Dell PowerSwitch S5000 User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S5000 User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell 9.11(0.0) Configuration Guide for the S5000
Switch
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 01
Rev. A00
Contents
1 About this Guide...........................................................................................................................................36
Audience........................................................................................................................................................................... 36
Conventions......................................................................................................................................................................36
Related Documents......................................................................................................................................................... 36
2 Configuration Fundamentals........................................................................................................................ 37
Accessing the Command Line........................................................................................................................................37
CLI Modes.........................................................................................................................................................................37
Navigating CLI Modes...............................................................................................................................................39
Port Numbering Convention.......................................................................................................................................... 40
The do Command............................................................................................................................................................. 41
The no Command............................................................................................................................................................ 42
Obtaining Help..................................................................................................................................................................42
Entering and Editing Commands................................................................................................................................... 43
Command History............................................................................................................................................................44
Filtering show Command Outputs.................................................................................................................................44
Multiple Users in Configuration Mode...........................................................................................................................45
3 Getting Started........................................................................................................................................... 46
Accessing Ports............................................................................................................................................................... 46
Accessing the RJ-45/RS-232 Console Port................................................................................................................46
Pin Assignments...............................................................................................................................................................47
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................47
Entering CLI commands Using an SSH Connection..............................................................................................47
Executing Local CLI Scripts Using an SSH Connection........................................................................................47
Default Configuration...................................................................................................................................................... 48
Accessing the USB-B Console Port.............................................................................................................................. 48
Booting Process...............................................................................................................................................................48
Enter the Initial Configuration Information................................................................................................................... 50
Configuring the Enable Password.................................................................................................................................. 51
Configuring a Host Name................................................................................................................................................51
Navigating CLI Modes......................................................................................................................................................51
Default Configuration......................................................................................................................................................52
Configuring Layer 2 (Data Link) Mode......................................................................................................................... 52
Accessing the System Remotely................................................................................................................................... 52
Configure the Management Port IP Address...............................................................................................................52
Configure a Management Route................................................................................................................................... 53
Configuring a Username and Password........................................................................................................................53
Creating a Port-based VLAN......................................................................................................................................... 53
Assigning Interfaces to a VLAN..................................................................................................................................... 53
Assigning an IP Address to a VLAN...............................................................................................................................54
Connect the S5000 to the Network.............................................................................................................................54
Contents
3
Configure File Management........................................................................................................................................... 54
Copying Files to and from the System..........................................................................................................................54
Important Points to Remember............................................................................................................................... 55
Mounting an NFS File System....................................................................................................................................... 55
Important Points to Remember............................................................................................................................... 56
Saving the Running-Configuration................................................................................................................................ 57
Viewing Files..................................................................................................................................................................... 57
View Configuration Files................................................................................................................................................. 58
Compressing Configuration Files...................................................................................................................................59
Managing the File System.............................................................................................................................................. 62
Enabling Software Features on Devices Using a Command Option......................................................................... 62
View Command History.................................................................................................................................................. 63
Upgrading and Downgrading Dell Networking OS...................................................................................................... 63
Verify Software Images Before Installation..................................................................................................................63
Using HTTP for File Transfers........................................................................................................................................64
4 Switch Management....................................................................................................................................66
Configuring Privilege Levels........................................................................................................................................... 66
Creating a Custom Privilege Level.......................................................................................................................... 66
Removing a Command from EXEC Mode....................................................................................................................66
Moving a Command from EXEC Privilege Mode to EXEC Mode............................................................................. 66
Allowing Access to CONFIGURATION Mode Commands..........................................................................................67
Allowing Access to the Following Modes......................................................................................................................67
Applying a Privilege Level to a Username.....................................................................................................................68
Applying a Privilege Level to a Terminal Line............................................................................................................... 69
Configuring Logging........................................................................................................................................................ 69
Log Messages in the Internal Buffer............................................................................................................................. 69
Configuration Task List for System Log Management.........................................................................................69
Disabling System Logging.........................................................................................................................................70
Sending System Messages to a Syslog Server......................................................................................................70
Configuring a UNIX System as a Syslog Server...........................................................................................................70
Track Login Activity.........................................................................................................................................................70
Restrictions for Tracking Login Activity...................................................................................................................71
Configuring Login Activity Tracking......................................................................................................................... 71
Display Login Statistics.............................................................................................................................................. 71
Limit Concurrent Login Sessions....................................................................................................................................73
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 73
Configuring Concurrent Session Limit.....................................................................................................................73
Enabling the System to Clear Existing Sessions.................................................................................................... 73
Enabling Secured CLI Mode........................................................................................................................................... 74
Changing System Logging Settings.............................................................................................................................. 74
Display the Logging Buffer and the Logging Configuration....................................................................................... 75
Configuring a UNIX Logging Facility Level....................................................................................................................76
Synchronizing Log Messages......................................................................................................................................... 77
Enabling Timestamp on Syslog Messages.................................................................................................................... 77
File Transfer Services......................................................................................................................................................78
4
Contents
Configuration Task List for File Transfer Services.................................................................................................78
Enabling the FTP Server........................................................................................................................................... 78
Configuring FTP Server Parameters....................................................................................................................... 78
Configuring FTP Client Parameters.........................................................................................................................79
Terminal Lines...................................................................................................................................................................79
Denying and Permitting Access to a Terminal Line............................................................................................... 79
Configuring Login Authentication for Terminal Lines..................................................................................................80
Setting Time Out of EXEC Privilege Mode................................................................................................................... 81
Using Telnet to get to Another Network Device..........................................................................................................81
Lock CONFIGURATION Mode.......................................................................................................................................82
Viewing the Configuration Lock Status.................................................................................................................. 82
View the Configuration Lock Status............................................................................................................................. 83
Recovering from a Forgotten Password...................................................................................................................... 83
Recovering from a Forgotten Enable Password..........................................................................................................83
Recovering from a Failed Start...................................................................................................................................... 84
5 802.1X......................................................................................................................................................... 85
The Port-Authentication Process..................................................................................................................................87
EAP over RADIUS............................................................................................................................................................87
RADIUS Attributes for 802.1 Support..................................................................................................................... 88
Configuring 802.1X.......................................................................................................................................................... 88
Related Configuration Tasks.................................................................................................................................... 88
Important Points to Remember............................................................................................................................... 88
Enabling 802.1X................................................................................................................................................................89
Configuring MAC addresses for a do1x Profile............................................................................................................ 90
Configuring Request Identity Re-Transmissions.......................................................................................................... 91
Configuring a Quiet Period after a Failed Authentication............................................................................................91
Forcibly Authorizing or Unauthorizing a Port...............................................................................................................92
Re-Authenticating a Port................................................................................................................................................93
Configuring Timeouts......................................................................................................................................................94
Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................... 95
Guest and Authentication-Fail VLANs.......................................................................................................................... 96
Configuring a Guest VLAN....................................................................................................................................... 96
Configuring an Authentication-Fail VLAN...............................................................................................................96
Configuring dot1x Profile ................................................................................................................................................97
Configuring the Static MAB and MAB Profile ............................................................................................................ 98
Configuring Critical VLAN ..............................................................................................................................................99
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)................................. 100
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................ 100
Guidelines for Configuring ACL VLAN Groups............................................................................................................101
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters...............................................101
Configuring ACL VLAN Groups...............................................................................................................................101
Configuring FP Blocks for VLAN Parameters.......................................................................................................102
Viewing CAM Usage...................................................................................................................................................... 103
Allocating FP Blocks for VLAN Processes.................................................................................................................. 104
Contents
5
7 Access Control Lists (ACLs)...................................................................................................................... 106
IP Access Control Lists (ACLs)....................................................................................................................................106
CAM Allocation and CAM Optimization.......................................................................................................................107
User Configurable CAM Allocation.........................................................................................................................107
CAM Optimization....................................................................................................................................................108
Test CAM Usage......................................................................................................................................................108
View CAM-ACL Settings.........................................................................................................................................108
View CAM Usage......................................................................................................................................................110
QoS CAM Region Limitation....................................................................................................................................110
Implementing ACLs on Dell Networking OS.................................................................................................................111
ACLs and VLANs........................................................................................................................................................111
ACL Optimization.......................................................................................................................................................111
Determine the Order in which ACLs are Used to Classify Traffic.......................................................................111
IP Fragment Handling..................................................................................................................................................... 112
IP Fragments ACL Examples................................................................................................................................... 112
Layer 4 ACL Rules Examples................................................................................................................................... 113
Configure a Standard IP ACL........................................................................................................................................ 114
Configuring a Standard IP ACL Filter..................................................................................................................... 115
Configure an Extended IP ACL..................................................................................................................................... 115
Configuring Filters with a Sequence Number........................................................................................................116
Configuring Filters Without a Sequence Number................................................................................................. 116
Established Flag...............................................................................................................................................................117
Configure Layer 2 and Layer 3 ACLs............................................................................................................................117
Assign an IP ACL to an Interface.................................................................................................................................. 118
Applying an IP ACL....................................................................................................................................................118
Counting ACL Hits.................................................................................................................................................... 119
Configure Ingress ACLs..................................................................................................................................................119
Configure Egress ACLs.................................................................................................................................................. 119
Applying Egress Layer 3 ACLs (Control-Plane)................................................................................................... 120
Configure ACLs to Loopback........................................................................................................................................ 121
Applying an ACL on Loopback Interfaces.................................................................................................................... 121
IP Prefix Lists.................................................................................................................................................................. 122
Implementation Information.................................................................................................................................... 122
Configuration Task List for Prefix Lists................................................................................................................. 122
Creating a Prefix List..................................................................................................................................................... 123
Creating a Prefix List Without a Sequence Number............................................................................................123
Viewing Prefix Lists..................................................................................................................................................124
Applying a Prefix List for Route Redistribution.................................................................................................... 125
Applying a Filter to a Prefix List (OSPF)...............................................................................................................125
ACL Resequencing.........................................................................................................................................................126
Resequencing an ACL or Prefix List...................................................................................................................... 126
Route Maps.....................................................................................................................................................................128
Implementation Information.................................................................................................................................... 128
Important Points to Remember..............................................................................................................................128
Configuration Task List for Route Maps............................................................................................................... 128
6
Contents
Creating a Route Map..............................................................................................................................................128
Configure Route Map Filters...................................................................................................................................130
Configuring Match Routes......................................................................................................................................130
Configuring Set Conditions..................................................................................................................................... 132
Configure a Route Map for Route Redistribution................................................................................................ 133
Configure a Route Map for Route Tagging...........................................................................................................133
Continue Clause........................................................................................................................................................134
8 Bidirectional Forwarding Detection (BFD)..................................................................................................135
How BFD Works.............................................................................................................................................................135
BFD Packet Format....................................................................................................................................................... 136
BFD Sessions.................................................................................................................................................................. 137
BFD Three-Way Handshake......................................................................................................................................... 138
Session State Changes..................................................................................................................................................140
Important Points to Remember..............................................................................................................................140
Configure BFD................................................................................................................................................................ 140
Configure BFD for Physical Ports...........................................................................................................................141
Configure BFD for Static Routes........................................................................................................................... 142
Configure BFD for OSPF.........................................................................................................................................145
Configure BFD for IS-IS...........................................................................................................................................148
Configure BFD for BGP............................................................................................................................................151
Configuring Protocol Liveness................................................................................................................................157
Troubleshooting BFD..................................................................................................................................................... 157
9 Border Gateway Protocol IPv4 (BGPv4)....................................................................................................159
Autonomous Systems (AS).......................................................................................................................................... 160
Sessions and Peers........................................................................................................................................................ 162
Establish a Session...................................................................................................................................................162
Route Reflectors............................................................................................................................................................ 163
Communities................................................................................................................................................................... 164
BGP Attributes............................................................................................................................................................... 164
Best Path Selection Criteria....................................................................................................................................164
Weight............................................................................................................................................................................. 166
Local Preference............................................................................................................................................................ 166
Multi-Exit Discriminators (MEDs)...........................................................................................................................167
Origin................................................................................................................................................................................168
AS Path............................................................................................................................................................................168
Next Hop......................................................................................................................................................................... 169
Multiprotocol BGP..........................................................................................................................................................169
Implement BGP with Dell Networking OS.................................................................................................................. 169
Additional Path (Add-Path) Support..................................................................................................................... 169
Advertise IGP Cost as MED for Redistributed Routes........................................................................................170
Ignore Router-ID for Some Best-Path Calculations.............................................................................................170
Four-Byte AS Numbers........................................................................................................................................... 170
AS4 Number Representation...................................................................................................................................171
AS Number Migration.................................................................................................................................................... 172
Contents
7
BGP4 Management Information Base (MIB)..............................................................................................................173
Important Points to Remember..............................................................................................................................174
Configuration Information..............................................................................................................................................174
BGP Configuration................................................................................................................................................... 175
Enabling BGP.................................................................................................................................................................. 176
Configuring AS4 Number Representations.................................................................................................................179
Configuring Peer Groups...............................................................................................................................................180
Configuring BGP Fast Fall-Over...................................................................................................................................183
Configuring Passive Peering......................................................................................................................................... 184
Maintaining Existing AS Numbers During an AS Migration.......................................................................................185
Allowing an AS Number to Appear in its Own AS Path.............................................................................................186
Enabling Graceful Restart............................................................................................................................................. 186
Enabling Neighbor Graceful Restart............................................................................................................................ 187
Filtering on an AS-Path Attribute.................................................................................................................................188
Regular Expressions as Filters................................................................................................................................ 189
Filtering BGP Routes Using AS-PATH Information................................................................................................... 190
Redistributing Routes..................................................................................................................................................... 191
Enabling Additional Paths..............................................................................................................................................192
Configuring IP Community Lists...................................................................................................................................192
Filtering Routes with Community Lists........................................................................................................................193
Manipulating the COMMUNITY Attribute...................................................................................................................194
Changing MED Attributes.............................................................................................................................................195
Changing the LOCAL_PREFERENCE Attribute........................................................................................................195
Configuring the local System or a Different System to be the Next Hop for BGP-Learned Routes..................196
Changing the WEIGHT Attribute..................................................................................................................................197
Enabling Multipath..........................................................................................................................................................197
Filtering BGP Routes Using Route Maps.................................................................................................................... 197
Filtering BGP Routes Using AS-PATH Information................................................................................................... 198
Filtering BGP Routes..................................................................................................................................................... 199
Filtering BGP Routes Using Route Maps............................................................................................................. 200
Filtering BGP Routes Using AS-PATH Information............................................................................................. 201
Configuring BGP Route Reflectors..............................................................................................................................201
Aggregating Routes...................................................................................................................................................... 202
Configuring BGP Confederations................................................................................................................................202
Enabling Route Flap Dampening..................................................................................................................................203
Changing BGP Timers...................................................................................................................................................205
Enabling BGP Neighbor Soft-Reconfiguration.......................................................................................................... 206
Enabling or disabling BGP neighbors...........................................................................................................................207
Route Map Continue.....................................................................................................................................................208
Match a Clause with a Continue Clause...............................................................................................................208
Set a Clause with a Continue Clause.................................................................................................................... 208
Enabling MBGP Configurations................................................................................................................................... 208
BGP Regular Expression Optimization........................................................................................................................209
Debugging BGP............................................................................................................................................................. 209
Storing Last and Bad PDUs.................................................................................................................................... 210
8
Contents
Capturing PDUs.........................................................................................................................................................211
PDU Counters...........................................................................................................................................................212
Sample Configurations...................................................................................................................................................212
10 Bare Metal Provisioning (BMP)................................................................................................................ 221
Prerequisites................................................................................................................................................................... 221
Restrictions..................................................................................................................................................................... 221
Reconfiguring Jumpstart and Normal Modes............................................................................................................222
Jumpstart Mode............................................................................................................................................................ 223
DHCP Server/Configuration..................................................................................................................................223
MAC-Based IP Assignment....................................................................................................................................224
DHCP Retry Mechanism........................................................................................................................................ 225
File Server.......................................................................................................................................................................225
Domain Name Server.................................................................................................................................................... 226
Switch Boot and Set-up Behavior in Jumpstart Mode.............................................................................................226
11 Content Addressable Memory (CAM).......................................................................................................228
CAM Allocation.............................................................................................................................................................. 228
Re-Allocating CAM for Ingress ACLs and QoS..........................................................................................................229
Re-Allocating CAM for Egress ACLs.......................................................................................................................... 230
Testing CAM Usage for QoS Policies.......................................................................................................................... 231
Displaying CAM-ACL Settings......................................................................................................................................231
Displaying CAM-ACL-Egress Settings........................................................................................................................232
CAM Optimization......................................................................................................................................................... 232
Troubleshoot CAM Profiling...................................................................................................................................232
12 Control Plane Policing (CoPP)................................................................................................................. 233
Configure Control Plane Policing.................................................................................................................................234
Configuring CoPP for Protocols..................................................................................................................................235
Configuring CoPP for CPU Queues............................................................................................................................ 237
Show Commands...........................................................................................................................................................237
13 Data Center Bridging (DCB).....................................................................................................................239
Ethernet Enhancements in Data Center Bridging.....................................................................................................239
Priority-Based Flow Control...................................................................................................................................240
Enhanced Transmission Selection..........................................................................................................................241
Data Center Bridging Exchange Protocol (DCBx).............................................................................................. 242
Data Center Bridging in a Traffic Flow................................................................................................................. 243
Enabling Data Center Bridging.....................................................................................................................................243
DCB Maps and its Attributes................................................................................................................................. 244
Data Center Bridging: Default Configuration.............................................................................................................245
Configuring Priority-Based Flow Control....................................................................................................................245
Configuring Lossless Queues................................................................................................................................. 246
Configuring PFC in a DCB Map................................................................................................................................... 247
PFC Configuration Notes....................................................................................................................................... 247
PFC Prerequisites and Restrictions.......................................................................................................................248
Contents
9
Applying a DCB Map on a Port.................................................................................................................................... 248
Configuring PFC without a DCB Map.........................................................................................................................249
Configuring Lossless QueuesExample:................................................................................................................. 249
Priority-Based Flow Control Using Dynamic Buffer Method....................................................................................251
Pause and Resume of Traffic................................................................................................................................. 251
Buffer Sizes for Lossless or PFC Packets............................................................................................................ 251
Behavior of Tagged Packets........................................................................................................................................252
Configuration Example for DSCP and PFC Priorities............................................................................................... 252
Using PFC to Manage Converged Ethernet Traffic................................................................................................. 253
Configure Enhanced Transmission Selection.............................................................................................................253
ETS Prerequisites and Restrictions.......................................................................................................................253
Creating an ETS Priority Group............................................................................................................................. 253
ETS Operation with DCBx......................................................................................................................................255
Configuring Bandwidth Allocation for DCBx CIN................................................................................................ 255
Configuring ETS in a DCB Map............................................................................................................................. 256
Hierarchical Scheduling in ETS Output Policies.........................................................................................................257
Using ETS to Manage Converged Ethernet Traffic..................................................................................................258
Applying DCB Policies in a Switch Stack....................................................................................................................258
Configure a DCBx Operation....................................................................................................................................... 258
DCBx Operation.......................................................................................................................................................258
DCBx Port Roles......................................................................................................................................................259
DCB Configuration Exchange................................................................................................................................ 260
Configuration Source Election...............................................................................................................................260
Propagation of DCB Information............................................................................................................................261
Auto-Detection and Manual Configuration of the DCBx Version...................................................................... 261
DCBx Example......................................................................................................................................................... 262
DCBx Prerequisites and Restrictions.................................................................................................................... 262
Configuring DCBx....................................................................................................................................................262
Verifying the DCB Configuration.................................................................................................................................266
Sample DCB Configuration...........................................................................................................................................274
PFC and ETS Configuration Command Examples...............................................................................................276
QoS dot1p Traffic Classification and Queue Assignment......................................................................................... 276
Configuring the Dynamic Buffer Method................................................................................................................... 277
14 Dynamic Host Configuration Protocol (DHCP).........................................................................................279
DHCP Packet Format and Options............................................................................................................................. 279
Assign an IP Address using DHCP............................................................................................................................... 281
Implementation Information......................................................................................................................................... 282
Configuration Tasks.......................................................................................................................................................282
Configure the System to be a DHCP Server............................................................................................................. 282
Configuration Tasks.................................................................................................................................................283
Configuring the Server for Automatic Address Allocation................................................................................. 283
Specifying a Default Gateway................................................................................................................................284
Enabling the DHCP Server.....................................................................................................................................284
Configure a Method of Hostname Resolution.....................................................................................................285
Creating Manual Binding Entries........................................................................................................................... 286
10
Contents
Debugging the DHCP Server.................................................................................................................................286
Using DHCP Clear Commands.............................................................................................................................. 286
Configure the System to be a Relay Agent................................................................................................................287
Configure the System for User Port Stacking...........................................................................................................289
Configure Secure DHCP...............................................................................................................................................289
Option 82..................................................................................................................................................................289
DHCP Snooping.......................................................................................................................................................290
Drop DHCP Packets on Snooped VLANs Only.................................................................................................... 291
Dynamic ARP Inspection........................................................................................................................................ 292
Source Address Validation......................................................................................................................................294
Viewing the Number of SAV Dropped Packets.........................................................................................................295
Clearing the Number of SAV Dropped Packets........................................................................................................ 296
15 Equal Cost Multi-Path (ECMP)................................................................................................................297
ECMP for Flow-Based Affinity.................................................................................................................................... 297
Configuring the Hash Algorithm.................................................................................................................................. 297
Enabling Deterministic ECMP Next Hop.................................................................................................................... 297
Configuring the Hash Algorithm Seed........................................................................................................................ 298
Link Bundle Monitoring................................................................................................................................................. 298
Managing ECMP Group Paths.................................................................................................................................... 298
Creating an ECMP Group Bundle................................................................................................................................299
Modifying the ECMP Group Threshold...................................................................................................................... 299
16 Fabric Services......................................................................................................................................... 301
Configuring Switch Mode to Fabric Services............................................................................................................ 302
Name Server.................................................................................................................................................................. 302
Link State Database...................................................................................................................................................... 303
Inter Switch Link (ISL)............................................................................................................................................303
Principal Switch Selection and Domain ID Assignment...................................................................................... 304
Route Table.............................................................................................................................................................. 304
Zoning............................................................................................................................................................................. 304
Creating Zone and Adding Members.................................................................................................................... 304
Creating Zone Alias and Adding Members...........................................................................................................305
Creating Zonesets...................................................................................................................................................305
Activating a Zoneset...............................................................................................................................................305
Zone Merge (within ISL)........................................................................................................................................ 306
Configuring Fabric Parameters..............................................................................................................................306
Displaying the Fabric Parameters..........................................................................................................................307
17 FCoE Transit............................................................................................................................................. 312
Fibre Channel over Ethernet.........................................................................................................................................312
Ensure Robustness in a Converged Ethernet Network............................................................................................ 312
FIP Snooping on Ethernet Bridges...............................................................................................................................314
FIP Snooping in a Switch Stack................................................................................................................................... 316
Using FIP Snooping........................................................................................................................................................316
Enable the FCoE Transit Feature...........................................................................................................................316
Contents
11
FIP Snooping Prerequisites..................................................................................................................................... 317
Important Points to Remember..............................................................................................................................317
Enabling the FCoE Transit Feature........................................................................................................................318
Enable FIP Snooping on VLANs..............................................................................................................................318
Configure the FC-MAP Value.................................................................................................................................318
Configure a Port for a Bridge-to-Bridge Link....................................................................................................... 319
Configure a Port for a Bridge-to-FCF Link...........................................................................................................319
Impact on Other Software Features......................................................................................................................319
FIP Snooping on an NPIV Proxy Gateway........................................................................................................... 320
FIP Snooping in an S5000 Stack...........................................................................................................................320
Impact on Other Software Features.....................................................................................................................320
FIP Snooping Restrictions...................................................................................................................................... 320
Configuring FIP Snooping........................................................................................................................................321
Displaying FIP Snooping Information.....................................................................................................................322
FCoE Transit Configuration Example.......................................................................................................................... 327
18 FIPS Cryptography...................................................................................................................................329
Configuration Tasks...................................................................................................................................................... 329
Preparing the System................................................................................................................................................... 329
Enabling FIPS Mode......................................................................................................................................................330
Generating Host-Keys.................................................................................................................................................. 330
Monitoring FIPS Mode Status..................................................................................................................................... 330
Disabling FIPS Mode...................................................................................................................................................... 331
19 Fibre Channel Interface............................................................................................................................332
Configure Fibre Channel Interfaces............................................................................................................................ 332
Enabling Fibre Channel Capability................................................................................................................................332
Configuring Fibre Channel Interfaces......................................................................................................................... 333
Displaying Fibre Channel Information..........................................................................................................................333
Troubleshooting Fibre Channel Operation..................................................................................................................336
Configuring the Fibre Channel Port Group in Passthrough Ethernet Mode..........................................................337
Displaying Fibre Channel Port Group Mode Information..........................................................................................338
20 Force10 Resilient Ring Protocol (FRRP)..................................................................................................339
Protocol Overview.........................................................................................................................................................339
Ring Status................................................................................................................................................................341
Multiple FRRP Rings................................................................................................................................................ 341
Important FRRP Points...........................................................................................................................................342
Important FRRP Concepts.....................................................................................................................................343
Implementing FRRP.......................................................................................................................................................344
FRRP Configuration...................................................................................................................................................... 344
Creating the FRRP Group...................................................................................................................................... 344
Configuring the Control VLAN...............................................................................................................................345
Configuring and Adding the Member VLANs.......................................................................................................346
Setting the FRRP Timers........................................................................................................................................347
Clearing the FRRP Counters..................................................................................................................................347
12
Contents
Viewing the FRRP Configuration...........................................................................................................................347
Viewing the FRRP Information...............................................................................................................................347
Troubleshooting FRRP..................................................................................................................................................348
Configuration Checks..............................................................................................................................................348
Sample Configuration and Topology........................................................................................................................... 348
FRRP Support on VLT..................................................................................................................................................350
Example Scenario.....................................................................................................................................................351
Important Points to Remember.............................................................................................................................352
21 GARP VLAN Registration Protocol (GVRP)............................................................................................. 353
Important Points to Remember...................................................................................................................................353
Configure GVRP............................................................................................................................................................ 353
Related Configuration Tasks..................................................................................................................................354
Enabling GVRP Globally................................................................................................................................................ 354
Enabling GVRP on a Layer 2 Interface....................................................................................................................... 355
Configure GVRP Registration......................................................................................................................................355
Configure a GARP Timer..............................................................................................................................................356
22 High Availability (HA)...............................................................................................................................357
High Availability on Stacks............................................................................................................................................357
Hitless Behavior............................................................................................................................................................. 357
Graceful Restart............................................................................................................................................................ 358
Software Resiliency.......................................................................................................................................................358
System Health Monitoring......................................................................................................................................358
Failure and Event Logging......................................................................................................................................358
Trace Log..................................................................................................................................................................358
Core Dumps............................................................................................................................................................. 358
System Log.............................................................................................................................................................. 359
Hot-Lock Behavior........................................................................................................................................................ 359
Component Redundancy..............................................................................................................................................359
Automatic and Manual Stack Unit Failover..........................................................................................................359
Synchronization between Management and Standby Units............................................................................. 360
Forcing a Stack Unit Failover.................................................................................................................................360
Specifying an Auto-Failover Limit..........................................................................................................................360
Disabling Auto-Reboot.............................................................................................................................................361
Manually Synchronizing Management and Standby Units..................................................................................361
23 Internet Group Management Protocol (IGMP)........................................................................................ 362
IGMP Implementation Information.............................................................................................................................. 362
IGMP Protocol Overview..............................................................................................................................................362
IGMP Version 2........................................................................................................................................................362
Join a Multicast Group............................................................................................................................................363
Leaving a Multicast Group......................................................................................................................................363
IGMP Version 3........................................................................................................................................................364
Configure IGMP............................................................................................................................................................. 367
Related Configuration Tasks.................................................................................................................................. 367
Contents
13
Viewing IGMP Enabled Interfaces...............................................................................................................................368
Selecting an IGMP Version...........................................................................................................................................368
Viewing IGMP Groups...................................................................................................................................................368
Adjusting Timers............................................................................................................................................................ 369
Adjusting Query and Response Timers.................................................................................................................369
Enabling IGMP Immediate-Leave................................................................................................................................ 370
IGMP Snooping..............................................................................................................................................................370
IGMP Snooping Implementation Information.......................................................................................................370
Configuring IGMP Snooping...................................................................................................................................370
Removing a Group-Port Association......................................................................................................................371
Enabling IGMP Immediate-Leave........................................................................................................................... 371
Disabling Multicast Flooding................................................................................................................................... 372
Specifying a Port as Connected to a Multicast Router...................................................................................... 372
Configuring the Switch as Querier........................................................................................................................ 372
Fast Convergence after MSTP Topology Changes.................................................................................................. 373
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................373
Protocol Separation.................................................................................................................................................374
Enabling and Disabling Management Egress Interface Selection......................................................................375
Handling of Management Route Configuration...................................................................................................375
Handling of Switch-Initiated Traffic...................................................................................................................... 376
Handling of Switch-Destined Traffic.....................................................................................................................377
Handling of Transit Traffic (Traffic Separation).................................................................................................. 377
Mapping of Management Applications and Traffic Type....................................................................................377
Behavior of Various Applications for Switch-Initiated Traffic ...........................................................................378
Behavior of Various Applications for Switch-Destined Traffic ......................................................................... 379
Interworking of EIS With Various Applications.................................................................................................... 380
Designating a Multicast Router Interface....................................................................................................................381
24 Interfaces................................................................................................................................................ 382
Basic Interface Configuration.......................................................................................................................................382
Advanced Interface Configuration.............................................................................................................................. 382
Interface Types..............................................................................................................................................................383
View Basic Interface Information.................................................................................................................................383
Resetting an Interface to its Factory Default State..................................................................................................385
Enabling Energy Efficient Ethernet.............................................................................................................................386
View EEE Information................................................................................................................................................... 386
Clear EEE Counters.......................................................................................................................................................390
Enabling a Physical Interface........................................................................................................................................ 391
Physical Interfaces......................................................................................................................................................... 391
Configuration Task List for Physical Interfaces...................................................................................................392
Overview of Layer Modes...................................................................................................................................... 392
Configuring Layer 2 (Data Link) Mode................................................................................................................. 392
Configuring Layer 2 (Interface) Mode..................................................................................................................393
Configuring Layer 3 (Network) Mode.................................................................................................................. 393
Configuring Layer 3 (Interface) Mode..................................................................................................................394
Egress Interface Selection (EIS)................................................................................................................................. 394
14
Contents
Important Points to Remember.............................................................................................................................394
Configuring EIS........................................................................................................................................................395
Management Interfaces............................................................................................................................................... 395
Configuring Management Interfaces.................................................................................................................... 395
Configuring a Management Interface on an Ethernet Port............................................................................... 397
VLAN Interfaces.............................................................................................................................................................397
Loopback Interfaces......................................................................................................................................................398
Null Interfaces................................................................................................................................................................399
Port Channel Interfaces................................................................................................................................................399
Port Channel Definition and Standards................................................................................................................ 399
Port Channel Benefits.............................................................................................................................................399
Port Channel Implementation................................................................................................................................ 399
Interfaces in Port Channels....................................................................................................................................400
Configuration Tasks for Port Channel Interfaces................................................................................................400
Creating a Port Channel..........................................................................................................................................401
Adding a Physical Interface to a Port Channel.....................................................................................................401
Reassigning an Interface to a New Port Channel............................................................................................... 403
Configuring the Minimum Oper Up Links in a Port Channel.............................................................................. 403
Adding or Removing a Port Channel from a VLAN.............................................................................................404
Assigning an IP Address to a Port Channel..........................................................................................................405
Deleting or Disabling a Port Channel.....................................................................................................................405
Load Balancing Through Port Channels............................................................................................................... 405
Changing the Hash Algorithm................................................................................................................................406
Bulk Configuration......................................................................................................................................................... 407
Interface Range....................................................................................................................................................... 407
Bulk Configuration Examples..................................................................................................................................407
Defining Interface Range Macros................................................................................................................................409
Define the Interface Range....................................................................................................................................409
Choosing an Interface-Range Macro....................................................................................................................409
Monitoring and Maintaining Interfaces.......................................................................................................................409
Maintenance Using TDR..........................................................................................................................................410
Splitting QSFP Ports to SFP+ Ports............................................................................................................................ 411
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port.................................................................................. 412
Important Points to Remember..............................................................................................................................412
Example Scenarios................................................................................................................................................... 412
Configuring wavelength for 10–Gigabit SFP+ optics................................................................................................416
Link Dampening.............................................................................................................................................................. 416
Important Points to Remember..............................................................................................................................417
Enabling Link Dampening.........................................................................................................................................417
Link Bundle Monitoring..................................................................................................................................................418
Using Ethernet Pause Frames for Flow Control........................................................................................................ 419
Enabling Pause Frames...........................................................................................................................................420
Configure the MTU Size on an Interface................................................................................................................... 420
Port-Pipes....................................................................................................................................................................... 421
Auto-Negotiation on Ethernet Interfaces................................................................................................................... 421
Contents
15
Setting the Speed of Ethernet Interfaces.............................................................................................................421
Set Auto-Negotiation Options............................................................................................................................... 423
View Advanced Interface Information........................................................................................................................ 423
Configuring the Interface Sampling Size.............................................................................................................. 424
Configuring the Traffic Sampling Size Globally..........................................................................................................425
Dynamic Counters......................................................................................................................................................... 426
Clearing Interface Counters................................................................................................................................... 427
25 Internet Protocol Security (IPSec)..........................................................................................................428
Configuring IPSec .........................................................................................................................................................428
26 IPv4 Routing............................................................................................................................................430
IP Addresses................................................................................................................................................................... 431
Implementation Information.................................................................................................................................... 431
Configuration Tasks for IP Addresses......................................................................................................................... 431
Assigning IP Addresses to an Interface....................................................................................................................... 431
Configuring Static Routes............................................................................................................................................ 432
Configure Static Routes for the Management Interface......................................................................................... 433
IPv4 Path MTU Discovery Overview.......................................................................................................................... 434
Using the Configured Source IP Address in ICMP Messages................................................................................. 434
Configuring the ICMP Source Interface...............................................................................................................434
Configuring the Duration to Establish a TCP Connection........................................................................................435
Enabling Directed Broadcast........................................................................................................................................435
Resolution of Host Names............................................................................................................................................435
Enabling Dynamic Resolution of Host Names............................................................................................................436
Specifying the Local System Domain and a List of Domains...................................................................................436
Configuring DNS with Traceroute...............................................................................................................................437
ARP..................................................................................................................................................................................437
Configuration Tasks for ARP........................................................................................................................................438
Configuring Static ARP Entries....................................................................................................................................438
Enabling Proxy ARP.......................................................................................................................................................438
Clearing ARP Cache......................................................................................................................................................439
ARP Learning via Gratuitous ARP............................................................................................................................... 439
Enabling ARP Learning via Gratuitous ARP............................................................................................................... 439
ARP Learning via ARP Request...................................................................................................................................439
Configuring ARP Retries...............................................................................................................................................440
ICMP................................................................................................................................................................................ 441
Configuration Tasks for ICMP...................................................................................................................................... 441
Enabling ICMP Unreachable Messages.......................................................................................................................441
UDP Helper..................................................................................................................................................................... 441
Configure UDP Helper............................................................................................................................................. 441
Important Points to Remember............................................................................................................................. 442
Enabling UDP Helper.....................................................................................................................................................442
Configuring a Broadcast Address................................................................................................................................442
Configurations Using UDP Helper............................................................................................................................... 443
UDP Helper with Broadcast-All Addresses................................................................................................................ 443
16
Contents
UDP Helper with Subnet Broadcast Addresses........................................................................................................ 444
UDP Helper with Configured Broadcast Addresses..................................................................................................444
UDP Helper with No Configured Broadcast Addresses........................................................................................... 445
Troubleshooting UDP Helper....................................................................................................................................... 445
27 IPv6 Routing............................................................................................................................................446
Protocol Overview.........................................................................................................................................................446
Extended Address Space........................................................................................................................................446
Stateless Autoconfiguration...................................................................................................................................446
IPv6 Headers............................................................................................................................................................447
IPv6 Header Fields...................................................................................................................................................447
Extension Header Fields......................................................................................................................................... 449
Addressing................................................................................................................................................................450
Implementing IPv6 with Dell Networking OS..............................................................................................................451
ICMPv6......................................................................................................................................................................451
Path MTU Discovery................................................................................................................................................451
IPv6 Neighbor Discovery........................................................................................................................................452
Secure Shell (SSH) Over an IPv6 Transport....................................................................................................... 453
Configuration Tasks for IPv6....................................................................................................................................... 453
Adjusting Your CAM-Profile................................................................................................................................... 454
Assigning an IPv6 Address to an Interface...........................................................................................................454
Assigning a Static IPv6 Route................................................................................................................................455
Configuring Telnet with IPv6................................................................................................................................. 455
SNMP over IPv6......................................................................................................................................................456
Showing IPv6 Information......................................................................................................................................456
Showing an IPv6 Interface.....................................................................................................................................456
Showing IPv6 Routes..............................................................................................................................................457
Showing the Running-Configuration for an Interface........................................................................................ 458
Clearing IPv6 Routes...............................................................................................................................................459
Configuring IPv6 RA Guard..........................................................................................................................................459
Configuring IPv6 RA Guard on an Interface......................................................................................................... 461
Monitoring IPv6 RA Guard......................................................................................................................................461
28 iSCSI Optimization.................................................................................................................................. 463
iSCSI Optimization Overview.......................................................................................................................................463
Monitoring iSCSI Traffic Flows..............................................................................................................................464
Application of Quality of Service to iSCSI Traffic Flows.................................................................................... 464
Information Monitored in iSCSI Traffic Flows......................................................................................................465
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................... 465
Configuring Detection and Ports for Dell Compellent Arrays............................................................................ 466
Enable and Disable iSCSI Optimization.................................................................................................................466
Default iSCSI Optimization Values...............................................................................................................................467
iSCSI Optimization Prerequisites................................................................................................................................. 467
Configuring iSCSI Optimization....................................................................................................................................467
Displaying iSCSI Optimization Information................................................................................................................. 469
Contents
17
29 Intermediate System to Intermediate System.......................................................................................... 471
IS-IS Protocol Overview................................................................................................................................................ 471
IS-IS Addressing..............................................................................................................................................................471
Multi-Topology IS-IS......................................................................................................................................................472
Transition Mode....................................................................................................................................................... 472
Interface Support.....................................................................................................................................................473
Adjacencies...............................................................................................................................................................473
Graceful Restart.............................................................................................................................................................473
Timers........................................................................................................................................................................473
Implementation Information..........................................................................................................................................474
Configuration Information.............................................................................................................................................474
Configuration Tasks for IS-IS.................................................................................................................................475
Configuring the Distance of a Route.....................................................................................................................482
Changing the IS-Type............................................................................................................................................. 483
IS-IS Metric Styles.........................................................................................................................................................487
Configure Metric Values...............................................................................................................................................488
Maximum Values in the Routing Table..................................................................................................................488
Change the IS-IS Metric Style in One Level Only................................................................................................488
Leaks from One Level to Another......................................................................................................................... 490
Sample Configurations..................................................................................................................................................490
30 Link Aggregation Control Protocol (LACP)..............................................................................................493
Introduction to Dynamic LAGs and LACP.................................................................................................................. 493
Important Points to Remember.............................................................................................................................493
LACP Modes............................................................................................................................................................ 494
Configuring LACP Commands...............................................................................................................................494
LACP Configuration Tasks........................................................................................................................................... 495
Creating a LAG........................................................................................................................................................ 495
Configuring the LAG Interfaces as Dynamic........................................................................................................495
Setting the LACP Long Timeout........................................................................................................................... 496
Monitoring and Debugging LACP..........................................................................................................................496
Shared LAG State Tracking..........................................................................................................................................497
Configuring Shared LAG State Tracking.............................................................................................................. 497
Important Points about Shared LAG State Tracking..........................................................................................498
LACP Basic Configuration Example............................................................................................................................ 499
Configure a LAG on ALPHA...................................................................................................................................499
31 Layer 2..................................................................................................................................................... 507
Manage the MAC Address Table.................................................................................................................................507
Clearing the MAC Address Table.......................................................................................................................... 507
Setting the Aging Time for Dynamic Entries........................................................................................................507
Configuring a Static MAC Address....................................................................................................................... 508
Displaying the MAC Address Table.......................................................................................................................508
MAC Learning Limit.......................................................................................................................................................508
mac learning-limit Dynamic.................................................................................................................................... 509
18
Contents
mac learning-limit mac-address-sticky.................................................................................................................509
mac learning-limit station-move............................................................................................................................509
Learning Limit Violation Actions............................................................................................................................ 509
Setting Station Move Violation Actions................................................................................................................ 510
Recovering from Learning Limit and Station Move Violations........................................................................... 510
Disabling MAC Address Learning on the System..................................................................................................511
NIC Teaming....................................................................................................................................................................511
Configure Redundant Pairs...........................................................................................................................................512
Important Points about Configuring Redundant Pairs........................................................................................ 514
Far-End Failure Detection............................................................................................................................................. 515
FEFD State Changes............................................................................................................................................... 516
Configuring FEFD..................................................................................................................................................... 517
Enabling FEFD on an Interface............................................................................................................................... 517
Debugging FEFD...................................................................................................................................................... 518
32 Link Layer Discovery Protocol (LLDP).....................................................................................................520
802.1AB (LLDP) Overview...........................................................................................................................................520
Protocol Data Units.................................................................................................................................................520
Optional TLVs................................................................................................................................................................. 521
Management TLVs...................................................................................................................................................521
TIA-1057 (LLDP-MED) Overview......................................................................................................................... 523
Configure LLDP..............................................................................................................................................................527
Related Configuration Tasks.................................................................................................................................. 527
Important Points to Remember............................................................................................................................. 527
LLDP Compatibility..................................................................................................................................................528
CONFIGURATION versus INTERFACE Configurations..................................................................................... 528
Enabling LLDP..........................................................................................................................................................528
Disabling and Undoing LLDP..................................................................................................................................529
Enabling LLDP on Management Ports........................................................................................................................529
Disabling and Undoing LLDP on Management Ports..........................................................................................529
Advertising TLVs........................................................................................................................................................... 529
Viewing the LLDP Configuration.................................................................................................................................530
Viewing Information Advertised by Adjacent LLDP Agents......................................................................................531
Configuring LLDPDU Intervals.....................................................................................................................................532
Configuring Transmit and Receive Mode...................................................................................................................532
Configuring a Time to Live........................................................................................................................................... 533
Debugging LLDP............................................................................................................................................................534
Relevant Management Objects...................................................................................................................................535
33 Microsoft Network Load Balancing..........................................................................................................540
NLB Unicast Mode Scenario........................................................................................................................................540
NLB Multicast Mode Scenario.....................................................................................................................................540
Limitations of the NLB Feature.................................................................................................................................... 541
Microsoft Clustering...................................................................................................................................................... 541
Enable and Disable VLAN Flooding ............................................................................................................................. 541
Configuring a Switch for NLB ..................................................................................................................................... 541
Contents
19
Enabling a Switch for Multicast NLB.................................................................................................................... 542
34 Multicast Source Discovery Protocol (MSDP).........................................................................................543
Protocol Overview.........................................................................................................................................................543
Anycast RP.....................................................................................................................................................................544
Implementation Information......................................................................................................................................... 545
Configure Multicast Source Discovery Protocol....................................................................................................... 545
Related Configuration Tasks........................................................................................................................................545
Enable MSDP.................................................................................................................................................................549
Manage the Source-Active Cache..............................................................................................................................550
Viewing the Source-Active Cache........................................................................................................................550
Limiting the Source-Active Cache........................................................................................................................ 550
Clearing the Source-Active Cache........................................................................................................................ 551
Enabling the Rejected Source-Active Cache....................................................................................................... 551
Accept Source-Active Messages that Fail the RFP Check......................................................................................551
Specifying Source-Active Messages.......................................................................................................................... 555
Limiting the Source-Active Messages from a Peer.................................................................................................. 556
Preventing MSDP from Caching a Local Source......................................................................................................556
Preventing MSDP from Caching a Remote Source..................................................................................................557
Preventing MSDP from Advertising a Local Source.................................................................................................557
Logging Changes in Peership States.......................................................................................................................... 558
Terminating a Peership.................................................................................................................................................558
Clearing Peer Statistics................................................................................................................................................ 559
Debugging MSDP..........................................................................................................................................................559
Configuring Anycast RP............................................................................................................................................... 560
Reducing Source-Active Message Flooding........................................................................................................560
Specifying the RP Address Used in SA Messages..............................................................................................560
MSDP Sample Configurations..................................................................................................................................... 563
35 Multiple Spanning Tree Protocol (MSTP)............................................................................................... 566
Protocol Overview........................................................................................................................................................ 566
Configure Multiple Spanning Tree Protocol...............................................................................................................567
Related Configuration Tasks.................................................................................................................................. 567
Enable Multiple Spanning Tree Globally......................................................................................................................567
Adding and Removing Interfaces................................................................................................................................ 568
Creating Multiple Spanning Tree Instances............................................................................................................... 568
Influencing MSTP Root Selection............................................................................................................................... 569
Interoperate with Non-Dell Networking OS Bridges.................................................................................................570
Modifying Global Parameters.......................................................................................................................................570
Modifying the Interface Parameters............................................................................................................................571
Configuring an EdgePort.............................................................................................................................................. 572
Configuring Fast Hellos for Link State Detection......................................................................................................573
Flush MAC Addresses after a Topology Change.......................................................................................................573
MSTP Sample Configurations......................................................................................................................................573
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration.......................................................................................574
20
Contents
/