Dell PowerSwitch S6000 ON Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6000 ON Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S6000–ON
System
9.14.1.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2018 - 11
Rev. A00
Contents
1 About this Guide...........................................................................................................................................37
Audience............................................................................................................................................................................37
Conventions...................................................................................................................................................................... 37
Related Documents..........................................................................................................................................................37
2 Conguration Fundamentals........................................................................................................................ 38
Accessing the Command Line........................................................................................................................................38
CLI Modes.........................................................................................................................................................................38
Navigating CLI Modes...............................................................................................................................................40
The do Command............................................................................................................................................................ 43
Undoing Commands........................................................................................................................................................ 43
Obtaining Help..................................................................................................................................................................44
Entering and Editing Commands....................................................................................................................................44
Command History............................................................................................................................................................45
Filtering show Command Outputs.................................................................................................................................45
Example of the grep Keyword.................................................................................................................................. 45
Multiple Users in Conguration Mode...........................................................................................................................46
3 Getting Started............................................................................................................................................47
Console Access................................................................................................................................................................48
Serial Console.............................................................................................................................................................48
Default Conguration...................................................................................................................................................... 49
Conguring a Host Name............................................................................................................................................... 49
Accessing the System Remotely....................................................................................................................................49
Accessing the System Remotely............................................................................................................................. 50
Congure the Management Port IP Address.........................................................................................................50
Congure a Management Route..............................................................................................................................50
Conguring a Username and Password..................................................................................................................50
Conguring the Enable Password...................................................................................................................................51
Conguration File Management.....................................................................................................................................52
Copy Files to and from the System......................................................................................................................... 52
Mounting an NFS File System..................................................................................................................................53
Save the Running-Conguration..............................................................................................................................54
Congure the Overload Bit for a Startup Scenario............................................................................................... 55
Viewing Files...............................................................................................................................................................55
Managing the File System.............................................................................................................................................. 56
View Command History.................................................................................................................................................. 56
Upgrading Dell EMC Networking OS.............................................................................................................................57
Using HTTP for File Transfers........................................................................................................................................ 57
Verify Software Images Before Installation...................................................................................................................58
4 Management............................................................................................................................................... 59
Contents
3
Conguring Privilege Levels........................................................................................................................................... 59
Creating a Custom Privilege Level...........................................................................................................................60
Removing a Command from EXEC Mode.............................................................................................................. 60
Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 60
Allowing Access to CONFIGURATION Mode Commands....................................................................................60
Allowing Access to Dierent Modes........................................................................................................................60
Applying a Privilege Level to a Username............................................................................................................... 62
Applying a Privilege Level to a Terminal Line.......................................................................................................... 62
Conguring Logging........................................................................................................................................................ 62
Audit and Security Logs............................................................................................................................................ 63
Conguring Logging Format ...................................................................................................................................64
Setting Up a Secure Connection to a Syslog Server.............................................................................................64
Log Messages in the Internal Buer..............................................................................................................................66
Conguration Task List for System Log Management..........................................................................................66
Disabling System Logging...............................................................................................................................................66
Sending System Messages to a Syslog Server............................................................................................................66
Conguring a UNIX System as a Syslog Server.....................................................................................................66
Track Login Activity..........................................................................................................................................................67
Restrictions for Tracking Login Activity...................................................................................................................67
Conguring Login Activity Tracking......................................................................................................................... 67
Display Login Statistics..............................................................................................................................................68
Limit Concurrent Login Sessions....................................................................................................................................69
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 69
Conguring Concurrent Session Limit.....................................................................................................................69
Enabling the System to Clear Existing Sessions.................................................................................................... 70
Enabling Secured CLI Mode............................................................................................................................................ 71
Changing System Logging Settings............................................................................................................................... 71
Display the Logging Buer and the Logging Conguration........................................................................................ 72
Conguring a UNIX Logging Facility Level.................................................................................................................... 72
Synchronizing Log Messages......................................................................................................................................... 73
Enabling Timestamp on Syslog Messages.................................................................................................................... 74
File Transfer Services.......................................................................................................................................................74
Conguration Task List for File Transfer Services..................................................................................................75
Enabling the FTP Server...........................................................................................................................................75
Conguring FTP Server Parameters....................................................................................................................... 75
Conguring FTP Client Parameters......................................................................................................................... 76
Terminal Lines................................................................................................................................................................... 76
Denying and Permitting Access to a Terminal Line................................................................................................76
Conguring Login Authentication for Terminal Lines............................................................................................. 77
Setting Timeout for EXEC Privilege Mode................................................................................................................... 78
Using Telnet to get to Another Network Device..........................................................................................................79
Lock CONFIGURATION Mode....................................................................................................................................... 79
Viewing the Conguration Lock Status...................................................................................................................79
Reloading the system...................................................................................................................................................... 80
Restoring the Factory Default Settings......................................................................................................................... 81
4
Contents
Important Points to Remember................................................................................................................................ 81
Restoring Factory Default Environment Variables.................................................................................................. 81
Viewing the Reason for Last System Reboot...............................................................................................................83
Disabling Syslog Messages for SNMP Authentication Failure Events.......................................................................83
5 802.1X..........................................................................................................................................................84
Port-Authentication Process..........................................................................................................................................86
EAP over RADIUS......................................................................................................................................................86
Conguring 802.1X........................................................................................................................................................... 87
Related Conguration Tasks..................................................................................................................................... 87
Important Points to Remember......................................................................................................................................87
Enabling 802.1X................................................................................................................................................................ 88
Conguring dot1x Prole ................................................................................................................................................89
Conguring MAC addresses for a do1x Prole.............................................................................................................90
Conguring the Static MAB and MAB Prole .............................................................................................................90
Conguring Critical VLAN .............................................................................................................................................. 91
Conguring Request Identity Re-Transmissions...........................................................................................................92
Conguring a Quiet Period after a Failed Authentication..................................................................................... 92
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 93
Re-Authenticating a Port................................................................................................................................................94
Conguring Timeouts......................................................................................................................................................95
Conguring Dynamic VLAN Assignment with Port Authentication.......................................................................... 96
Guest and Authentication-Fail VLANs...........................................................................................................................97
Conguring a Guest VLAN........................................................................................................................................97
Conguring an Authentication-Fail VLAN............................................................................................................... 97
6 Access Control Lists (ACLs)........................................................................................................................ 99
IP Access Control Lists (ACLs).....................................................................................................................................100
CAM Usage................................................................................................................................................................101
Implementing ACLs on Dell EMC Networking OS................................................................................................ 101
Congure ACL Range Proles................................................................................................................................ 103
Important Points to Remember....................................................................................................................................104
Conguration Task List for Route Maps................................................................................................................104
Conguring Match Routes......................................................................................................................................106
Conguring Set Conditions..................................................................................................................................... 107
Congure a Route Map for Route Redistribution.................................................................................................108
Congure a Route Map for Route Tagging........................................................................................................... 109
Continue Clause........................................................................................................................................................109
IP Fragment Handling..................................................................................................................................................... 110
IP Fragments ACL Examples................................................................................................................................... 110
Layer 4 ACL Rules Examples................................................................................................................................... 110
Congure a Standard IP ACL..........................................................................................................................................111
Conguring a Standard IP ACL Filter......................................................................................................................112
Congure an Extended IP ACL......................................................................................................................................113
Conguring Filters with a Sequence Number........................................................................................................113
Conguring Filters Without a Sequence Number................................................................................................. 116
Contents
5
Congure Layer 2 and Layer 3 ACLs............................................................................................................................ 116
Assign an IP ACL to an Interface...................................................................................................................................117
Applying an IP ACL..........................................................................................................................................................117
Counting ACL Hits.................................................................................................................................................... 118
Congure Ingress ACLs.................................................................................................................................................. 118
Congure Egress ACLs...................................................................................................................................................119
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 120
IP Prex Lists.................................................................................................................................................................. 120
Implementation Information..................................................................................................................................... 121
Conguration Task List for Prex Lists...................................................................................................................121
ACL Remarks.................................................................................................................................................................. 124
Conguring a Remark.............................................................................................................................................. 124
Deleting a Remark.................................................................................................................................................... 125
ACL Resequencing......................................................................................................................................................... 126
Resequencing an ACL or Prex List.......................................................................................................................126
Route Maps..................................................................................................................................................................... 127
Implementation Information.....................................................................................................................................127
Flow-Based Monitoring..................................................................................................................................................128
Behavior of Flow-Based Monitoring.......................................................................................................................128
Enabling Flow-Based Monitoring............................................................................................................................129
Conguring IP Mirror Access Group............................................................................................................................ 130
Sample Conguration................................................................................................................................................131
Example of viewing IP mirror–access–group applied to an Interface................................................................132
7 Bidirectional Forwarding Detection (BFD).................................................................................................. 133
How BFD Works............................................................................................................................................................. 133
BFD Packet Format..................................................................................................................................................134
BFD Sessions............................................................................................................................................................ 135
BFD Three-Way Handshake.................................................................................................................................... 136
Session State Changes............................................................................................................................................138
Important Points to Remember.................................................................................................................................... 138
Congure BFD................................................................................................................................................................ 138
Congure BFD for Physical Ports...........................................................................................................................139
Congure BFD for Static Routes............................................................................................................................140
Congure BFD for IPv6 Static Routes...................................................................................................................144
Congure BFD for OSPF.........................................................................................................................................146
Congure BFD for OSPFv3.....................................................................................................................................150
Congure BFD for IS-IS...........................................................................................................................................153
Congure BFD for BGP...........................................................................................................................................155
Congure BFD for VRRP.........................................................................................................................................163
Conguring Protocol Liveness................................................................................................................................165
8 Border Gateway Protocol (BGP)................................................................................................................ 166
BGP IP version 4 (BGPv4) Overview..........................................................................................................................166
BGP Autonomous Systems........................................................................................................................................... 167
AS4 Number Representation.................................................................................................................................. 168
6
Contents
Four-Byte AS Numbers............................................................................................................................................170
Multiprotocol BGP..........................................................................................................................................................170
Sessions and Peers......................................................................................................................................................... 171
Establish a Session....................................................................................................................................................171
BGP global and address family conguration..............................................................................................................172
BGP global conguration default values................................................................................................................ 172
BGP Attributes for selecting Best Path.......................................................................................................................173
Best Path Selection Criteria.................................................................................................................................... 173
Weight........................................................................................................................................................................175
Local Preference....................................................................................................................................................... 175
Multi-Exit Discriminators (MEDs)...........................................................................................................................176
Origin.......................................................................................................................................................................... 177
AS Path...................................................................................................................................................................... 178
Next Hop................................................................................................................................................................... 178
Implement BGP with Dell EMC Networking OS.........................................................................................................179
Additional Path (Add-Path) Support......................................................................................................................179
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 179
Ignore Router-ID in Best-Path Calculation............................................................................................................ 180
AS Number Migration.............................................................................................................................................. 180
BGP4 Management Information Base (MIB).........................................................................................................181
Important Points to Remember...............................................................................................................................181
Conguration Information..............................................................................................................................................182
Basic BGP conguration tasks......................................................................................................................................182
Enabling BGP............................................................................................................................................................ 182
Conguring a BGP peer...........................................................................................................................................185
Conguring AS4 Number Representations........................................................................................................... 186
Conguring a BGP VRF address family..................................................................................................................187
Route-refresh and Soft-reconguration................................................................................................................189
Aggregating Routes..................................................................................................................................................192
Filtering BGP Routes................................................................................................................................................192
Filtering BGP Routes Using Route Maps...............................................................................................................192
Filtering BGP Routes Using AS-PATH Information.............................................................................................. 193
Conguring Peer Groups.........................................................................................................................................194
Conguring BGP Fast Fall-Over............................................................................................................................ 202
Conguring Passive Peering...................................................................................................................................203
Maintaining Existing AS Numbers During an AS Migration................................................................................ 204
Allowing an AS Number to Appear in its Own AS Path...................................................................................... 205
Enabling Graceful Restart.......................................................................................................................................206
Filtering on an AS-Path Attribute...........................................................................................................................207
Regular Expressions as Filters................................................................................................................................208
Redistributing Routes..............................................................................................................................................209
Enabling Additional Paths........................................................................................................................................ 210
Conguring IP Community Lists..............................................................................................................................211
Conguring an IP Extended Community List........................................................................................................ 212
Filtering Routes with Community Lists.................................................................................................................. 213
Contents
7
Manipulating the COMMUNITY Attribute.............................................................................................................214
Changing MED Attributes....................................................................................................................................... 216
Changing the LOCAL_PREFERENCE Attribute.................................................................................................. 216
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............. 217
Changing the WEIGHT Attribute............................................................................................................................217
Enabling Multipath....................................................................................................................................................218
Route Reectors.......................................................................................................................................................218
Conguring BGP Confederations.......................................................................................................................... 220
Enabling Route Flap Dampening............................................................................................................................ 220
Changing BGP keepalive and hold timers.............................................................................................................222
Setting the extended timer.....................................................................................................................................223
Enabling or disabling BGP neighbors.....................................................................................................................224
Route Map Continue............................................................................................................................................... 225
Enabling MBGP Congurations................................................................................................................................... 226
MBGP support for IPv6................................................................................................................................................226
Conguring IPv6 MBGP between peers.................................................................................................................... 226
Example-Conguring IPv4 and IPv6 neighbors..........................................................................................................227
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor............................................... 229
BGP Regular Expression Optimization.........................................................................................................................231
Debugging BGP.............................................................................................................................................................. 231
Storing Last and Bad PDUs....................................................................................................................................232
Capturing PDUs....................................................................................................................................................... 233
PDU Counters.......................................................................................................................................................... 234
9 Content Addressable Memory (CAM)........................................................................................................235
CAM Allocation.............................................................................................................................................................. 235
Test CAM Usage............................................................................................................................................................ 237
View CAM Proles......................................................................................................................................................... 237
View CAM-ACL Settings.............................................................................................................................................. 238
View CAM Usage...........................................................................................................................................................239
Conguring CAM Threshold and Silence Period........................................................................................................240
Setting CAM Threshold and Silence Period......................................................................................................... 240
CAM Optimization.......................................................................................................................................................... 241
Troubleshoot CAM Proling...........................................................................................................................................241
QoS CAM Region Limitation....................................................................................................................................241
Syslog Error When the Table is Full....................................................................................................................... 242
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................242
Syslog Warning for Discrepancies Between Congured Extended Prexes.................................................... 242
Unied Forwarding Table (UFT) Modes......................................................................................................................242
Conguring UFT Modes..........................................................................................................................................242
10 Control Plane Policing (CoPP)..................................................................................................................244
Congure Control Plane Policing................................................................................................................................. 245
Conguring CoPP for Protocols............................................................................................................................ 246
Conguring CoPP for CPU Queues...................................................................................................................... 248
Displaying CoPP Conguration ............................................................................................................................. 249
8
Contents
11 Data Center Bridging (DCB)...................................................................................................................... 251
Ethernet Enhancements in Data Center Bridging...................................................................................................... 251
Priority-Based Flow Control................................................................................................................................... 252
Enhanced Transmission Selection..........................................................................................................................253
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................254
Data Center Bridging in a Trac Flow.................................................................................................................. 255
Enabling Data Center Bridging.....................................................................................................................................255
DCB Maps and its Attributes................................................................................................................................. 256
Data Center Bridging: Default Conguration..............................................................................................................257
Conguring Priority-Based Flow Control.................................................................................................................... 257
Conguring Lossless Queues................................................................................................................................. 258
Conguring PFC in a DCB Map................................................................................................................................... 260
PFC Conguration Notes....................................................................................................................................... 260
PFC Prerequisites and Restrictions........................................................................................................................261
Applying a DCB Map on a Port.....................................................................................................................................261
Conguring PFC without a DCB Map.........................................................................................................................262
Conguring Lossless QueuesExample:..................................................................................................................262
Conguring PFC Asymmetric.......................................................................................................................................263
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................264
Pause and Resume of Trac..................................................................................................................................264
Buer Sizes for Lossless or PFC Packets............................................................................................................ 264
Behavior of Tagged Packets.........................................................................................................................................265
Conguration Example for DSCP and PFC Priorities................................................................................................265
SNMP Support for PFC and Buer Statistics Tracking............................................................................................266
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................266
PFC and ETS Conguration Examples........................................................................................................................267
Using PFC to Manage Converged Ethernet Trac...................................................................................................267
Operations on Untagged Packets................................................................................................................................ 267
Generation of PFC for a Priority for Untagged Packets...........................................................................................268
Congure Enhanced Transmission Selection..............................................................................................................268
ETS Prerequisites and Restrictions....................................................................................................................... 268
Creating an ETS Priority Group..............................................................................................................................268
ETS Operation with DCBx...................................................................................................................................... 270
Conguring Bandwidth Allocation for DCBx CIN.................................................................................................270
Conguring ETS in a DCB Map...............................................................................................................................271
Hierarchical Scheduling in ETS Output Policies......................................................................................................... 272
Using ETS to Manage Converged Ethernet Trac................................................................................................... 273
Applying DCB Policies in a Switch Stack.................................................................................................................... 273
Congure a DCBx Operation........................................................................................................................................ 273
DCBx Operation....................................................................................................................................................... 273
DCBx Port Roles.......................................................................................................................................................274
DCB Conguration Exchange.................................................................................................................................275
Conguration Source Election................................................................................................................................275
Propagation of DCB Information............................................................................................................................276
Auto-Detection and Manual Conguration of the DCBx Version.......................................................................276
Contents
9
DCBx Example..........................................................................................................................................................277
DCBx Prerequisites and Restrictions..................................................................................................................... 277
Conguring DCBx.....................................................................................................................................................277
Verifying the DCB Conguration.................................................................................................................................. 281
QoS dot1p Trac Classication and Queue Assignment..........................................................................................289
Conguring the Dynamic Buer Method................................................................................................................... 290
Sample DCB Conguration........................................................................................................................................... 291
PFC and ETS Conguration Command Examples...............................................................................................293
12 Dynamic Host Conguration Protocol (DHCP).........................................................................................294
DHCP Packet Format and Options............................................................................................................................. 294
Assign an IP Address using DHCP...............................................................................................................................296
Implementation Information..........................................................................................................................................297
Congure the System to be a DHCP Server..............................................................................................................297
Conguring the Server for Automatic Address Allocation..................................................................................298
Specifying a Default Gateway................................................................................................................................ 299
Congure a Method of Hostname Resolution..................................................................................................... 300
Using DNS for Address Resolution........................................................................................................................300
Using NetBIOS WINS for Address Resolution..................................................................................................... 300
Creating Manual Binding Entries........................................................................................................................... 300
Debugging the DHCP Server..................................................................................................................................301
Using DHCP Clear Commands............................................................................................................................... 301
Congure the System to be a DHCP Client................................................................................................................301
Conguring the DHCP Client System...................................................................................................................302
DHCP Client on a Management Interface............................................................................................................303
DHCP Client Operation with Other Features.......................................................................................................304
DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................305
Conguring Route Leaking between VRFs on DHCP Relay Agent................................................................... 305
Non-default VRF conguration for DHCPv6 helper address...................................................................................306
Conguring DHCP relay source interface...................................................................................................................306
Global DHCP relay source IPv4 or IPv6 conguration .......................................................................................306
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................307
Congure the System for User Port Stacking (Option 230)................................................................................... 308
Congure Secure DHCP...............................................................................................................................................308
Option 82..................................................................................................................................................................309
DHCP Snooping.......................................................................................................................................................309
Drop DHCP Packets on Snooped VLANs Only.....................................................................................................314
Dynamic ARP Inspection......................................................................................................................................... 314
Conguring Dynamic ARP Inspection....................................................................................................................315
Source Address Validation............................................................................................................................................. 316
Enabling IP Source Address Validation...................................................................................................................316
DHCP MAC Source Address Validation................................................................................................................. 317
Enabling IP+MAC Source Address Validation........................................................................................................317
Viewing the Number of SAV Dropped Packets.................................................................................................... 318
Clearing the Number of SAV Dropped Packets....................................................................................................318
10
Contents
13 Equal Cost Multi-Path (ECMP).................................................................................................................319
ECMP for Flow-Based Anity......................................................................................................................................319
Conguring the Hash Algorithm............................................................................................................................. 319
Enabling Deterministic ECMP Next Hop............................................................................................................... 319
Conguring the Hash Algorithm Seed.................................................................................................................. 320
Link Bundle Monitoring................................................................................................................................................. 320
Managing ECMP Group Paths................................................................................................................................321
Creating an ECMP Group Bundle...........................................................................................................................321
Modifying the ECMP Group Threshold................................................................................................................. 321
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................322
Support for ECMP in host table............................................................................................................................ 323
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 323
14 FIP Snooping............................................................................................................................................ 324
Fibre Channel over Ethernet........................................................................................................................................ 324
Ensure Robustness in a Converged Ethernet Network............................................................................................ 324
FIP Snooping on Ethernet Bridges.............................................................................................................................. 326
Using FIP Snooping....................................................................................................................................................... 328
FIP Snooping Prerequisites.....................................................................................................................................328
Important Points to Remember..............................................................................................................................328
Enabling the FCoE Transit Feature........................................................................................................................329
Enable FIP Snooping on VLANs.............................................................................................................................329
Congure the FC-MAP Value................................................................................................................................ 330
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................330
Congure a Port for a Bridge-to-FCF Link...........................................................................................................330
Impact on Other Software Features..................................................................................................................... 330
FIP Snooping Restrictions....................................................................................................................................... 331
Conguring FIP Snooping........................................................................................................................................331
Displaying FIP Snooping Information...........................................................................................................................332
FCoE Transit Conguration Example...........................................................................................................................337
15 Flex Hash and Optimized Boot-Up............................................................................................................339
Flex Hash Capability Overview.....................................................................................................................................339
Conguring the Flex Hash Mechanism.......................................................................................................................339
Conguring Fast Boot and LACP Fast Switchover...................................................................................................340
Optimizing the Boot Time.............................................................................................................................................340
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................340
Guidelines for Conguring Optimized Booting Mechanism.................................................................................341
Interoperation of Applications with Fast Boot and System States..........................................................................342
LACP and IPv4 Routing.......................................................................................................................................... 342
LACP and IPv6 Routing.......................................................................................................................................... 342
BGP Graceful Restart............................................................................................................................................. 343
Cold Boot Caused by Power Cycling the System................................................................................................343
Unexpected Reload of the System........................................................................................................................343
Software Upgrade................................................................................................................................................... 343
Contents
11
LACP Fast Switchover............................................................................................................................................343
Changes to BGP Multipath.....................................................................................................................................344
Delayed Installation of ECMP Routes Into BGP...................................................................................................344
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................344
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces......................................................................................345
16 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 346
Protocol Overview.........................................................................................................................................................346
Ring Status............................................................................................................................................................... 347
Multiple FRRP Rings................................................................................................................................................347
Important FRRP Points...........................................................................................................................................348
Important FRRP Concepts..................................................................................................................................... 349
Implementing FRRP...................................................................................................................................................... 350
FRRP Conguration...................................................................................................................................................... 350
Creating the FRRP Group...................................................................................................................................... 350
Conguring the Control VLAN...............................................................................................................................350
Conguring and Adding the Member VLANs.......................................................................................................352
Setting the FRRP Timers........................................................................................................................................353
Clearing the FRRP Counters..................................................................................................................................353
Viewing the FRRP Conguration...........................................................................................................................353
Viewing the FRRP Information.............................................................................................................................. 353
Troubleshooting FRRP.................................................................................................................................................. 354
Conguration Checks..............................................................................................................................................354
Sample Conguration and Topology............................................................................................................................354
FRRP Support on VLT.................................................................................................................................................. 355
Example Scenario.................................................................................................................................................... 356
Important Points to Remember..............................................................................................................................357
17 GARP VLAN Registration Protocol (GVRP)..............................................................................................358
Important Points to Remember................................................................................................................................... 358
Congure GVRP............................................................................................................................................................ 359
Related Conguration Tasks...................................................................................................................................359
Enabling GVRP Globally................................................................................................................................................360
Enabling GVRP on a Layer 2 Interface........................................................................................................................360
Congure GVRP Registration...................................................................................................................................... 360
Congure a GARP Timer............................................................................................................................................... 361
18 Internet Group Management Protocol (IGMP)......................................................................................... 362
IGMP Implementation Information.............................................................................................................................. 362
IGMP Protocol Overview..............................................................................................................................................362
IGMP Version 2........................................................................................................................................................ 362
IGMP Version 3........................................................................................................................................................ 364
Congure IGMP............................................................................................................................................................. 367
Related Conguration Tasks................................................................................................................................... 367
Viewing IGMP Enabled Interfaces...............................................................................................................................368
Selecting an IGMP Version...........................................................................................................................................368
12
Contents
Viewing IGMP Groups...................................................................................................................................................369
Adjusting Timers............................................................................................................................................................ 369
Adjusting Query and Response Timers................................................................................................................. 369
Enabling IGMP Immediate-Leave.................................................................................................................................370
IGMP Snooping...............................................................................................................................................................371
IGMP Snooping Implementation Information........................................................................................................ 371
Conguring IGMP Snooping....................................................................................................................................371
Removing a Group-Port Association..................................................................................................................... 372
Disabling Multicast Flooding................................................................................................................................... 372
Specifying a Port as Connected to a Multicast Router.......................................................................................372
Conguring the Switch as Querier.........................................................................................................................373
Fast Convergence after MSTP Topology Changes................................................................................................... 373
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................ 373
Protocol Separation................................................................................................................................................. 374
Enabling and Disabling Management Egress Interface Selection...................................................................... 375
Handling of Management Route Conguration....................................................................................................376
Handling of Switch-Initiated Trac....................................................................................................................... 376
Handling of Switch-Destined Trac......................................................................................................................377
Handling of Transit Trac (Trac Separation).....................................................................................................378
Mapping of Management Applications and Trac Type..................................................................................... 378
Behavior of Various Applications for Switch-Initiated Trac ............................................................................ 379
Behavior of Various Applications for Switch-Destined Trac .......................................................................... 380
Interworking of EIS With Various Applications.....................................................................................................380
Designating a Multicast Router Interface....................................................................................................................381
19 Interfaces................................................................................................................................................. 382
Basic Interface Conguration.......................................................................................................................................382
Advanced Interface Conguration...............................................................................................................................382
Interface Types...............................................................................................................................................................383
View Basic Interface Information.................................................................................................................................383
Resetting an Interface to its Factory Default State...................................................................................................385
Enabling a Physical Interface........................................................................................................................................386
Physical Interfaces.........................................................................................................................................................386
Conguration Task List for Physical Interfaces....................................................................................................386
40G to 1G Breakout Cable Adaptor....................................................................................................................... 386
Overview of Layer Modes.......................................................................................................................................387
Conguring Layer 2 (Data Link) Mode..................................................................................................................388
Conguring Layer 2 (Interface) Mode.................................................................................................................. 388
Conguring Layer 3 (Network) Mode...................................................................................................................388
Conguring Layer 3 (Interface) Mode.................................................................................................................. 389
Automatic recovery of an Err-disabled interface.......................................................................................................390
Conguring an automatic recovery for an Err-disabled interface......................................................................390
Egress Interface Selection (EIS)...................................................................................................................................391
Important Points to Remember.............................................................................................................................. 391
Conguring EIS.........................................................................................................................................................391
Management Interfaces................................................................................................................................................392
Contents
13
Conguring Management Interfaces.....................................................................................................................392
Conguring a Management Interface on an Ethernet Port................................................................................393
VLAN Interfaces............................................................................................................................................................ 394
Loopback Interfaces......................................................................................................................................................395
Null Interfaces................................................................................................................................................................ 395
Port Channel Interfaces................................................................................................................................................395
Port Channel Denition and Standards.................................................................................................................396
Port Channel Benets.............................................................................................................................................396
Port Channel Implementation.................................................................................................................................396
Interfaces in Port Channels.................................................................................................................................... 397
Conguration Tasks for Port Channel Interfaces................................................................................................. 397
Creating a Port Channel..........................................................................................................................................397
Adding a Physical Interface to a Port Channel.....................................................................................................398
Reassigning an Interface to a New Port Channel................................................................................................399
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 400
Adding or Removing a Port Channel from a VLAN............................................................................................. 400
Assigning an IP Address to a Port Channel...........................................................................................................401
Deleting or Disabling a Port Channel.....................................................................................................................402
Load Balancing Through Port Channels................................................................................................................402
Changing the Hash Algorithm................................................................................................................................402
Bulk Conguration......................................................................................................................................................... 403
Interface Range........................................................................................................................................................403
Bulk Conguration Examples..................................................................................................................................404
Dening Interface Range Macros................................................................................................................................ 405
Dene the Interface Range.................................................................................................................................... 406
Choosing an Interface-Range Macro....................................................................................................................406
Monitoring and Maintaining Interfaces....................................................................................................................... 406
Maintenance Using TDR......................................................................................................................................... 407
Non Dell-Qualied Transceivers................................................................................................................................... 408
Splitting 40G Ports without Reload.............................................................................................................................408
Splitting QSFP Ports to SFP+ Ports............................................................................................................................410
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port................................................................................... 411
Important Points to Remember...............................................................................................................................411
Example Scenarios................................................................................................................................................... 412
Conguring wavelength for 10–Gigabit SFP+ optics.................................................................................................413
Link Dampening.............................................................................................................................................................. 413
Important Points to Remember.............................................................................................................................. 414
Conguration Example of Link Dampening........................................................................................................... 414
Enabling Link Dampening.........................................................................................................................................416
Link Bundle Monitoring.................................................................................................................................................. 417
Using Ethernet Pause Frames for Flow Control......................................................................................................... 418
Enabling Pause Frames............................................................................................................................................418
Congure the MTU Size on an Interface.....................................................................................................................419
Port-Pipes.......................................................................................................................................................................420
Auto-Negotiation on Ethernet Interfaces...................................................................................................................420
14
Contents
Setting the Speed of Ethernet Interfaces............................................................................................................ 420
Set Auto-Negotiation Options................................................................................................................................ 421
View Advanced Interface Information.........................................................................................................................422
Conguring the Interface Sampling Size...............................................................................................................423
Dynamic Counters......................................................................................................................................................... 424
Clearing Interface Counters....................................................................................................................................424
Compressing Conguration Files................................................................................................................................. 425
20 IPv4 Routing............................................................................................................................................428
IP Addresses...................................................................................................................................................................429
Implementation Information....................................................................................................................................429
Conguration Tasks for IP Addresses..........................................................................................................................429
Assigning IP Addresses to an Interface.......................................................................................................................429
Conguring Static Routes............................................................................................................................................ 430
Congure Static Routes for the Management Interface...........................................................................................431
Using the Congured Source IP Address in ICMP Messages..................................................................................432
Conguring the ICMP Source Interface............................................................................................................... 432
Conguring the Duration to Establish a TCP Connection........................................................................................ 432
Enabling Directed Broadcast........................................................................................................................................ 433
Resolution of Host Names............................................................................................................................................433
Enabling Dynamic Resolution of Host Names............................................................................................................433
Specifying the Local System Domain and a List of Domains................................................................................... 434
Conguring DNS with Traceroute................................................................................................................................434
ARP................................................................................................................................................................................. 435
Conguration Tasks for ARP........................................................................................................................................ 435
Conguring Static ARP Entries....................................................................................................................................435
Enabling Proxy ARP.......................................................................................................................................................436
Clearing ARP Cache......................................................................................................................................................436
ARP Learning via Gratuitous ARP................................................................................................................................436
Enabling ARP Learning via Gratuitous ARP................................................................................................................ 437
ARP Learning via ARP Request....................................................................................................................................437
Conguring ARP Retries...............................................................................................................................................438
ICMP............................................................................................................................................................................... 438
Conguration Tasks for ICMP...................................................................................................................................... 438
Enabling ICMP Unreachable Messages...................................................................................................................... 438
UDP Helper.....................................................................................................................................................................439
Congure UDP Helper.............................................................................................................................................439
Important Points to Remember............................................................................................................................. 439
Enabling UDP Helper.....................................................................................................................................................439
Congurations Using UDP Helper............................................................................................................................... 439
UDP Helper with Broadcast-All Addresses.................................................................................................................440
UDP Helper with Subnet Broadcast Addresses.........................................................................................................440
UDP Helper with Congured Broadcast Addresses...................................................................................................441
UDP Helper with No Congured Broadcast Addresses.............................................................................................441
Troubleshooting UDP Helper........................................................................................................................................ 442
Contents
15
21 IPv6 Routing.............................................................................................................................................443
Protocol Overview.........................................................................................................................................................443
Extended Address Space........................................................................................................................................444
Stateless Autoconguration................................................................................................................................... 444
IPv6 Headers............................................................................................................................................................444
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support................................................................... 445
IPv6 Header Fields...................................................................................................................................................446
Extension Header Fields..........................................................................................................................................448
Addressing................................................................................................................................................................ 449
Implementing IPv6 with Dell EMC Networking OS...................................................................................................450
ICMPv6............................................................................................................................................................................451
Path MTU discovery......................................................................................................................................................452
IPv6 Neighbor Discovery.............................................................................................................................................. 452
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................453
Conguring the IPv6 Recursive DNS Server....................................................................................................... 453
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................454
Displaying IPv6 RDNSS Information......................................................................................................................454
Secure Shell (SSH) Over an IPv6 Transport..............................................................................................................455
Conguration Tasks for IPv6........................................................................................................................................455
Adjusting Your CAM-Prole....................................................................................................................................455
Assigning an IPv6 Address to an Interface...........................................................................................................456
Assigning a Static IPv6 Route................................................................................................................................ 457
Conguring Telnet with IPv6.................................................................................................................................. 457
SNMP over IPv6......................................................................................................................................................458
Displaying IPv6 Information....................................................................................................................................458
Displaying an IPv6 Interface Information.............................................................................................................. 458
Showing IPv6 Routes..............................................................................................................................................459
Showing the Running-Conguration for an Interface.........................................................................................460
Clearing IPv6 Routes................................................................................................................................................461
Disabling ND Entry Timeout....................................................................................................................................461
Conguring IPv6 RA Guard...........................................................................................................................................461
Conguring IPv6 RA Guard on an Interface.........................................................................................................463
Monitoring IPv6 RA Guard......................................................................................................................................464
22 iSCSI Optimization.................................................................................................................................. 465
iSCSI Optimization Overview.......................................................................................................................................465
Monitoring iSCSI Trac Flows............................................................................................................................... 467
Application of Quality of Service to iSCSI Trac Flows......................................................................................467
Information Monitored in iSCSI Trac Flows....................................................................................................... 467
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 468
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................468
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................469
Enable and Disable iSCSI Optimization.................................................................................................................469
Default iSCSI Optimization Values............................................................................................................................... 470
iSCSI Optimization Prerequisites..................................................................................................................................470
16
Contents
Conguring iSCSI Optimization....................................................................................................................................470
Displaying iSCSI Optimization Information..................................................................................................................472
23 Intermediate System to Intermediate System...........................................................................................474
IS-IS Protocol Overview................................................................................................................................................474
IS-IS Addressing............................................................................................................................................................. 474
Multi-Topology IS-IS.......................................................................................................................................................475
Transition Mode........................................................................................................................................................475
Interface Support.....................................................................................................................................................476
Adjacencies...............................................................................................................................................................476
Graceful Restart.............................................................................................................................................................476
Timers........................................................................................................................................................................476
Implementation Information..........................................................................................................................................476
Conguration Information............................................................................................................................................. 477
Conguration Tasks for IS-IS..................................................................................................................................478
Conguring the Distance of a Route.....................................................................................................................485
Changing the IS-Type.............................................................................................................................................. 486
Redistributing IPv4 Routes.....................................................................................................................................488
Redistributing IPv6 Routes.....................................................................................................................................489
Conguring Authentication Passwords.................................................................................................................490
Setting the Overload Bit.........................................................................................................................................490
Debugging IS-IS........................................................................................................................................................491
IS-IS Metric Styles.........................................................................................................................................................492
Congure Metric Values................................................................................................................................................492
Maximum Values in the Routing Table.................................................................................................................. 492
Change the IS-IS Metric Style in One Level Only................................................................................................492
Leaks from One Level to Another..........................................................................................................................494
Sample Congurations..................................................................................................................................................495
24 Link Aggregation Control Protocol (LACP)...............................................................................................497
Introduction to Dynamic LAGs and LACP...................................................................................................................497
Important Points to Remember..............................................................................................................................497
LACP Modes............................................................................................................................................................ 498
Conguring LACP Commands...............................................................................................................................498
LACP Conguration Tasks............................................................................................................................................499
Creating a LAG.........................................................................................................................................................499
Conguring the LAG Interfaces as Dynamic........................................................................................................499
Setting the LACP Long Timeout........................................................................................................................... 500
Monitoring and Debugging LACP..........................................................................................................................500
Shared LAG State Tracking...........................................................................................................................................501
Conguring Shared LAG State Tracking................................................................................................................501
Important Points about Shared LAG State Tracking...........................................................................................503
LACP Basic Conguration Example............................................................................................................................ 503
Congure a LAG on ALPHA................................................................................................................................... 503
25 Layer 2..................................................................................................................................................... 512
Contents
17
Manage the MAC Address Table.................................................................................................................................. 512
Clearing the MAC Address Table............................................................................................................................512
Setting the Aging Time for Dynamic Entries.........................................................................................................512
Conguring a Static MAC Address.........................................................................................................................513
Displaying the MAC Address Table.........................................................................................................................513
MAC Learning Limit........................................................................................................................................................513
Setting the MAC Learning Limit............................................................................................................................. 514
mac learning-limit Dynamic..................................................................................................................................... 514
mac learning-limit mac-address-sticky.................................................................................................................. 514
mac learning-limit station-move............................................................................................................................. 515
mac learning-limit no-station-move....................................................................................................................... 515
Learning Limit Violation Actions..............................................................................................................................515
Setting Station Move Violation Actions.................................................................................................................516
Recovering from Learning Limit and Station Move Violations............................................................................516
Disabling MAC Address Learning on the System..................................................................................................517
Enabling port security.............................................................................................................................................. 517
NIC Teaming.................................................................................................................................................................... 517
Congure Redundant Pairs........................................................................................................................................... 518
Important Points about Conguring Redundant Pairs........................................................................................ 520
Far-End Failure Detection..............................................................................................................................................521
FEFD State Changes...............................................................................................................................................522
Conguring FEFD.................................................................................................................................................... 523
Enabling FEFD on an Interface...............................................................................................................................524
Debugging FEFD......................................................................................................................................................525
26 Link Layer Discovery Protocol (LLDP)..................................................................................................... 526
802.1AB (LLDP) Overview............................................................................................................................................526
Protocol Data Units................................................................................................................................................. 526
Optional TLVs................................................................................................................................................................. 527
Management TLVs...................................................................................................................................................527
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 529
TIA Organizationally Specic TLVs........................................................................................................................ 529
Congure LLDP..............................................................................................................................................................533
Related Conguration Tasks...................................................................................................................................533
Important Points to Remember............................................................................................................................. 533
LLDP Compatibility..................................................................................................................................................534
CONFIGURATION versus INTERFACE Congurations............................................................................................ 534
Enabling LLDP................................................................................................................................................................534
Disabling and Undoing LLDP..................................................................................................................................535
Enabling LLDP on Management Ports........................................................................................................................535
Disabling and Undoing LLDP on Management Ports..........................................................................................535
Advertising TLVs............................................................................................................................................................535
Storing and Viewing Unrecognized LLDP TLVs......................................................................................................... 537
Reserved Unrecognized LLDP TLVs......................................................................................................................537
Organizational Specic Unrecognized LLDP TLVs.............................................................................................. 537
Viewing Unrecognized LLDP TLVs........................................................................................................................ 537
18
Contents
Viewing the LLDP Conguration................................................................................................................................. 538
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................538
Examples of Viewing Information Advertised by Neighbors.............................................................................. 538
Conguring LLDPDU Intervals.....................................................................................................................................540
Conguring LLDP Notication Interval........................................................................................................................541
Conguring Transmit and Receive Mode.................................................................................................................... 541
Conguring the Time to Live Value............................................................................................................................. 542
Debugging LLDP............................................................................................................................................................542
Relevant Management Objects................................................................................................................................... 544
27 Microsoft Network Load Balancing.......................................................................................................... 549
NLB Unicast Mode Scenario........................................................................................................................................549
NLB Multicast Mode Scenario.....................................................................................................................................549
Limitations of the NLB Feature....................................................................................................................................550
Microsoft Clustering......................................................................................................................................................550
Enable and Disable VLAN Flooding ............................................................................................................................ 550
Conguring a Switch for NLB .....................................................................................................................................550
Enabling a Switch for Multicast NLB.....................................................................................................................551
28 Multicast Source Discovery Protocol (MSDP)......................................................................................... 552
Protocol Overview.........................................................................................................................................................552
Anycast RP.....................................................................................................................................................................553
Implementation Information......................................................................................................................................... 554
Congure Multicast Source Discovery Protocol........................................................................................................554
Related Conguration Tasks...................................................................................................................................554
Enable MSDP.................................................................................................................................................................558
Manage the Source-Active Cache..............................................................................................................................559
Viewing the Source-Active Cache........................................................................................................................ 559
Limiting the Source-Active Cache.........................................................................................................................559
Clearing the Source-Active Cache........................................................................................................................560
Enabling the Rejected Source-Active Cache.......................................................................................................560
Accept Source-Active Messages that Fail the RFP Check..................................................................................... 560
Specifying Source-Active Messages...........................................................................................................................563
Limiting the Source-Active Messages from a Peer...................................................................................................564
Preventing MSDP from Caching a Local Source.......................................................................................................564
Preventing MSDP from Caching a Remote Source.................................................................................................. 565
Preventing MSDP from Advertising a Local Source................................................................................................. 565
Logging Changes in Peership States...........................................................................................................................566
Terminating a Peership..................................................................................................................................................566
Clearing Peer Statistics.................................................................................................................................................567
Debugging MSDP.......................................................................................................................................................... 567
MSDP with Anycast RP................................................................................................................................................568
Conguring Anycast RP............................................................................................................................................... 569
Reducing Source-Active Message Flooding.........................................................................................................570
Specifying the RP Address Used in SA Messages.............................................................................................. 570
MSDP Sample Congurations......................................................................................................................................572
Contents
19
33 Multicast Listener Discovery Protocol......................................................................................................575
MLD Version 1................................................................................................................................................................ 575
MLD Querier Router......................................................................................................................................................575
Joining a Multicast Group............................................................................................................................................. 576
Leaving a Multicast Group............................................................................................................................................576
MLD version 2................................................................................................................................................................576
MLD timers.....................................................................................................................................................................578
Reducing Host Response Burstiness.................................................................................................................... 579
Conguring MLD Version..............................................................................................................................................579
Clearing MLD groups.....................................................................................................................................................579
Debugging MLD............................................................................................................................................................. 579
Explicit Tracking............................................................................................................................................................. 579
Reducing Leave Latency...............................................................................................................................................580
Displaying MLD groups table........................................................................................................................................580
Displaying MLD Interfaces............................................................................................................................................580
30 Multiple Spanning Tree Protocol (MSTP)................................................................................................. 581
Protocol Overview..........................................................................................................................................................581
Spanning Tree Variations...............................................................................................................................................582
Implementation Information....................................................................................................................................582
Congure Multiple Spanning Tree Protocol................................................................................................................582
Related Conguration Tasks...................................................................................................................................582
Enable Multiple Spanning Tree Globally...................................................................................................................... 583
Adding and Removing Interfaces.................................................................................................................................583
Creating Multiple Spanning Tree Instances................................................................................................................ 583
Inuencing MSTP Root Selection................................................................................................................................585
Interoperate with Non-Dell Bridges.............................................................................................................................585
Changing the Region Name or Revision..................................................................................................................... 586
Modifying Global Parameters.......................................................................................................................................586
Modifying the Interface Parameters............................................................................................................................587
Conguring an EdgePort.............................................................................................................................................. 588
Flush MAC Addresses after a Topology Change....................................................................................................... 589
MSTP Sample Congurations......................................................................................................................................589
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................590
Debugging and Verifying MSTP Congurations........................................................................................................ 594
31 Multicast Features................................................................................................................................... 596
Enabling IP Multicast.....................................................................................................................................................596
Implementation Information......................................................................................................................................... 596
Multicast Policies........................................................................................................................................................... 597
IPv4 Multicast Policies............................................................................................................................................ 597
Understanding Multicast Traceroute (mtrace).......................................................................................................... 604
Important Points to Remember............................................................................................................................. 605
Printing Multicast Traceroute (mtrace) Paths........................................................................................................... 605
20
Contents
/