Force10 MXL Blade

Dell Force10 MXL Blade Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell Force10 MXL Blade Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Networking Conguration Guide for the MXL
10/40GbE Switch I/O Module
9.14.1.5
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2019 - 05
Rev. A00
Contents
1 About this Guide...........................................................................................................................................33
Audience............................................................................................................................................................................33
Conventions......................................................................................................................................................................33
Information Symbols........................................................................................................................................................33
Related Documents......................................................................................................................................................... 34
2 Conguration Fundamentals........................................................................................................................ 35
Accessing the Command Line........................................................................................................................................35
CLI Modes.........................................................................................................................................................................35
Navigating CLI Modes............................................................................................................................................... 36
The do Command............................................................................................................................................................ 39
Undoing Commands........................................................................................................................................................ 39
Obtaining Help..................................................................................................................................................................40
Entering and Editing Commands................................................................................................................................... 40
Command History.............................................................................................................................................................41
Filtering show Command Outputs..................................................................................................................................41
Multiple Users in Conguration Mode...........................................................................................................................42
3 Getting Started............................................................................................................................................44
Console Access................................................................................................................................................................45
Serial Console.............................................................................................................................................................45
External Serial Port with a USB Connector............................................................................................................47
Accessing the CLI Interface and Running Scripts Using SSH.................................................................................... 47
Entering CLI commands Using an SSH Connection..............................................................................................47
Executing Local CLI Scripts Using an SSH Connection........................................................................................47
Boot Process.................................................................................................................................................................... 48
Default Conguration...................................................................................................................................................... 49
Conguring a Host Name............................................................................................................................................... 49
Conguring a Unique Host Name on the System........................................................................................................50
Accessing the System Remotely................................................................................................................................... 50
Accessing the Switch Remotely.............................................................................................................................. 50
Congure the Management Port IP Address.........................................................................................................50
Congure a Management Route...............................................................................................................................51
Conguring a Username and Password...................................................................................................................51
Conguring the Enable Password..................................................................................................................................52
Conguration File Management.....................................................................................................................................52
Copy Files to and from the System......................................................................................................................... 53
Save the Running-Conguration..............................................................................................................................54
Viewing Files...............................................................................................................................................................55
Managing the File System.............................................................................................................................................. 56
View the Command History............................................................................................................................................57
Using HTTP for File Transfers........................................................................................................................................ 58
Contents
3
Upgrading and Downgrading the Dell Networking OS................................................................................................59
Verify Software Images Before Installation...................................................................................................................59
4 Management................................................................................................................................................ 61
Conguring Privilege Levels............................................................................................................................................ 61
Creating a Custom Privilege Level...........................................................................................................................62
Customizing a Privilege Level...................................................................................................................................62
Applying a Privilege Level to a Username............................................................................................................... 64
Applying a Privilege Level to a Terminal Line.......................................................................................................... 64
Conguring Logging........................................................................................................................................................ 64
Audit and Security Logs............................................................................................................................................ 65
Conguring Logging Format ...................................................................................................................................66
Setting Up a Secure Connection to a Syslog Server.............................................................................................67
Display the Logging Buer and the Logging Conguration........................................................................................68
Log Messages in the Internal Buer..............................................................................................................................68
Conguration Task List for System Log Management..........................................................................................69
Disabling System Logging............................................................................................................................................... 69
Sending System Messages to a Syslog Server............................................................................................................69
Conguring a UNIX System as a Syslog Server.....................................................................................................69
Changing System Logging Settings...............................................................................................................................70
Display the Logging Buer and the Logging Conguration.........................................................................................71
Conguring a UNIX Logging Facility Level.....................................................................................................................71
Synchronizing Log Messages......................................................................................................................................... 72
Enabling Timestamp on Syslog Messages.................................................................................................................... 73
Enabling Secure Management Mode.............................................................................................................................74
Enabling Secured CLI Mode........................................................................................................................................... 75
File Transfer Services.......................................................................................................................................................75
Conguration Task List for File Transfer Services..................................................................................................75
Enabling the FTP Server...........................................................................................................................................75
Conguring FTP Server Parameters....................................................................................................................... 75
Conguring FTP Client Parameters......................................................................................................................... 76
Terminal Lines................................................................................................................................................................... 76
Denying and Permitting Access to a Terminal Line................................................................................................ 77
Conguring Login Authentication for Terminal Lines............................................................................................. 77
Setting Time Out of EXEC Privilege Mode...................................................................................................................78
Using Telnet to get to Another Network Device..........................................................................................................79
Lock CONFIGURATION Mode....................................................................................................................................... 79
Viewing the Conguration Lock Status...................................................................................................................80
Limit Concurrent Login Sessions....................................................................................................................................80
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 80
Conguring Concurrent Session Limit.....................................................................................................................80
Enabling the System to Clear Existing Sessions.....................................................................................................81
Track Login Activity..........................................................................................................................................................82
Restrictions for Tracking Login Activity...................................................................................................................82
Conguring Login Activity Tracking......................................................................................................................... 82
Display Login Statistics..............................................................................................................................................82
4
Contents
Recovering from a Forgotten Password....................................................................................................................... 84
Recovering from a Forgotten Enable Password.......................................................................................................... 85
Recovering from a Failed Start...................................................................................................................................... 85
Viewing the Reason for Last System Reboot.............................................................................................................. 86
5 802.1X..........................................................................................................................................................87
The Port-Authentication Process.................................................................................................................................. 90
EAP over RADIUS.......................................................................................................................................................91
Conguring 802.1X........................................................................................................................................................... 91
Related Conguration Tasks......................................................................................................................................91
Important Points to Remember......................................................................................................................................92
Enabling 802.1X................................................................................................................................................................ 92
Conguring Request Identity Re-Transmissions.....................................................................................................93
Conguring a Quiet Period after a Failed Authentication..................................................................................... 94
Conguring dot1x Prole ................................................................................................................................................95
Conguring MAC addresses for a do1x Prole.............................................................................................................95
Conguring the Static MAB and MAB Prole .............................................................................................................96
Conguring Critical VLAN ..............................................................................................................................................96
Forcibly Authorizing or Unauthorizing a Port................................................................................................................97
Re-Authenticating a Port................................................................................................................................................98
Conguring Timeouts......................................................................................................................................................99
Conguring Dynamic VLAN Assignment with Port Authentication.........................................................................100
Guest and Authentication-Fail VLANs....................................................................................................................101
Conguring a Guest VLAN......................................................................................................................................102
Conguring an Authentication-Fail VLAN............................................................................................................. 102
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 104
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 104
Guidelines for Conguring ACL VLAN groups............................................................................................................105
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................106
Conguring ACL VLAN Groups.............................................................................................................................. 106
Conguring FP Blocks for VLAN Parameters....................................................................................................... 107
Viewing CAM Usage.......................................................................................................................................................107
Allocating FP Blocks for VLAN Processes.................................................................................................................. 109
7 Access Control Lists (ACLs)........................................................................................................................110
IP Access Control Lists (ACLs)...................................................................................................................................... 111
Implementing ACL on the Dell Networking OS............................................................................................................ 111
ACLs and VLANs.............................................................................................................................................................112
ACL Optimization............................................................................................................................................................ 112
Determine the Order in which ACLs are Used to Classify Trac..............................................................................112
Example of the order Keyword to Determine ACL Sequence..............................................................................112
IP Fragment Handling..................................................................................................................................................... 113
IP Fragments ACL Examples..........................................................................................................................................113
Layer 4 ACL Rules Examples......................................................................................................................................... 113
Congure a Standard IP ACL.........................................................................................................................................114
Contents
5
Conguring a Standard IP ACL Filter............................................................................................................................115
Congure an Extended IP ACL......................................................................................................................................116
Conguring Filters with a Sequence Number..............................................................................................................116
Conguring Filters Without a Sequence Number....................................................................................................... 116
Established Flag...............................................................................................................................................................117
Congure Layer 2 and Layer 3 ACLs.............................................................................................................................117
Assign an IP ACL to an Interface...................................................................................................................................118
Applying an IP ACL..........................................................................................................................................................118
Counting ACL Hits.......................................................................................................................................................... 119
Congure Ingress ACLs.................................................................................................................................................. 119
Congure Egress ACLs...................................................................................................................................................119
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................................................... 120
IP Prex Lists.................................................................................................................................................................. 120
Implementation Information..................................................................................................................................... 121
Conguration Task List for Prex Lists.........................................................................................................................121
Creating a Prex List.......................................................................................................................................................121
Creating a Prex List Without a Sequence Number.................................................................................................. 122
Viewing Prex Lists........................................................................................................................................................ 123
Applying a Prex List for Route Redistribution........................................................................................................... 123
Applying a Filter to a Prex List (OSPF)......................................................................................................................124
ACL Remarks.................................................................................................................................................................. 124
Conguring a Remark.............................................................................................................................................. 125
Deleting a Remark.................................................................................................................................................... 125
ACL Resequencing......................................................................................................................................................... 126
Resequencing an ACL or Prex List.............................................................................................................................126
Route Maps.....................................................................................................................................................................128
Implementation Information.................................................................................................................................... 128
Important Points to Remember.................................................................................................................................... 128
Conguration Task List for Route Maps...................................................................................................................... 128
Creating a Route Map....................................................................................................................................................128
Congure Route Map Filters.........................................................................................................................................130
Conguring Match Routes............................................................................................................................................130
Conguring Set Conditions............................................................................................................................................131
Congure a Route Map for Route Redistribution.......................................................................................................132
Congure a Route Map for Route Tagging..................................................................................................................132
Continue Clause..............................................................................................................................................................133
Logging of ACL Processes............................................................................................................................................ 133
Guidelines for Conguring ACL Logging......................................................................................................................134
Conguring ACL Logging...............................................................................................................................................134
Flow-Based Monitoring Support for ACLs..................................................................................................................135
Behavior of Flow-Based Monitoring.......................................................................................................................135
Enabling Flow-Based Monitoring..................................................................................................................................136
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 138
How BFD Works............................................................................................................................................................. 138
BFD Packet Format..................................................................................................................................................139
6
Contents
BFD Sessions............................................................................................................................................................ 140
BFD Three-Way Handshake.....................................................................................................................................141
Session State Changes............................................................................................................................................143
Important Points to Remember.................................................................................................................................... 143
Congure BFD................................................................................................................................................................ 143
Congure BFD for Physical Ports...........................................................................................................................144
Enabling BFD Globally.............................................................................................................................................. 144
Changing Physical Port Session Parameters........................................................................................................ 145
Disabling and Re-Enabling BFD.............................................................................................................................. 145
Congure BFD for Static Routes..................................................................................................................................146
Related Conguration Tasks....................................................................................................................................146
Establishing Sessions for Static Routes.................................................................................................................146
Establishing Static Route Sessions on Specic Neighbors................................................................................. 147
Changing Static Route Session Parameters......................................................................................................... 148
Disabling BFD for Static Routes............................................................................................................................. 148
Congure BFD for OSPF...............................................................................................................................................148
Related Conguration Tasks....................................................................................................................................149
Establishing Sessions with OSPF Neighbors........................................................................................................ 149
Establishing Sessions with OSPF Neighbors for nondefault VRFs....................................................................150
Changing OSPF Session Parameters......................................................................................................................151
Disabling BFD for OSPF........................................................................................................................................... 151
Congure BFD for OSPFv3............................................................................................................................................151
Related Conguration Tasks....................................................................................................................................152
Establishing Sessions with OSPFv3 Neighbors.................................................................................................... 152
Establishing BFD Sessions with OSPFv3 Neighbors for nondefault VRFs....................................................... 152
Changing OSPFv3 Session Parameters.................................................................................................................153
Disabling BFD for OSPFv3...................................................................................................................................... 154
Congure BFD for BGP................................................................................................................................................. 154
Prerequisites..............................................................................................................................................................154
Establishing Sessions with BGP Neighbors.......................................................................................................... 154
Disabling BFD for BGP.............................................................................................................................................159
Use BFD in a BGP Peer Group............................................................................................................................... 159
Displaying BFD for BGP Information......................................................................................................................159
Congure BFD for VRRP...............................................................................................................................................163
Related Conguration Tasks....................................................................................................................................163
Establishing Sessions with All VRRP Neighbors...................................................................................................164
Establishing VRRP Sessions on VRRP Neighbors................................................................................................164
Changing VRRP Session Parameters.................................................................................................................... 165
Disabling BFD for VRRP.......................................................................................................................................... 165
Congure BFD for VLANs.............................................................................................................................................166
Related Conguration Task..................................................................................................................................... 166
Establish Sessions with VLAN Neighbors..............................................................................................................167
Changing VLAN Session Parameters.....................................................................................................................167
Disabling BFD for VLANs.........................................................................................................................................168
Congure BFD for Port-Channels................................................................................................................................ 168
Contents
7
Related Conguration Tasks....................................................................................................................................168
Establish Sessions on Port-Channels.....................................................................................................................169
Changing Physical Port Session Parameters........................................................................................................ 169
Disabling BFD for Port-Channels............................................................................................................................170
Conguring Protocol Liveness...................................................................................................................................... 170
9 Border Gateway Protocol IPv4 (BGPv4)..................................................................................................... 171
Autonomous Systems (AS)............................................................................................................................................ 171
Sessions and Peers.........................................................................................................................................................173
Establish a Session................................................................................................................................................... 173
Route Reectors............................................................................................................................................................. 174
Communities............................................................................................................................................................. 175
BGP Attributes................................................................................................................................................................175
Best Path Selection Criteria.................................................................................................................................... 175
Weight........................................................................................................................................................................ 177
Local Preference....................................................................................................................................................... 177
Multi-Exit Discriminators (MEDs)...........................................................................................................................178
Origin..........................................................................................................................................................................179
AS Path......................................................................................................................................................................180
Next Hop................................................................................................................................................................... 180
Multiprotocol BGP..........................................................................................................................................................180
Implement BGP with the Dell Networking OS.............................................................................................................181
Additional Path (Add-Path) Support.......................................................................................................................181
Advertise IGP Cost as MED for Redistributed Routes......................................................................................... 181
Ignore Router-ID for Some Best-Path Calculations............................................................................................. 182
Four-Byte AS Numbers............................................................................................................................................182
AS4 Number Representation.................................................................................................................................. 182
AS Number Migration.............................................................................................................................................. 184
BGP4 Management Information Base (MIB)........................................................................................................185
Important Points to Remember.............................................................................................................................. 185
Conguration Information..............................................................................................................................................186
BGP Conguration......................................................................................................................................................... 186
Enabling BGP.............................................................................................................................................................187
Enabling MBGP Congurations.............................................................................................................................. 218
BGP Regular Expression Optimization........................................................................................................................220
Debugging BGP............................................................................................................................................................. 220
Storing Last and Bad PDUs.....................................................................................................................................221
PDU Counters.......................................................................................................................................................... 222
Sample Congurations.................................................................................................................................................. 222
10 Content Addressable Memory (CAM)....................................................................................................... 231
CAM Allocation............................................................................................................................................................... 231
Test CAM Usage............................................................................................................................................................ 232
View CAM-ACL Settings.............................................................................................................................................. 232
Conguring CAM Threshold and Silence Period........................................................................................................233
Setting CAM Threshold and Silence Period......................................................................................................... 233
8
Contents
CAM Optimization......................................................................................................................................................... 234
11 Control Plane Policing (CoPP).................................................................................................................. 235
Congure Control Plane Policing................................................................................................................................. 236
Conguring CoPP for Protocols.............................................................................................................................237
Conguring CoPP for CPU Queues...................................................................................................................... 238
Show Commands.....................................................................................................................................................239
12 Data Center Bridging (DCB)......................................................................................................................241
Ethernet Enhancements in Data Center Bridging...................................................................................................... 241
Priority-Based Flow Control................................................................................................................................... 242
Enhanced Transmission Selection..........................................................................................................................243
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................244
Data Center Bridging in a Trac Flow...................................................................................................................245
Enabling Data Center Bridging..................................................................................................................................... 245
Conguring DCB Maps and its Attributes............................................................................................................ 246
Data Center Bridging: Default Conguration..............................................................................................................249
Interworking of DCB Map With DCB Buer Threshold Settings.............................................................................249
Conguring Priority-Based Flow Control....................................................................................................................250
Conguring Lossless Queues.................................................................................................................................. 251
Conguring the PFC Buer in a Switch Stack.................................................................................................... 252
Priority-Based Flow Control Using Dynamic Buer Method..............................................................................252
Congure Enhanced Transmission Selection..............................................................................................................254
ETS Prerequisites and Restrictions....................................................................................................................... 254
Creating an ETS Priority Group..............................................................................................................................254
ETS Operation with DCBx......................................................................................................................................255
Conguring Bandwidth Allocation for DCBx CIN................................................................................................ 256
Hierarchical Scheduling in ETS Output Policies................................................................................................... 257
Applying DCB Policies with an ETS Conguration.....................................................................................................257
PFC and ETS Conguration Examples........................................................................................................................257
Using PFC and ETS to Manage Data Center Trac...........................................................................................258
Using PFC and ETS to Manage Converged Ethernet Trac in a Switch Stack............................................. 260
Applying DCB Policies in a Switch Stack....................................................................................................................260
Congure a DCBx Operation........................................................................................................................................260
DCBx Operation.......................................................................................................................................................260
DCBx Port Roles.......................................................................................................................................................261
DCB Conguration Exchange................................................................................................................................ 262
Conguration Source Election................................................................................................................................262
Propagation of DCB Information............................................................................................................................263
Auto-Detection and Manual Conguration of the DCBx Version...................................................................... 263
DCBx Example..........................................................................................................................................................264
DCBx Prerequisites and Restrictions.....................................................................................................................265
Conguring DCBx....................................................................................................................................................265
Verifying the DCB Conguration................................................................................................................................. 268
QoS dot1p Trac Classication and Queue Assignment.......................................................................................... 276
Conguring the Dynamic Buer Method....................................................................................................................277
Contents
9
13 Debugging and Diagnostics.......................................................................................................................279
Oine Diagnostics......................................................................................................................................................... 279
Important Points to Remember..............................................................................................................................279
Running Oine Diagnostics................................................................................................................................... 280
Trace Logs.......................................................................................................................................................................282
Auto Save on Crash or Rollover............................................................................................................................. 282
Using the Show Hardware Commands....................................................................................................................... 282
Enabling Environmental Monitoring.............................................................................................................................284
Recognize an Over-Temperature Condition..........................................................................................................285
Troubleshoot an Over-Temperature Condition..................................................................................................... 285
Recognize an Under-Voltage Condition................................................................................................................ 286
Troubleshoot an Under-Voltage Condition............................................................................................................286
Troubleshooting Packet Loss........................................................................................................................................287
Displaying Drop Counters........................................................................................................................................287
Dataplane Statistics.................................................................................................................................................288
Display Stack Port Statistics.................................................................................................................................. 289
Displaying Stack Member Counters...................................................................................................................... 290
Enabling Application Core Dumps.................................................................................................................................291
Mini Core Dumps............................................................................................................................................................ 291
Enabling TCP Dumps.....................................................................................................................................................292
Enabling Buer Statistics Tracking .............................................................................................................................293
14 Dynamic Host Conguration Protocol (DHCP).........................................................................................295
DHCP Packet Format and Options............................................................................................................................. 295
Assign an IP Address using DHCP......................................................................................................................... 297
Implementation Information..........................................................................................................................................297
Congure the System to be a DHCP Server............................................................................................................. 298
Conguring the Server for Automatic Address Allocation..................................................................................298
Conguration Tasks.................................................................................................................................................299
Specifying a Default Gateway................................................................................................................................300
Enabling the DHCP Server.....................................................................................................................................300
Congure a Method of Hostname Resolution...................................................................................................... 301
Creating Manual Binding Entries............................................................................................................................302
Debugging the DHCP Server.................................................................................................................................302
Using DHCP Clear Commands.............................................................................................................................. 302
Congure the System to be a Relay Agent................................................................................................................ 303
Congure the System to be a DHCP Client...............................................................................................................305
Conguring the DHCP Client System...................................................................................................................305
DHCP Client on a Management Interface............................................................................................................308
DHCP Client Operation with Other Features.......................................................................................................309
Conguring DHCP relay source interface....................................................................................................................310
Global DHCP relay source IPv4 or IPv6 conguration ........................................................................................310
Interface level DHCP relay source IPv4 or IPv6 conguration .......................................................................... 310
Congure Secure DHCP................................................................................................................................................312
Option 82...................................................................................................................................................................312
10
Contents
DHCPv6 relay agent options...................................................................................................................................312
DHCP Snooping........................................................................................................................................................313
Conguring the DHCP secondary-subnet.............................................................................................................317
Drop DHCP Packets on Snooped VLANs Only.....................................................................................................317
Dynamic ARP Inspection......................................................................................................................................... 318
Conguring Dynamic ARP Inspection....................................................................................................................319
Source Address Validation...................................................................................................................................... 320
15 Equal Cost Multi-Path (ECMP)................................................................................................................ 322
ECMP for Flow-Based Anity..................................................................................................................................... 322
Enabling Deterministic ECMP Next Hop.............................................................................................................. 322
Link Bundle Monitoring................................................................................................................................................. 322
Managing ECMP Group Paths.....................................................................................................................................323
RTAG7............................................................................................................................................................................. 323
Flow-based Hashing for ECMP....................................................................................................................................324
16 FC FPORT................................................................................................................................................328
FC FPORT...................................................................................................................................................................... 329
Conguring Switch Mode to FCF Port Mode............................................................................................................329
Name Server.................................................................................................................................................................. 330
FCoE Maps......................................................................................................................................................................331
Creating an FCoE Map.................................................................................................................................................. 331
Zoning..............................................................................................................................................................................332
Creating Zone and Adding Members...........................................................................................................................333
Creating Zone Alias and Adding Members..................................................................................................................333
Creating Zonesets..........................................................................................................................................................333
Activating a Zoneset......................................................................................................................................................334
Displaying the Fabric Parameters................................................................................................................................ 334
17 FCoE Transit............................................................................................................................................. 337
Supported Modes.......................................................................................................................................................... 337
Fibre Channel over Ethernet.........................................................................................................................................337
Ensure Robustness in a Converged Ethernet Network............................................................................................ 337
FIP Snooping on Ethernet Bridges.............................................................................................................................. 339
FIP Snooping in a Switch Stack...................................................................................................................................340
Using FIP Snooping........................................................................................................................................................ 341
Important Points to Remember.............................................................................................................................. 341
Enabling the FCoE Transit Feature.........................................................................................................................341
Enable FIP Snooping on VLANs..............................................................................................................................341
Congure the FC-MAP Value................................................................................................................................ 342
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 342
Congure a Port for a Bridge-to-FCF Link...........................................................................................................342
Impact on Other Software Features..................................................................................................................... 342
FIP Snooping Prerequisites.....................................................................................................................................343
FIP Snooping Restrictions...................................................................................................................................... 343
Conguring FIP Snooping.......................................................................................................................................343
Contents
11
Displaying FIP Snooping Information...........................................................................................................................344
FCoE Transit Conguration Example...........................................................................................................................349
18 FIPS Cryptography................................................................................................................................... 351
Preparing the System.................................................................................................................................................... 351
Enabling FIPS Mode.......................................................................................................................................................351
Generating Host-Keys...................................................................................................................................................352
Monitoring FIPS Mode Status......................................................................................................................................352
Disabling FIPS Mode..................................................................................................................................................... 353
19 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 354
Protocol Overview.........................................................................................................................................................354
Ring Status...............................................................................................................................................................355
Multiple FRRP Rings............................................................................................................................................... 356
Important FRRP Points........................................................................................................................................... 357
Important FRRP Concepts.....................................................................................................................................358
Implementing FRRP.......................................................................................................................................................359
FRRP Conguration...................................................................................................................................................... 359
Creating the FRRP Group...................................................................................................................................... 359
Conguring the Control VLAN...............................................................................................................................359
Conguring and Adding the Member VLANs....................................................................................................... 361
Setting the FRRP Timers........................................................................................................................................362
Clearing the FRRP Counters..................................................................................................................................362
Viewing the FRRP Conguration...........................................................................................................................362
Viewing the FRRP Information...............................................................................................................................362
Troubleshooting FRRP.................................................................................................................................................. 363
Conguration Checks..............................................................................................................................................363
Sample Conguration and Topology............................................................................................................................363
FRRP Support on VLT.................................................................................................................................................. 365
Example Scenario.................................................................................................................................................... 366
Important Points to Remember..............................................................................................................................367
20 GARP VLAN Registration Protocol (GVRP)............................................................................................. 368
Important Points to Remember................................................................................................................................... 368
Congure GVRP............................................................................................................................................................ 368
Related Conguration Tasks...................................................................................................................................369
Enabling GVRP Globally................................................................................................................................................ 369
Enabling GVRP on a Layer 2 Interface........................................................................................................................ 370
Congure GVRP Registration.......................................................................................................................................370
Congure a GARP Timer............................................................................................................................................... 371
21 Internet Group Management Protocol (IGMP)..........................................................................................372
IGMP Protocol Overview.............................................................................................................................................. 372
IGMP Version 2........................................................................................................................................................ 372
IGMP Version 3.........................................................................................................................................................374
IGMP Snooping.............................................................................................................................................................. 377
12
Contents
IGMP Snooping Implementation Information........................................................................................................377
Conguring IGMP Snooping...................................................................................................................................378
Enabling IGMP Immediate-Leave...........................................................................................................................378
Disabling Multicast Flooding................................................................................................................................... 379
Specifying a Port as Connected to a Multicast Router.......................................................................................379
Conguring the Switch as Querier.........................................................................................................................379
Fast Convergence after MSTP Topology Changes...................................................................................................380
Designating a Multicast Router Interface................................................................................................................... 380
22 Interfaces................................................................................................................................................. 381
Basic Interface Conguration........................................................................................................................................381
Advanced Interface Conguration................................................................................................................................381
Interface Types...............................................................................................................................................................382
View Basic Interface Information.................................................................................................................................382
Conguring the Default Interface................................................................................................................................ 384
Enabling a Physical Interface........................................................................................................................................385
Physical Interfaces.........................................................................................................................................................385
Conguration Task List for Physical Interfaces....................................................................................................385
Overview of Layer Modes...................................................................................................................................... 386
Conguring Layer 2 (Data Link) Mode..................................................................................................................386
Conguring Layer 2 (Interface) Mode.................................................................................................................. 386
Conguring Layer 3 (Network) Mode................................................................................................................... 387
Conguring Layer 3 (Interface) Mode...................................................................................................................387
Automatic recovery of an Err-disabled interface....................................................................................................... 388
Conguring an automatic recovery for an Err-disabled interface......................................................................389
Management Interfaces................................................................................................................................................389
Conguring Management Interfaces on the Switch...........................................................................................390
VLAN Interfaces............................................................................................................................................................. 391
Loopback Interfaces...................................................................................................................................................... 392
Null Interfaces................................................................................................................................................................ 392
Port Channel Interfaces................................................................................................................................................392
Port Channel Denition and Standards.................................................................................................................393
Port Channel Benets............................................................................................................................................. 393
Port Channel Implementation.................................................................................................................................393
100/1000/10000 Mbps Interfaces in Port Channels...........................................................................................394
Conguration Tasks for Port Channel Interfaces.................................................................................................394
Creating a Port Channel..........................................................................................................................................394
Adding a Physical Interface to a Port Channel.....................................................................................................395
Reassigning an Interface to a New Port Channel................................................................................................396
Conguring the Minimum Oper Up Links in a Port Channel...............................................................................397
Adding or Removing a Port Channel from a VLAN..............................................................................................397
Assigning an IP Address to a Port Channel.......................................................................................................... 398
Deleting or Disabling a Port Channel.....................................................................................................................398
Load Balancing through Port Channels...................................................................................................................... 398
Changing the Hash Algorithm......................................................................................................................................399
Server Ports................................................................................................................................................................... 400
Contents
13
Default Conguration without Start-up Cong................................................................................................... 400
Bulk Conguration......................................................................................................................................................... 400
Interface Range....................................................................................................................................................... 400
Bulk Conguration Examples.................................................................................................................................. 401
Dening Interface Range Macros................................................................................................................................ 402
Dene the Interface Range.................................................................................................................................... 403
Choosing an Interface-Range Macro.................................................................................................................... 403
Monitoring and Maintaining Interfaces....................................................................................................................... 403
Maintenance Using TDR.........................................................................................................................................404
QSFP+ High-Power Optics Usage..............................................................................................................................405
High-Power Optics is Inserted and Peer Port has No OpticsHigh-Power Optics is Inserted and Peer
Port has High / Low Power OpticsLow-Power Optics is Inserted and Peer Port has High-Power Optics.405
Splitting QSFP Ports to SFP+ Ports...........................................................................................................................405
Merging SFP+ Ports to QSFP 40G Ports............................................................................................................ 406
Congure the MTU Size on an Interface..............................................................................................................406
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................407
Important Points to Remember..............................................................................................................................407
Example Scenarios...................................................................................................................................................407
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................408
Layer 2 Flow Control Using Ethernet Pause Frames................................................................................................ 408
Enabling Pause Frames...........................................................................................................................................409
Congure MTU Size on an Interface...........................................................................................................................409
Port-Pipes....................................................................................................................................................................... 410
Auto-Negotiation on Ethernet Interfaces....................................................................................................................410
Setting the Speed and Duplex Mode of Ethernet Interfaces............................................................................. 410
View Advanced Interface Information..........................................................................................................................412
Conguring the Interface Sampling Size............................................................................................................... 413
Conguring the Trac Sampling Size Globally..................................................................................................... 414
Dynamic Counters.................................................................................................................................................... 415
Enhanced Control of Remote Fault Indication Processing........................................................................................416
Assigning a Front-end Port to a Management VRF...................................................................................................417
23 Internet Protocol Security (IPSec)........................................................................................................... 418
Conguring IPSec ..........................................................................................................................................................418
24 IPv4 Routing............................................................................................................................................ 420
IP Addresses...................................................................................................................................................................420
Implementation Information.................................................................................................................................... 421
Conguration Tasks for IP Addresses.................................................................................................................... 421
IPv4 Path MTU Discovery Overview...........................................................................................................................423
Packet handling during MTU mismatch ...............................................................................................................424
Using the Congured Source IP Address in ICMP Messages..................................................................................424
Conguring the ICMP Source Interface................................................................................................................424
Conguring the Duration to Establish a TCP Connection........................................................................................ 425
Enabling Directed Broadcast........................................................................................................................................ 425
Resolution of Host Names............................................................................................................................................425
14
Contents
Enabling Dynamic Resolution of Host Names......................................................................................................426
Specifying the Local System Domain and a List of Domains............................................................................. 426
Conguring DNS with Traceroute..........................................................................................................................427
ARP..................................................................................................................................................................................427
Conguration Tasks for ARP.................................................................................................................................. 428
ARP Learning via Gratuitous ARP................................................................................................................................429
ARP Learning via ARP Request................................................................................................................................... 429
Conguring ARP Retries...............................................................................................................................................430
ICMP................................................................................................................................................................................ 431
Conguration Tasks for ICMP.................................................................................................................................431
ICMP Redirects...............................................................................................................................................................431
UDP Helper.....................................................................................................................................................................432
Congure UDP Helper.............................................................................................................................................432
Important Points to Remember..............................................................................................................................433
Enabling UDP Helper...............................................................................................................................................433
Congurations Using UDP Helper............................................................................................................................... 433
UDP Helper with Broadcast-All Addresses...........................................................................................................434
UDP Helper with Subnet Broadcast Addresses...................................................................................................434
UDP Helper with Congured Broadcast Addresses............................................................................................435
UDP Helper with No Congured Broadcast Addresses......................................................................................435
Troubleshooting UDP Helper........................................................................................................................................436
25 IPv6 Addressing....................................................................................................................................... 437
Protocol Overview......................................................................................................................................................... 437
Extended Address Space........................................................................................................................................438
Stateless Autoconguration................................................................................................................................... 438
IPv6 Header Fields.........................................................................................................................................................439
Version (4 bits).........................................................................................................................................................439
Trac Class (8 bits).................................................................................................................................................439
Flow Label (20 bits).................................................................................................................................................439
Payload Length (16 bits)......................................................................................................................................... 439
Next Header (8 bits)............................................................................................................................................... 440
Hop Limit (8 bits).....................................................................................................................................................440
Source Address (128 bits)....................................................................................................................................... 441
Destination Address (128 bits)................................................................................................................................ 441
Extension Header Fields................................................................................................................................................ 441
Hop-by-Hop Options Header..................................................................................................................................441
Addressing...................................................................................................................................................................... 442
Link-local Addresses................................................................................................................................................442
Static and Dynamic Addressing..............................................................................................................................442
Implementing IPv6 with the Dell Networking OS...................................................................................................... 443
ICMPv6...........................................................................................................................................................................444
Path MTU Discovery.....................................................................................................................................................445
IPv6 Neighbor Discovery..............................................................................................................................................445
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................446
Conguring the IPv6 Recursive DNS Server....................................................................................................... 446
Contents
15
Debugging IPv6 RDNSS Information Sent to the Host ..................................................................................... 447
Displaying IPv6 RDNSS Information......................................................................................................................447
IPv6 Multicast................................................................................................................................................................ 447
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 448
Conguration Task List for IPv6...................................................................................................................................448
Adjusting Your CAM-Prole....................................................................................................................................448
Assigning an IPv6 Address to an Interface...........................................................................................................449
Assigning a Static IPv6 Route................................................................................................................................449
Conguring Telnet with IPv6..................................................................................................................................450
SNMP over IPv6......................................................................................................................................................450
Showing IPv6 Information...................................................................................................................................... 450
Showing an IPv6 Interface...................................................................................................................................... 451
Showing IPv6 Routes...............................................................................................................................................451
Showing the Running-Conguration for an Interface......................................................................................... 452
Clearing IPv6 Routes...............................................................................................................................................453
Disabling ND Entry Timeout................................................................................................................................... 453
26 iSCSI Optimization.................................................................................................................................. 454
iSCSI Optimization Overview....................................................................................................................................... 454
Monitoring iSCSI Trac Flows...............................................................................................................................456
Information Monitored in iSCSI Trac Flows.......................................................................................................456
Detection and Auto-Conguration for Dell EqualLogic Arrays...........................................................................456
Conguring Detection and Ports for Dell Compellent Arrays............................................................................. 457
iSCSI Optimization: Operation................................................................................................................................457
Default iSCSI Optimization Values......................................................................................................................... 457
Displaying iSCSI Optimization Information................................................................................................................. 458
27 Intermediate System to Intermediate System.......................................................................................... 460
IS-IS Protocol Overview............................................................................................................................................... 460
IS-IS Addressing.............................................................................................................................................................460
Multi-Topology IS-IS....................................................................................................................................................... 461
Transition Mode........................................................................................................................................................ 461
Interface Support.....................................................................................................................................................462
Adjacencies...............................................................................................................................................................462
Graceful Restart.............................................................................................................................................................462
Timers........................................................................................................................................................................462
Implementation Information..........................................................................................................................................463
Conguration Information.............................................................................................................................................463
Conguration Tasks for IS-IS..................................................................................................................................464
IS-IS Metric Styles.........................................................................................................................................................478
Congure Metric Values................................................................................................................................................478
Maximum Values in the Routing Table...................................................................................................................478
Change the IS-IS Metric Style in One Level Only................................................................................................478
Leaks from One Level to Another..........................................................................................................................480
Sample Congurations...................................................................................................................................................481
16
Contents
28 Link Aggregation Control Protocol (LACP).............................................................................................. 485
Introduction to Dynamic LAGs and LACP.................................................................................................................. 485
Important Points to Remember............................................................................................................................. 485
LACP Modes............................................................................................................................................................ 486
Conguring LACP Commands...............................................................................................................................486
LACP Conguration Tasks............................................................................................................................................ 487
Creating a LAG.........................................................................................................................................................487
Conguring the LAG Interfaces as Dynamic........................................................................................................ 487
Setting the LACP Long Timeout............................................................................................................................488
Shared LAG State Tracking.......................................................................................................................................... 489
Conguring Shared LAG State Tracking.....................................................................................................................489
Important Points about Shared LAG State Tracking............................................................................................491
LACP Basic Conguration Example............................................................................................................................. 491
Congure a LAG on ALPHA....................................................................................................................................491
LACP Fast Switchover..................................................................................................................................................499
Conguring LACP Fast Switchover...................................................................................................................... 499
29 Layer 2..................................................................................................................................................... 501
Manage the MAC Address Table..................................................................................................................................501
Clearing the MAC Address Table............................................................................................................................501
Setting the Aging Time for Dynamic Entries.........................................................................................................501
Conguring a Static MAC Address........................................................................................................................502
Displaying the MAC Address Table........................................................................................................................502
MAC Learning Limit.......................................................................................................................................................502
Setting the MAC Learning Limit............................................................................................................................ 503
mac learning-limit Dynamic.................................................................................................................................... 503
mac learning-limit station-move............................................................................................................................ 503
Learning Limit Violation Actions.............................................................................................................................503
Setting Station Move Violation Actions................................................................................................................504
Recovering from Learning Limit and Station Move Violations...........................................................................504
Disabling MAC Address Learning on the System................................................................................................ 505
Enabling port security............................................................................................................................................. 505
NIC Teaming...................................................................................................................................................................505
MAC Move Optimization........................................................................................................................................ 507
30 Link Layer Discovery Protocol (LLDP)..................................................................................................... 508
802.1AB (LLDP) Overview........................................................................................................................................... 508
Protocol Data Units................................................................................................................................................. 508
Optional TLVs.................................................................................................................................................................509
Management TLVs.................................................................................................................................................. 509
TIA-1057 (LLDP-MED) Overview..................................................................................................................................511
TIA Organizationally Specic TLVs..........................................................................................................................511
Extended Power via MDI TLV.................................................................................................................................515
Congure LLDP.............................................................................................................................................................. 515
Related Conguration Tasks....................................................................................................................................515
Contents
17
Important Points to Remember.............................................................................................................................. 516
LLDP Compatibility...................................................................................................................................................516
CONFIGURATION versus INTERFACE Congurations.............................................................................................516
Enabling LLDP.................................................................................................................................................................517
Disabling and Undoing LLDP................................................................................................................................... 517
Advertising TLVs.............................................................................................................................................................517
Viewing the LLDP Conguration.................................................................................................................................. 518
Viewing Information Advertised by Adjacent LLDP Agents...................................................................................... 519
Conguring LLDPDU Intervals..................................................................................................................................... 520
Conguring Transmit and Receive Mode....................................................................................................................520
Conguring a Time to Live............................................................................................................................................ 521
Debugging LLDP............................................................................................................................................................522
Relevant Management Objects................................................................................................................................... 523
31 Microsoft Network Load Balancing...........................................................................................................528
NLB Unicast Mode Scenario........................................................................................................................................528
NLB Multicast Mode Scenario.....................................................................................................................................528
Limitations With Enabling NLB on Switches.............................................................................................................. 529
Benets and Working of Microsoft Clustering...........................................................................................................529
Enable and Disable VLAN Flooding ............................................................................................................................ 529
Conguring a Switch for NLB .....................................................................................................................................529
Multicast NLB Mode...............................................................................................................................................530
32 Multicast Source Discovery Protocol (MSDP)..........................................................................................531
Protocol Overview..........................................................................................................................................................531
Anycast RP.....................................................................................................................................................................533
Implementation Information..........................................................................................................................................534
Congure the Multicast Source Discovery Protocol.................................................................................................534
Related Conguration Tasks...................................................................................................................................534
Enabling MSDP.............................................................................................................................................................. 538
Manage the Source-Active Cache..............................................................................................................................539
Viewing the Source-Active Cache.........................................................................................................................539
Limiting the Source-Active Cache.........................................................................................................................539
Clearing the Source-Active Cache........................................................................................................................540
Enabling the Rejected Source-Active Cache....................................................................................................... 540
Accept Source-Active Messages that Fail the RFP Check..................................................................................... 540
Specifying Source-Active Messages...........................................................................................................................544
Limiting the Source-Active Messages from a Peer...................................................................................................545
Preventing MSDP from Caching a Local Source.......................................................................................................545
Preventing MSDP from Caching a Remote Source.................................................................................................. 546
Preventing MSDP from Advertising a Local Source................................................................................................. 546
Logging Changes in Peership States...........................................................................................................................547
Terminating a Peership..................................................................................................................................................547
Clearing Peer Statistics.................................................................................................................................................548
Debugging MSDP.......................................................................................................................................................... 548
MSDP with Anycast RP................................................................................................................................................549
18
Contents
Conguring Anycast RP............................................................................................................................................... 550
Reducing Source-Active Message Flooding......................................................................................................... 551
Specifying the RP Address Used in SA Messages...............................................................................................551
MSDP Sample Congurations..................................................................................................................................... 553
33 Multiple Spanning Tree Protocol (MSTP)................................................................................................ 556
Protocol Overview.........................................................................................................................................................556
Spanning Tree Variations...............................................................................................................................................557
Implementation Information..........................................................................................................................................557
Congure Multiple Spanning Tree Protocol................................................................................................................ 557
Related Conguration Tasks...................................................................................................................................557
Enable Multiple Spanning Tree Globally...................................................................................................................... 558
Creating Multiple Spanning Tree Instances................................................................................................................ 558
Inuencing MSTP Root Selection................................................................................................................................559
Interoperate with Non-Dell Networking OS Bridges.................................................................................................560
Changing the Region Name or Revision.....................................................................................................................560
Modifying Global Parameters.......................................................................................................................................560
Enable BPDU Filtering Globally.................................................................................................................................... 562
Modifying the Interface Parameters........................................................................................................................... 562
Conguring an EdgePort.............................................................................................................................................. 563
Flush MAC Addresses after a Topology Change....................................................................................................... 564
MSTP Sample Congurations......................................................................................................................................564
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................565
Debugging and Verifying MSTP Congurations........................................................................................................ 567
34 Multicast Features................................................................................................................................... 570
Enabling IP Multicast.....................................................................................................................................................570
Implementation Information..........................................................................................................................................570
First Packet Forwarding for Lossless Multicast..........................................................................................................571
Multicast Policies............................................................................................................................................................571
IPv4 Multicast Policies...................................................................................................................................................571
Limiting the Number of Multicast Routes............................................................................................................. 571
Preventing a Host from Joining a Group...............................................................................................................572
Rate Limiting IGMP Join Requests........................................................................................................................ 574
Preventing a PIM Router from Forming an Adjacency........................................................................................575
Preventing a Source from Registering with the RP............................................................................................ 575
Preventing a PIM Router from Processing a Join................................................................................................578
Understanding Multicast Traceroute (mtrace)...........................................................................................................578
Important Points to Remember..............................................................................................................................579
Printing Multicast Traceroute (mtrace) Paths............................................................................................................579
Supported Error Codes.................................................................................................................................................580
mtrace Scenarios............................................................................................................................................................581
35 Object Tracking........................................................................................................................................587
Object Tracking Overview.............................................................................................................................................587
Contents
19
Track Layer 2 Interfaces..........................................................................................................................................588
Track Layer 3 Interfaces..........................................................................................................................................588
Track IPv4 and IPv6 Routes................................................................................................................................... 588
Set Tracking Delays................................................................................................................................................. 588
VRRP Object Tracking............................................................................................................................................ 589
Object Tracking Conguration..................................................................................................................................... 589
Tracking a Layer 2 Interface...................................................................................................................................589
Tracking a Layer 3 Interface...................................................................................................................................590
Track an IPv4/IPv6 Route.......................................................................................................................................591
Conguring track reachability refresh interval..................................................................................................... 592
Displaying Tracked Objects...........................................................................................................................................593
36 Open Shortest Path First (OSPFv2 and OSPFv3)................................................................................... 595
Protocol Overview.........................................................................................................................................................595
Autonomous System (AS) Areas........................................................................................................................... 595
Area Types................................................................................................................................................................ 596
Networks and Neighbors........................................................................................................................................ 597
Router Types.............................................................................................................................................................597
Link-State Advertisements (LSAs)........................................................................................................................599
Router Priority and Cost.........................................................................................................................................600
OSPF with the Dell Networking OS.............................................................................................................................601
Graceful Restart...................................................................................................................................................... 602
Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................603
Processing SNMP and Sending SNMP Traps......................................................................................................603
OSPF ACK Packing................................................................................................................................................. 603
Setting OSPF Adjacency with Cisco Routers...................................................................................................... 603
Conguration Information.............................................................................................................................................604
Conguration Task List for OSPFv2 (OSPF for IPv4)........................................................................................ 604
Troubleshooting OSPFv2.........................................................................................................................................615
OSPFv3 NSSA................................................................................................................................................................619
NSSA Options...........................................................................................................................................................619
Conguration Task List for OSPFv3 (OSPF for IPv6)............................................................................................... 619
Enabling IPv6 Unicast Routing...............................................................................................................................620
Applying cost for OSPFv3...................................................................................................................................... 620
Assigning IPv6 Addresses on an Interface............................................................................................................ 621
Assigning Area ID on an Interface...........................................................................................................................621
Assigning OSPFv3 Process ID and Router ID Globally.........................................................................................621
Conguring Stub Areas...........................................................................................................................................622
Conguring Passive-Interface................................................................................................................................622
Redistributing Routes..............................................................................................................................................623
Conguring a Default Route...................................................................................................................................623
Enabling OSPFv3 Graceful Restart....................................................................................................................... 623
Displaying Graceful Restart.................................................................................................................................... 624
OSPFv3 Authentication Using IPsec.....................................................................................................................625
MIB Support for OSPFv3............................................................................................................................................. 633
Viewing the OSPFv3 MIB.......................................................................................................................................633
20
Contents
/