fibre Channel over Ethernet........................................................................................................................................ 348
Ensure Robustness in a Converged Ethernet Network............................................................................................ 348
FIP Snooping on Ethernet Bridges..............................................................................................................................350
Using FIP Snooping....................................................................................................................................................... 352
FIP Snooping Prerequisites.....................................................................................................................................352
Important Points to Remember............................................................................................................................. 352
Enabling the FCoE Transit Feature........................................................................................................................353
Enable FIP Snooping on VLANs.............................................................................................................................354
Congure the FC-MAP Value................................................................................................................................ 354
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................354
Congure a Port for a Bridge-to-FCF Link...........................................................................................................354
Impact on Other Software Features..................................................................................................................... 355
FIP Snooping Restrictions...................................................................................................................................... 355
Conguring FIP Snooping.......................................................................................................................................355
Displaying FIP Snooping Information...........................................................................................................................356
FCoE Transit Conguration Example........................................................................................................................... 361
16 Flex Hash and Optimized Boot-Up............................................................................................................363
Flex Hash Capability Overview.....................................................................................................................................363
Conguring the Flex Hash Mechanism.......................................................................................................................363
Conguring Fast Boot and LACP Fast Switchover...................................................................................................364
Optimizing the Boot Time.............................................................................................................................................364
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................364
Guidelines for Conguring Optimized Booting Mechanism................................................................................365
Interoperation of Applications with Fast Boot and System States..........................................................................366
LACP and IPv4 Routing.......................................................................................................................................... 366
LACP and IPv6 Routing..........................................................................................................................................366
Contents
11
BGP Graceful Restart..............................................................................................................................................367
Cold Boot Caused by Power Cycling the System................................................................................................367
Unexpected Reload of the System........................................................................................................................367
Software Upgrade....................................................................................................................................................367
LACP Fast Switchover............................................................................................................................................367
Changes to BGP Multipath.................................................................................................................................... 368
Delayed Installation of ECMP Routes Into BGP...................................................................................................368
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 368
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces......................................................................................369
17 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 370
Protocol Overview......................................................................................................................................................... 370
Ring Status................................................................................................................................................................ 371
Multiple FRRP Rings................................................................................................................................................ 371
Important FRRP Points........................................................................................................................................... 372
Important FRRP Concepts..................................................................................................................................... 373
Implementing FRRP....................................................................................................................................................... 374
FRRP Conguration.......................................................................................................................................................374
Creating the FRRP Group....................................................................................................................................... 374
Conguring the Control VLAN............................................................................................................................... 374
Conguring and Adding the Member VLANs.......................................................................................................376
Setting the FRRP Timers........................................................................................................................................ 377
Clearing the FRRP Counters.................................................................................................................................. 377
Viewing the FRRP Conguration........................................................................................................................... 377
Viewing the FRRP Information...............................................................................................................................377
Troubleshooting FRRP...................................................................................................................................................378
Conguration Checks.............................................................................................................................................. 378
Sample Conguration and Topology............................................................................................................................ 378
FRRP Support on VLT...................................................................................................................................................379
Example Scenario.................................................................................................................................................... 380
Important Points to Remember.............................................................................................................................. 381
18 GARP VLAN Registration Protocol (GVRP)..............................................................................................382
Important Points to Remember....................................................................................................................................382
Congure GVRP............................................................................................................................................................ 383
Related Conguration Tasks...................................................................................................................................383
Enabling GVRP Globally................................................................................................................................................ 384
Enabling GVRP on a Layer 2 Interface........................................................................................................................384
Congure GVRP Registration...................................................................................................................................... 384
Congure a GARP Timer.............................................................................................................................................. 385
19 Internet Group Management Protocol (IGMP)......................................................................................... 386
IGMP Implementation Information.............................................................................................................................. 386
IGMP Protocol Overview..............................................................................................................................................386
IGMP Version 2........................................................................................................................................................ 386
IGMP Version 3........................................................................................................................................................ 388
12
Contents
Congure IGMP..............................................................................................................................................................391
Related Conguration Tasks....................................................................................................................................391
Viewing IGMP Enabled Interfaces............................................................................................................................... 392
Selecting an IGMP Version...........................................................................................................................................392
Viewing IGMP Groups...................................................................................................................................................393
Adjusting Timers............................................................................................................................................................ 393
Adjusting Query and Response Timers................................................................................................................. 393
Enabling IGMP Immediate-Leave.................................................................................................................................394
IGMP Snooping..............................................................................................................................................................395
IGMP Snooping Implementation Information.......................................................................................................395
Conguring IGMP Snooping.................................................................................................................................. 395
Removing a Group-Port Association.....................................................................................................................396
Disabling Multicast Flooding...................................................................................................................................396
Specifying a Port as Connected to a Multicast Router...................................................................................... 396
Conguring the Switch as Querier.........................................................................................................................397
Fast Convergence after MSTP Topology Changes................................................................................................... 397
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................ 397
Protocol Separation.................................................................................................................................................398
Enabling and Disabling Management Egress Interface Selection...................................................................... 399
Handling of Management Route Conguration...................................................................................................400
Handling of Switch-Initiated Trac.......................................................................................................................400
Handling of Switch-Destined Trac...................................................................................................................... 401
Handling of Transit Trac (Trac Separation).................................................................................................... 402
Mapping of Management Applications and Trac Type.....................................................................................402
Behavior of Various Applications for Switch-Initiated Trac ............................................................................ 403
Behavior of Various Applications for Switch-Destined Trac .......................................................................... 404
Interworking of EIS With Various Applications.....................................................................................................404
Designating a Multicast Router Interface...................................................................................................................405
20 Interfaces................................................................................................................................................ 406
Basic Interface Conguration.......................................................................................................................................406
Advanced Interface Conguration...............................................................................................................................406
Interface Types...............................................................................................................................................................407
View Basic Interface Information................................................................................................................................. 407
Resetting an Interface to its Factory Default State...................................................................................................409
Enabling a Physical Interface........................................................................................................................................ 410
Physical Interfaces......................................................................................................................................................... 410
Conguration Task List for Physical Interfaces.....................................................................................................410
Overview of Layer Modes........................................................................................................................................411
Conguring Layer 2 (Data Link) Mode................................................................................................................... 411
Conguring Layer 2 (Interface) Mode................................................................................................................... 412
Conguring Layer 3 (Network) Mode....................................................................................................................412
Conguring Layer 3 (Interface) Mode................................................................................................................... 412
Automatic recovery of an Err-disabled interface........................................................................................................413
Conguring an automatic recovery for an Err-disabled interface.......................................................................414
Egress Interface Selection (EIS)...................................................................................................................................414
Contents
13
Important Points to Remember.............................................................................................................................. 415
Conguring EIS.........................................................................................................................................................415
Management Interfaces................................................................................................................................................ 415
Conguring Management Interfaces..................................................................................................................... 415
Conguring a Management Interface on an Ethernet Port.................................................................................417
S6100 — OIR............................................................................................................................................................418
VLAN Interfaces............................................................................................................................................................. 418
Loopback Interfaces.......................................................................................................................................................419
Null Interfaces.................................................................................................................................................................419
Port Channel Interfaces.................................................................................................................................................419
Port Channel Denition and Standards.................................................................................................................420
Port Channel Benets.............................................................................................................................................420
Port Channel Implementation.................................................................................................................................420
Interfaces in Port Channels.....................................................................................................................................421
Conguration Tasks for Port Channel Interfaces..................................................................................................421
Creating a Port Channel.......................................................................................................................................... 421
Adding a Physical Interface to a Port Channel.....................................................................................................422
Reassigning an Interface to a New Port Channel................................................................................................ 423
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 424
Adding or Removing a Port Channel from a VLAN............................................................................................. 424
Assigning an IP Address to a Port Channel.......................................................................................................... 425
Deleting or Disabling a Port Channel.....................................................................................................................426
Load Balancing Through Port Channels................................................................................................................426
Load-Balancing Method..........................................................................................................................................426
Changing the Hash Algorithm................................................................................................................................ 427
Bulk Conguration......................................................................................................................................................... 428
Interface Range........................................................................................................................................................428
Bulk Conguration Examples..................................................................................................................................428
Dening Interface Range Macros................................................................................................................................ 430
Dene the Interface Range.................................................................................................................................... 430
Choosing an Interface-Range Macro.................................................................................................................... 430
Monitoring and Maintaining Interfaces........................................................................................................................ 431
Split 40G Ports on a 16X40G QSFP+ Module............................................................................................................432
Splitting 100G Ports.......................................................................................................................................................433
Link Dampening..............................................................................................................................................................433
Important Points to Remember..............................................................................................................................434
Conguration Example of Link Dampening...........................................................................................................434
Enabling Link Dampening........................................................................................................................................436
Link Bundle Monitoring..................................................................................................................................................437
Using Ethernet Pause Frames for Flow Control........................................................................................................ 438
Enabling Pause Frames........................................................................................................................................... 438
Congure the MTU Size on an Interface....................................................................................................................439
Port-Pipes.......................................................................................................................................................................440
CR4 Auto-Negotiation...................................................................................................................................................440
FEC Conguration......................................................................................................................................................... 440
14
Contents
Setting the Speed of Ethernet Interfaces.................................................................................................................. 442
Syslog Warning Upon Connecting SFP28 Optics with QSA....................................................................................443
Adjusting the Keepalive Timer......................................................................................................................................443
View Advanced Interface Information.........................................................................................................................444
Conguring the Interface Sampling Size.............................................................................................................. 444
Conguring the Trac Sampling Size Globally...........................................................................................................445
Dynamic Counters..........................................................................................................................................................447
Clearing Interface Counters....................................................................................................................................447
Enhanced Validation of Interface Ranges...................................................................................................................448
Compressing Conguration Files................................................................................................................................. 448
21 IPv4 Routing............................................................................................................................................. 451
IP Addresses...................................................................................................................................................................452
Implementation Information....................................................................................................................................452
Conguration Tasks for IP Addresses..........................................................................................................................452
Assigning IP Addresses to an Interface.......................................................................................................................452
Conguring Static Routes............................................................................................................................................ 453
Congure Static Routes for the Management Interface..........................................................................................454
IPv4 Path MTU Discovery Overview.......................................................................................................................... 455
Packet handling during MTU mismatch................................................................................................................455
Using the Congured Source IP Address in ICMP Messages..................................................................................455
Conguring the ICMP Source Interface............................................................................................................... 455
Conguring the Duration to Establish a TCP Connection........................................................................................ 456
Enabling Directed Broadcast........................................................................................................................................ 456
Resolution of Host Names............................................................................................................................................457
Enabling Dynamic Resolution of Host Names............................................................................................................ 457
Specifying the Local System Domain and a List of Domains....................................................................................457
Conguring DNS with Traceroute............................................................................................................................... 458
ARP................................................................................................................................................................................. 459
Conguration Tasks for ARP........................................................................................................................................ 459
Conguring Static ARP Entries....................................................................................................................................459
Enabling Proxy ARP.......................................................................................................................................................460
Clearing ARP Cache......................................................................................................................................................460
ARP Learning via Gratuitous ARP............................................................................................................................... 460
Enabling ARP Learning via Gratuitous ARP................................................................................................................460
ARP Learning via ARP Request....................................................................................................................................461
Conguring ARP Retries................................................................................................................................................461
ICMP............................................................................................................................................................................... 462
Conguration Tasks for ICMP...................................................................................................................................... 462
Enabling ICMP Unreachable Messages...................................................................................................................... 462
ICMP Redirects..............................................................................................................................................................463
UDP Helper.....................................................................................................................................................................464
Congure UDP Helper.............................................................................................................................................464
Important Points to Remember............................................................................................................................. 464
Enabling UDP Helper.....................................................................................................................................................464
Congurations Using UDP Helper............................................................................................................................... 464
Contents
15
UDP Helper with Broadcast-All Addresses.................................................................................................................464
UDP Helper with Subnet Broadcast Addresses.........................................................................................................465
UDP Helper with Congured Broadcast Addresses..................................................................................................466
UDP Helper with No Congured Broadcast Addresses............................................................................................466
Troubleshooting UDP Helper........................................................................................................................................466
22 IPv6 Routing............................................................................................................................................468
Protocol Overview.........................................................................................................................................................468
Extended Address Space........................................................................................................................................469
Stateless Autoconguration................................................................................................................................... 469
IPv6 Headers............................................................................................................................................................469
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support....................................................................470
IPv6 Header Fields....................................................................................................................................................471
Extension Header Fields..........................................................................................................................................473
Addressing.................................................................................................................................................................474
Implementing IPv6 with Dell EMC Networking OS................................................................................................... 475
ICMPv6........................................................................................................................................................................... 475
Path MTU discovery......................................................................................................................................................475
IPv6 Neighbor Discovery.............................................................................................................................................. 476
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................477
Conguring the IPv6 Recursive DNS Server........................................................................................................477
Debugging IPv6 RDNSS Information Sent to the Host ..................................................................................... 478
Displaying IPv6 RDNSS Information......................................................................................................................478
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 479
Conguration Tasks for IPv6........................................................................................................................................ 479
Adjusting Your CAM-Prole....................................................................................................................................479
Assigning an IPv6 Address to an Interface...........................................................................................................480
Assigning a Static IPv6 Route.................................................................................................................................481
Conguring Telnet with IPv6...................................................................................................................................481
SNMP over IPv6......................................................................................................................................................482
Displaying IPv6 Information.................................................................................................................................... 482
Displaying an IPv6 Interface Information.............................................................................................................. 482
Showing IPv6 Routes..............................................................................................................................................483
Showing the Running-Conguration for an Interface.........................................................................................484
Clearing IPv6 Routes...............................................................................................................................................485
Disabling ND Entry Timeout................................................................................................................................... 485
Conguring IPv6 RA Guard.......................................................................................................................................... 486
Conguring IPv6 RA Guard on an Interface......................................................................................................... 487
Monitoring IPv6 RA Guard......................................................................................................................................488
23 iSCSI Optimization...................................................................................................................................489
iSCSI Optimization Overview.......................................................................................................................................489
Monitoring iSCSI Trac Flows................................................................................................................................491
Application of Quality of Service to iSCSI Trac Flows...................................................................................... 491
Information Monitored in iSCSI Trac Flows........................................................................................................491
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 492
16
Contents
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................492
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................493
Enable and Disable iSCSI Optimization................................................................................................................. 493
Default iSCSI Optimization Values...............................................................................................................................494
iSCSI Optimization Prerequisites................................................................................................................................. 494
Conguring iSCSI Optimization....................................................................................................................................494
Displaying iSCSI Optimization Information................................................................................................................. 496
24 Intermediate System to Intermediate System.......................................................................................... 498
IS-IS Protocol Overview............................................................................................................................................... 498
IS-IS Addressing.............................................................................................................................................................498
Multi-Topology IS-IS...................................................................................................................................................... 499
Transition Mode....................................................................................................................................................... 499
Interface Support.................................................................................................................................................... 500
Adjacencies.............................................................................................................................................................. 500
Graceful Restart............................................................................................................................................................ 500
Timers....................................................................................................................................................................... 500
Implementation Information......................................................................................................................................... 500
Conguration Information............................................................................................................................................. 501
Conguration Tasks for IS-IS..................................................................................................................................502
Conguring the Distance of a Route.....................................................................................................................509
Changing the IS-Type...............................................................................................................................................510
Redistributing IPv4 Routes......................................................................................................................................512
Redistributing IPv6 Routes......................................................................................................................................513
Conguring Authentication Passwords..................................................................................................................514
Setting the Overload Bit..........................................................................................................................................514
Debugging IS-IS........................................................................................................................................................515
IS-IS Metric Styles..........................................................................................................................................................516
Congure Metric Values................................................................................................................................................ 516
Maximum Values in the Routing Table................................................................................................................... 517
Change the IS-IS Metric Style in One Level Only.................................................................................................517
Leaks from One Level to Another...........................................................................................................................518
Sample Congurations...................................................................................................................................................519
25 In-Service Software Upgrade.................................................................................................................. 522
ISSU Introduction...........................................................................................................................................................522
Warmboot Limitations............................................................................................................................................. 522
Fastboot 2.0 (Zero Loss Upgrade).............................................................................................................................. 522
L2 ISSU........................................................................................................................................................................... 523
L3 ISSU........................................................................................................................................................................... 523
CoPP............................................................................................................................................................................... 524
Mirroring ow control packets..................................................................................................................................... 524
PFC..................................................................................................................................................................................524
QoS..................................................................................................................................................................................524
Tunnel Conguration..................................................................................................................................................... 524
Contents
17
26 Link Aggregation Control Protocol (LACP).............................................................................................. 526
Introduction to Dynamic LAGs and LACP.................................................................................................................. 526
Important Points to Remember............................................................................................................................. 526
LACP Modes............................................................................................................................................................ 527
Conguring LACP Commands............................................................................................................................... 527
LACP Conguration Tasks............................................................................................................................................ 528
Creating a LAG.........................................................................................................................................................528
Conguring the LAG Interfaces as Dynamic........................................................................................................ 528
Setting the LACP Long Timeout........................................................................................................................... 529
Monitoring and Debugging LACP..........................................................................................................................529
Shared LAG State Tracking.......................................................................................................................................... 530
Conguring Shared LAG State Tracking...............................................................................................................530
Important Points about Shared LAG State Tracking........................................................................................... 532
LACP Basic Conguration Example............................................................................................................................ 532
Congure a LAG on ALPHA................................................................................................................................... 532
27 Layer 2..................................................................................................................................................... 541
Manage the MAC Address Table..................................................................................................................................541
Clearing the MAC Address Table............................................................................................................................541
Setting the Aging Time for Dynamic Entries.........................................................................................................541
Conguring a Static MAC Address........................................................................................................................542
Displaying the MAC Address Table........................................................................................................................ 542
MAC Learning Limit.......................................................................................................................................................542
Setting the MAC Learning Limit............................................................................................................................ 543
mac learning-limit Dynamic.....................................................................................................................................543
mac learning-limit mac-address-sticky................................................................................................................. 543
mac learning-limit station-move............................................................................................................................ 544
mac learning-limit no-station-move...................................................................................................................... 544
Learning Limit Violation Actions.............................................................................................................................544
Setting Station Move Violation Actions................................................................................................................ 545
Recovering from Learning Limit and Station Move Violations...........................................................................545
Disabling MAC Address Learning on the System................................................................................................ 546
Enabling port security............................................................................................................................................. 546
NIC Teaming................................................................................................................................................................... 546
Congure Redundant Pairs...........................................................................................................................................547
Important Points about Conguring Redundant Pairs........................................................................................ 549
Far-End Failure Detection.............................................................................................................................................550
FEFD State Changes............................................................................................................................................... 551
Conguring FEFD.................................................................................................................................................... 552
Enabling FEFD on an Interface.............................................................................................................................. 552
Debugging FEFD......................................................................................................................................................553
28 Link Layer Discovery Protocol (LLDP)..................................................................................................... 555
802.1AB (LLDP) Overview........................................................................................................................................... 555
Protocol Data Units.................................................................................................................................................555
18
Contents
Optional TLVs.................................................................................................................................................................556
Management TLVs.................................................................................................................................................. 556
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 558
TIA Organizationally Specic TLVs........................................................................................................................558
Congure LLDP............................................................................................................................................................. 562
Related Conguration Tasks...................................................................................................................................562
Important Points to Remember............................................................................................................................. 562
LLDP Compatibility..................................................................................................................................................562
CONFIGURATION versus INTERFACE Congurations............................................................................................ 562
Enabling LLDP................................................................................................................................................................563
Disabling and Undoing LLDP..................................................................................................................................563
Enabling LLDP on Management Ports........................................................................................................................564
Disabling and Undoing LLDP on Management Ports..........................................................................................564
Advertising TLVs............................................................................................................................................................ 564
Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................565
Reserved Unrecognized LLDP TLVs..................................................................................................................... 565
Organizational Specic Unrecognized LLDP TLVs..............................................................................................566
Viewing Unrecognized LLDP TLVs........................................................................................................................566
Viewing the LLDP Conguration................................................................................................................................. 566
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................567
Examples of Viewing Information Advertised by Neighbors...............................................................................567
Conguring LLDPDU Intervals.....................................................................................................................................569
Conguring LLDP Notication Interval....................................................................................................................... 569
Conguring Transmit and Receive Mode....................................................................................................................570
Conguring the Time to Live Value............................................................................................................................. 570
Debugging LLDP.............................................................................................................................................................571
Relevant Management Objects....................................................................................................................................572
29 Microsoft Network Load Balancing.......................................................................................................... 577
NLB Unicast Mode Scenario........................................................................................................................................ 577
NLB Multicast Mode Scenario..................................................................................................................................... 577
Limitations of the NLB Feature.................................................................................................................................... 578
Microsoft Clustering......................................................................................................................................................578
Enable and Disable VLAN Flooding .............................................................................................................................578
Conguring a Switch for NLB ..................................................................................................................................... 578
Enabling a Switch for Multicast NLB.................................................................................................................... 579
30 Multicast Source Discovery Protocol (MSDP).........................................................................................580
Protocol Overview.........................................................................................................................................................580
Anycast RP......................................................................................................................................................................581
Implementation Information..........................................................................................................................................582
Congure Multicast Source Discovery Protocol........................................................................................................582
Related Conguration Tasks...................................................................................................................................582
Enable MSDP.................................................................................................................................................................586
Manage the Source-Active Cache.............................................................................................................................. 587
Viewing the Source-Active Cache.........................................................................................................................587
Contents
19
Limiting the Source-Active Cache.........................................................................................................................587
Clearing the Source-Active Cache........................................................................................................................588
Enabling the Rejected Source-Active Cache....................................................................................................... 588
Accept Source-Active Messages that Fail the RFP Check......................................................................................588
Specifying Source-Active Messages........................................................................................................................... 591
Limiting the Source-Active Messages from a Peer...................................................................................................592
Preventing MSDP from Caching a Local Source.......................................................................................................592
Preventing MSDP from Caching a Remote Source.................................................................................................. 593
Preventing MSDP from Advertising a Local Source..................................................................................................593
Logging Changes in Peership States...........................................................................................................................594
Terminating a Peership..................................................................................................................................................594
Clearing Peer Statistics.................................................................................................................................................595
Debugging MSDP..........................................................................................................................................................595
MSDP with Anycast RP................................................................................................................................................596
Conguring Anycast RP................................................................................................................................................597
Reducing Source-Active Message Flooding.........................................................................................................598
Specifying the RP Address Used in SA Messages.............................................................................................. 598
MSDP Sample Congurations..................................................................................................................................... 600
31 Multicast Listener Discovery Protocol...................................................................................................... 603
MLD Version 1................................................................................................................................................................ 603
MLD Querier Router......................................................................................................................................................603
Joining a Multicast Group.............................................................................................................................................604
Leaving a Multicast Group............................................................................................................................................604
MLD version 2................................................................................................................................................................604
MLD timers.....................................................................................................................................................................606
Reducing Host Response Burstiness.................................................................................................................... 607
Conguring MLD Version..............................................................................................................................................607
Clearing MLD groups.....................................................................................................................................................607
Debugging MLD............................................................................................................................................................. 607
Explicit Tracking............................................................................................................................................................. 607
Reducing Leave Latency...............................................................................................................................................608
Displaying MLD groups table........................................................................................................................................608
Displaying MLD Interfaces............................................................................................................................................608
MLD Snooping............................................................................................................................................................... 608
Enable MLD Snooping............................................................................................................................................ 609
Disable MLD Snooping............................................................................................................................................609
Congure the switch as a querier..........................................................................................................................609
Specify port as connected to multicast router.................................................................................................... 609
Enable Snooping Explicit Tracking..........................................................................................................................610
Display the MLD Snooping Table............................................................................................................................610
32 Multiple Spanning Tree Protocol (MSTP)..................................................................................................611
Protocol Overview.......................................................................................................................................................... 611
Spanning Tree Variations............................................................................................................................................... 612
Implementation Information.................................................................................................................................... 612
20
Contents
/