Dell Z9000 Configuration manual

  • Hello! I am an AI chatbot trained to assist you with the Dell Z9000 Configuration manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the Z9000
System
9.7(0.0)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2015 - 02
Rev. A00
Contents
1 About this Guide..................................................................................................31
Audience.............................................................................................................................................. 31
Conventions.........................................................................................................................................31
Related Documents.............................................................................................................................31
2 Configuration Fundamentals........................................................................... 32
Accessing the Command Line............................................................................................................32
CLI Modes............................................................................................................................................32
Navigating CLI Modes................................................................................................................... 34
The do Command............................................................................................................................... 37
Undoing Commands...........................................................................................................................38
Obtaining Help.................................................................................................................................... 39
Entering and Editing Commands....................................................................................................... 39
Command History.............................................................................................................................. 40
Filtering show Command Outputs.....................................................................................................40
Multiple Users in Configuration Mode............................................................................................... 42
3 Getting Started....................................................................................................43
Console Access...................................................................................................................................43
Serial Console................................................................................................................................43
Accessing the CLI Interface and Running Scripts Using SSH............................................................44
Entering CLI commands Using an SSH Connection....................................................................45
Executing Local CLI Scripts Using an SSH Connection...............................................................45
Default Configuration......................................................................................................................... 46
Configuring a Host Name...................................................................................................................46
Accessing the System Remotely........................................................................................................ 46
Accessing the System Remotely...................................................................................................46
Configure the Management Port IP Address............................................................................... 46
Configure a Management Route.................................................................................................. 47
Configuring a Username and Password.......................................................................................47
Configuring the Enable Password...................................................................................................... 47
Configuration File Management.........................................................................................................48
Copy Files to and from the System.............................................................................................. 48
Mounting an NFS File System....................................................................................................... 49
Save the Running-Configuration.................................................................................................. 51
Configure the Overload Bit for a Startup Scenario...................................................................... 51
Viewing Files...................................................................................................................................51
Managing the File System................................................................................................................... 53
Enabling Software Features on Devices Using a Command Option................................................ 54
View Command History......................................................................................................................55
Upgrading Dell Networking OS.......................................................................................................... 55
Using HTTP for File Transfers............................................................................................................. 55
Using Hashes to Validate Software Images........................................................................................55
4 Management........................................................................................................57
Configuring Privilege Levels................................................................................................................57
Creating a Custom Privilege Level................................................................................................57
Removing a Command from EXEC Mode....................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 58
Allowing Access to CONFIGURATION Mode Commands.......................................................... 58
Allowing Access to the Following Modes.................................................................................... 58
Applying a Privilege Level to a Username.................................................................................... 60
Applying a Privilege Level to a Terminal Line...............................................................................60
Configuring Logging...........................................................................................................................60
Audit and Security Logs.................................................................................................................61
Configuring Logging Format ...................................................................................................... 63
Setting Up a Secure Connection to a Syslog Server....................................................................63
Log Messages in the Internal Buffer...................................................................................................64
Configuration Task List for System Log Management................................................................ 64
Disabling System Logging.................................................................................................................. 64
Sending System Messages to a Syslog Server....................................................................................65
Configuring a UNIX System as a Syslog Server............................................................................65
Changing System Logging Settings....................................................................................................65
Display the Logging Buffer and the Logging Configuration............................................................. 66
Configuring a UNIX Logging Facility Level.........................................................................................67
Synchronizing Log Messages............................................................................................................. 68
Enabling Timestamp on Syslog Messages......................................................................................... 68
File Transfer Services.......................................................................................................................... 69
Configuration Task List for File Transfer Services........................................................................69
Enabling the FTP Server................................................................................................................ 69
Configuring FTP Server Parameters............................................................................................. 70
Configuring FTP Client Parameters..............................................................................................70
Terminal Lines......................................................................................................................................71
Denying and Permitting Access to a Terminal Line......................................................................71
Configuring Login Authentication for Terminal Lines..................................................................71
Setting Time Out of EXEC Privilege Mode..........................................................................................72
Using Telnet to get to Another Network Device................................................................................73
Lock CONFIGURATION Mode............................................................................................................74
Viewing the Configuration Lock Status........................................................................................ 74
Recovering from a Forgotten Password on the Z9000 System........................................................75
Recovering from a Forgotten Enable Password on the Z9000.................................................. 76
Recovering from a Failed Start on the Z9000 System.......................................................................77
Restoring the Factory Default Settings...............................................................................................78
Important Points to Remember....................................................................................................78
Restoring Factory Default Environment Variables....................................................................... 78
5 802.1X................................................................................................................... 81
The Port-Authentication Process.......................................................................................................82
EAP over RADIUS...........................................................................................................................84
Configuring 802.1X............................................................................................................................. 84
Related Configuration Tasks.........................................................................................................84
Important Points to Remember..........................................................................................................85
Enabling 802.1X...................................................................................................................................85
Configuring Request Identity Re-Transmissions............................................................................... 87
Configuring a Quiet Period after a Failed Authentication........................................................... 87
Forcibly Authorizing or Unauthorizing a Port....................................................................................88
Re-Authenticating a Port....................................................................................................................89
Configuring Timeouts.........................................................................................................................90
Configuring Dynamic VLAN Assignment with Port Authentication.................................................. 91
Guest and Authentication-Fail VLANs................................................................................................92
Configuring a Guest VLAN............................................................................................................93
Configuring an Authentication-Fail VLAN....................................................................................93
6 Access Control Lists (ACLs)...............................................................................95
IP Access Control Lists (ACLs)............................................................................................................ 95
CAM Usage....................................................................................................................................96
Implementing ACLs on Dell Networking OS................................................................................97
IP Fragment Handling......................................................................................................................... 98
IP Fragments ACL Examples......................................................................................................... 98
Layer 4 ACL Rules Examples.........................................................................................................99
Configure a Standard IP ACL............................................................................................................100
Configuring a Standard IP ACL Filter.......................................................................................... 101
Configure an Extended IP ACL......................................................................................................... 102
Configuring Filters with a Sequence Number............................................................................102
Configuring Filters Without a Sequence Number......................................................................103
Configure Layer 2 and Layer 3 ACLs................................................................................................104
Assign an IP ACL to an Interface...................................................................................................... 105
Applying an IP ACL............................................................................................................................105
Counting ACL Hits.......................................................................................................................106
Configure Ingress ACLs.................................................................................................................... 106
Configure Egress ACLs......................................................................................................................107
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................... 108
IP Prefix Lists......................................................................................................................................109
Implementation Information...................................................................................................... 109
Configuration Task List for Prefix Lists....................................................................................... 109
ACL Resequencing.............................................................................................................................113
Resequencing an ACL or Prefix List............................................................................................ 114
Route Maps........................................................................................................................................ 115
Implementation Information.......................................................................................................116
Important Points to Remember........................................................................................................ 116
Configuration Task List for Route Maps......................................................................................116
Configuring Match Routes.......................................................................................................... 118
Configuring Set Conditions........................................................................................................ 120
Configure a Route Map for Route Redistribution.......................................................................121
Configure a Route Map for Route Tagging................................................................................ 122
Continue Clause..........................................................................................................................122
Logging of ACL Processes................................................................................................................ 122
Guidelines for Configuring ACL Logging......................................................................................... 123
Configuring ACL Logging................................................................................................................. 124
Flow-Based Monitoring Support for ACLs....................................................................................... 125
Behavior of Flow-Based Monitoring...........................................................................................125
Enabling Flow-Based Monitoring..................................................................................................... 127
7 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)......................................................................................................129
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................... 129
Guidelines for Configuring ACL VLAN groups.................................................................................130
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.........................131
Configuring ACL VLAN Groups................................................................................................... 131
Configuring FP Blocks for VLAN Parameters............................................................................. 132
Viewing CAM Usage.......................................................................................................................... 133
Allocating FP Blocks for VLAN Processes.........................................................................................134
8 Bidirectional Forwarding Detection (BFD)...................................................136
How BFD Works................................................................................................................................ 136
BFD Packet Format......................................................................................................................137
BFD Sessions................................................................................................................................139
BFD Three-Way Handshake........................................................................................................139
Session State Changes................................................................................................................140
Important Points to Remember........................................................................................................ 141
Configure BFD................................................................................................................................... 141
Configure BFD for Physical Ports............................................................................................... 142
Configure BFD for Static Routes.................................................................................................145
Configure BFD for OSPF..............................................................................................................147
Configure BFD for OSPFv3......................................................................................................... 150
Configure BFD for IS-IS............................................................................................................... 151
Configure BFD for BGP............................................................................................................... 154
Configure BFD for VRRP..............................................................................................................161
Configuring Protocol Liveness................................................................................................... 164
Troubleshooting BFD..................................................................................................................164
9 Border Gateway Protocol IPv4 (BGPv4).......................................................166
Autonomous Systems (AS)................................................................................................................166
Sessions and Peers............................................................................................................................168
Establish a Session.......................................................................................................................169
Route Reflectors................................................................................................................................169
BGP Attributes................................................................................................................................... 170
Best Path Selection Criteria......................................................................................................... 171
Weight.......................................................................................................................................... 173
Local Preference..........................................................................................................................173
Multi-Exit Discriminators (MEDs)................................................................................................ 174
Origin............................................................................................................................................175
AS Path......................................................................................................................................... 176
Next Hop......................................................................................................................................176
Multiprotocol BGP............................................................................................................................. 177
Implement BGP with Dell Networking OS........................................................................................177
Additional Path (Add-Path) Support............................................................................................177
Advertise IGP Cost as MED for Redistributed Routes.................................................................177
Ignore Router-ID for Some Best-Path Calculations..................................................................178
Four-Byte AS Numbers................................................................................................................178
AS4 Number Representation.......................................................................................................179
AS Number Migration..................................................................................................................180
BGP4 Management Information Base (MIB).............................................................................. 182
Important Points to Remember..................................................................................................182
Configuration Information................................................................................................................183
BGP Configuration............................................................................................................................ 183
Enabling BGP...............................................................................................................................184
Configuring AS4 Number Representations................................................................................188
Configuring Peer Groups............................................................................................................190
Configuring BGP Fast Fall-Over..................................................................................................192
Configuring Passive Peering....................................................................................................... 194
Maintaining Existing AS Numbers During an AS Migration........................................................195
Allowing an AS Number to Appear in its Own AS Path..............................................................196
Enabling Graceful Restart............................................................................................................197
Enabling Neighbor Graceful Restart...........................................................................................198
Filtering on an AS-Path Attribute................................................................................................198
Regular Expressions as Filters.................................................................................................... 200
Redistributing Routes..................................................................................................................201
Enabling Additional Paths...........................................................................................................202
Configuring IP Community Lists................................................................................................ 202
Configuring an IP Extended Community List............................................................................ 204
Filtering Routes with Community Lists...................................................................................... 205
Manipulating the COMMUNITY Attribute.................................................................................. 205
Changing MED Attributes........................................................................................................... 207
Changing the LOCAL_PREFERENCE Attribute.......................................................................... 207
Changing the NEXT_HOP Attribute...........................................................................................208
Changing the WEIGHT Attribute................................................................................................209
Enabling Multipath......................................................................................................................209
Filtering BGP Routes...................................................................................................................209
Filtering BGP Routes Using Route Maps.....................................................................................211
Filtering BGP Routes Using AS-PATH Information.................................................................... 212
Configuring BGP Route Reflectors.............................................................................................212
Aggregating Routes.....................................................................................................................213
Configuring BGP Confederations...............................................................................................214
Enabling Route Flap Dampening................................................................................................ 214
Changing BGP Timers................................................................................................................. 217
Enabling BGP Neighbor Soft-Reconfiguration...........................................................................217
Route Map Continue...................................................................................................................219
Enabling MBGP Configurations........................................................................................................ 219
BGP Regular Expression Optimization.............................................................................................220
Debugging BGP................................................................................................................................ 220
Storing Last and Bad PDUs..........................................................................................................221
Capturing PDUs...........................................................................................................................222
PDU Counters............................................................................................................................. 223
Sample Configurations..................................................................................................................... 223
10 Content Addressable Memory (CAM).........................................................230
CAM Allocation................................................................................................................................. 230
Test CAM Usage................................................................................................................................232
View CAM Profiles.............................................................................................................................232
View CAM-ACL Settings................................................................................................................... 233
View CAM Usage...............................................................................................................................235
CAM Optimization.............................................................................................................................235
Troubleshoot CAM Profiling.............................................................................................................236
CAM Profile Mismatches.............................................................................................................236
QoS CAM Region Limitation.......................................................................................................236
11 Control Plane Policing (CoPP)......................................................................237
Configure Control Plane Policing.................................................................................................... 238
Configuring CoPP for Protocols................................................................................................ 239
Configuring CoPP for CPU Queues........................................................................................... 241
CoPP for OSPFv3 Packets...........................................................................................................242
Configuring CoPP for OSPFv3....................................................................................................245
Show Commands....................................................................................................................... 246
12 Dynamic Host Configuration Protocol (DHCP)........................................248
DHCP Packet Format and Options.................................................................................................. 248
Assign an IP Address using DHCP....................................................................................................250
Implementation Information............................................................................................................ 251
Configure the System to be a DHCP Server.................................................................................... 252
Configuring the Server for Automatic Address Allocation........................................................ 252
Specifying a Default Gateway.....................................................................................................254
Configure a Method of Hostname Resolution.......................................................................... 254
Using DNS for Address Resolution.............................................................................................254
Using NetBIOS WINS for Address Resolution............................................................................ 254
Creating Manual Binding Entries................................................................................................ 254
Debugging the DHCP Server......................................................................................................255
Using DHCP Clear Commands...................................................................................................255
Configure the System to be a Relay Agent......................................................................................255
Configure the System to be a DHCP Client.....................................................................................257
DHCP Client on a Management Interface................................................................................. 258
DHCP Client Operation with Other Features............................................................................ 258
Configure the System for User Port Stacking (Option 230)............................................................259
Configure Secure DHCP...................................................................................................................259
Option 82....................................................................................................................................260
DHCP Snooping..........................................................................................................................260
Drop DHCP Packets on Snooped VLANs Only..........................................................................264
Dynamic ARP Inspection............................................................................................................ 264
Configuring Dynamic ARP Inspection........................................................................................265
Source Address Validation................................................................................................................266
Enabling IP Source Address Validation.......................................................................................267
DHCP MAC Source Address Validation......................................................................................267
Enabling IP+MAC Source Address Validation............................................................................ 267
Viewing the Number of SAV Dropped Packets..........................................................................268
Clearing the Number of SAV Dropped Packets.........................................................................269
13 Equal Cost Multi-Path (ECMP)..................................................................... 270
ECMP for Flow-Based Affinity.......................................................................................................... 270
Configuring the Hash Algorithm................................................................................................ 270
Enabling Deterministic ECMP Next Hop....................................................................................270
Configuring the Hash Algorithm Seed........................................................................................271
Link Bundle Monitoring..................................................................................................................... 271
Managing ECMP Group Paths.................................................................................................... 272
Creating an ECMP Group Bundle...............................................................................................272
Modifying the ECMP Group Threshold...................................................................................... 273
14 Enabling FIPS Cryptography........................................................................ 274
Configuration Tasks..........................................................................................................................274
Preparing the System........................................................................................................................274
Enabling FIPS Mode.......................................................................................................................... 275
Generating Host-Keys.......................................................................................................................275
Monitoring FIPS Mode Status........................................................................................................... 276
Disabling FIPS Mode......................................................................................................................... 276
15 Force10 Resilient Ring Protocol (FRRP)..................................................... 278
Protocol Overview............................................................................................................................ 278
Ring Status...................................................................................................................................279
Multiple FRRP Rings....................................................................................................................280
Important FRRP Points............................................................................................................... 280
Important FRRP Concepts..........................................................................................................280
Implementing FRRP.......................................................................................................................... 282
FRRP Configuration.......................................................................................................................... 282
Creating the FRRP Group........................................................................................................... 282
Configuring the Control VLAN................................................................................................... 283
Configuring and Adding the Member VLANs............................................................................ 284
Setting the FRRP Timers............................................................................................................. 285
Clearing the FRRP Counters.......................................................................................................285
Viewing the FRRP Configuration................................................................................................286
Viewing the FRRP Information................................................................................................... 286
Troubleshooting FRRP......................................................................................................................286
Configuration Checks.................................................................................................................286
Sample Configuration and Topology.............................................................................................. 286
16 GARP VLAN Registration Protocol (GVRP)................................................289
Important Points to Remember....................................................................................................... 289
Configure GVRP................................................................................................................................290
Related Configuration Tasks...................................................................................................... 290
Enabling GVRP Globally....................................................................................................................291
Enabling GVRP on a Layer 2 Interface..............................................................................................291
Configure GVRP Registration........................................................................................................... 291
Configure a GARP Timer.................................................................................................................. 292
17 Internet Group Management Protocol (IGMP).........................................294
IGMP Implementation Information..................................................................................................294
IGMP Protocol Overview..................................................................................................................294
IGMP Version 2............................................................................................................................294
IGMP Version 3............................................................................................................................296
Configure IGMP................................................................................................................................ 299
Related Configuration Tasks...................................................................................................... 299
Viewing IGMP Enabled Interfaces....................................................................................................300
Selecting an IGMP Version...............................................................................................................300
Viewing IGMP Groups.......................................................................................................................301
Adjusting Timers................................................................................................................................301
Adjusting Query and Response Timers...................................................................................... 301
Adjusting the IGMP Querier Timeout Value...............................................................................302
Configuring a Static IGMP Group.................................................................................................... 302
Enabling IGMP Immediate-Leave.................................................................................................... 303
IGMP Snooping.................................................................................................................................303
IGMP Snooping Implementation Information...........................................................................303
Configuring IGMP Snooping...................................................................................................... 303
Removing a Group-Port Association.........................................................................................304
Disabling Multicast Flooding...................................................................................................... 304
Specifying a Port as Connected to a Multicast Router..............................................................305
Configuring the Switch as Querier.............................................................................................305
Fast Convergence after MSTP Topology Changes......................................................................... 306
Egress Interface Selection (EIS) for HTTP and IGMP Applications................................................. 306
Protocol Separation.................................................................................................................... 307
Enabling and Disabling Management Egress Interface Selection............................................ 308
Handling of Management Route Configuration........................................................................309
Handling of Switch-Initiated Traffic...........................................................................................309
Handling of Switch-Destined Traffic..........................................................................................310
Handling of Transit Traffic (Traffic Separation)...........................................................................311
Mapping of Management Applications and Traffic Type........................................................... 311
Behavior of Various Applications for Switch-Initiated Traffic ...................................................312
Behavior of Various Applications for Switch-Destined Traffic ................................................. 313
Interworking of EIS With Various Applications...........................................................................314
Designating a Multicast Router Interface......................................................................................... 315
18 Interfaces......................................................................................................... 316
Basic Interface Configuration...........................................................................................................316
Advanced Interface Configuration................................................................................................... 316
Interface Types.................................................................................................................................. 317
View Basic Interface Information......................................................................................................317
Enabling a Physical Interface............................................................................................................ 319
Physical Interfaces.............................................................................................................................319
Configuration Task List for Physical Interfaces..........................................................................320
Overview of Layer Modes...........................................................................................................320
Configuring Layer 2 (Data Link) Mode....................................................................................... 320
Configuring Layer 2 (Interface) Mode.........................................................................................321
Configuring Layer 3 (Network) Mode......................................................................................... 321
Configuring Layer 3 (Interface) Mode........................................................................................ 322
Egress Interface Selection (EIS)........................................................................................................ 322
Important Points to Remember..................................................................................................323
Configuring EIS........................................................................................................................... 323
Management Interfaces....................................................................................................................323
Configuring Management Interfaces......................................................................................... 323
Configuring Management Interfaces on the S-Series...............................................................324
VLAN Interfaces.................................................................................................................................325
Loopback Interfaces......................................................................................................................... 325
Null Interfaces...................................................................................................................................326
Port Channel Interfaces....................................................................................................................326
Port Channel Definition and Standards......................................................................................326
Port Channel Benefits................................................................................................................. 327
Port Channel Implementation.................................................................................................... 327
10/100/1000 Mbps Interfaces in Port Channels........................................................................328
Configuration Tasks for Port Channel Interfaces...................................................................... 328
Creating a Port Channel............................................................................................................. 328
Adding a Physical Interface to a Port Channel.......................................................................... 329
Reassigning an Interface to a New Port Channel...................................................................... 331
Configuring the Minimum Oper Up Links in a Port Channel.................................................... 332
..................................................................................................................................................... 332
Assigning an IP Address to a Port Channel................................................................................ 333
Deleting or Disabling a Port Channel.........................................................................................333
Load Balancing Through Port Channels.................................................................................... 333
Load-Balancing Method............................................................................................................. 333
Changing the Hash Algorithm....................................................................................................334
Bulk Configuration............................................................................................................................335
Interface Range........................................................................................................................... 335
Bulk Configuration Examples..................................................................................................... 336
Defining Interface Range Macros.....................................................................................................337
Define the Interface Range.........................................................................................................338
Choosing an Interface-Range Macro........................................................................................ 338
Monitoring and Maintaining Interfaces............................................................................................338
Maintenance Using TDR............................................................................................................. 339
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 340
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................340
Important Points to Remember..................................................................................................341
Support for LM4 Optics.............................................................................................................. 342
Example Scenarios......................................................................................................................342
Link Dampening................................................................................................................................346
Important Points to Remember................................................................................................. 346
Enabling Link Dampening...........................................................................................................346
Link Bundle Monitoring.................................................................................................................... 348
Using Ethernet Pause Frames for Flow Control.............................................................................. 348
Enabling Pause Frames...............................................................................................................349
Configure the MTU Size on an Interface......................................................................................... 349
Port-Pipes......................................................................................................................................... 350
Auto-Negotiation on Ethernet Interfaces........................................................................................ 351
Setting the Speed and Duplex Mode of Ethernet Interfaces..................................................... 351
Set Auto-Negotiation Options....................................................................................................353
View Advanced Interface Information............................................................................................. 354
Configuring the Interface Sampling Size................................................................................... 354
Dynamic Counters............................................................................................................................356
Clearing Interface Counters....................................................................................................... 356
Enhanced Validation of Interface Ranges........................................................................................ 357
19 Internet Protocol Security (IPSec)...............................................................358
Configuring IPSec ............................................................................................................................ 359
20 IPv4 Routing................................................................................................... 360
IP Addresses......................................................................................................................................360
Implementation Information......................................................................................................360
Configuration Tasks for IP Addresses.............................................................................................. 360
Assigning IP Addresses to an Interface.............................................................................................361
Configuring Static Routes.................................................................................................................362
Configure Static Routes for the Management Interface.................................................................364
IPv4 Path MTU Discovery Overview.................................................................................................364
Using the Configured Source IP Address in ICMP Messages..........................................................365
Configuring the ICMP Source Interface.....................................................................................365
Configuring the Duration to Establish a TCP Connection..............................................................366
Enabling Directed Broadcast............................................................................................................366
Resolution of Host Names................................................................................................................367
Enabling Dynamic Resolution of Host Names.................................................................................367
Specifying the Local System Domain and a List of Domains..........................................................368
Configuring DNS with Traceroute................................................................................................... 368
ARP.................................................................................................................................................... 369
Configuration Tasks for ARP............................................................................................................ 369
Configuring Static ARP Entries......................................................................................................... 370
Enabling Proxy ARP...........................................................................................................................370
Clearing ARP Cache..........................................................................................................................370
ARP Learning via Gratuitous ARP......................................................................................................371
Enabling ARP Learning via Gratuitous ARP.......................................................................................371
ARP Learning via ARP Request..........................................................................................................372
Configuring ARP Retries....................................................................................................................372
ICMP.................................................................................................................................................. 373
Configuration Tasks for ICMP...........................................................................................................373
Enabling ICMP Unreachable Messages............................................................................................373
UDP Helper........................................................................................................................................374
Configure UDP Helper................................................................................................................ 374
Important Points to Remember..................................................................................................374
Enabling UDP Helper........................................................................................................................ 374
Configuring a Broadcast Address.....................................................................................................375
Configurations Using UDP Helper....................................................................................................375
UDP Helper with Broadcast-All Addresses...................................................................................... 376
UDP Helper with Subnet Broadcast Addresses................................................................................376
UDP Helper with Configured Broadcast Addresses.........................................................................377
UDP Helper with No Configured Broadcast Addresses.................................................................. 378
Troubleshooting UDP Helper...........................................................................................................378
21 IPv6 Routing.................................................................................................... 379
Protocol Overview............................................................................................................................ 379
Extended Address Space.............................................................................................................379
Stateless Autoconfiguration........................................................................................................379
IPv6 Headers............................................................................................................................... 380
IPv6 Header Fields.......................................................................................................................381
Extension Header Fields..............................................................................................................382
Addressing...................................................................................................................................383
Implementing IPv6 with Dell Networking OS..................................................................................385
ICMPv6.............................................................................................................................................. 387
Path MTU Discovery..........................................................................................................................387
IPv6 Neighbor Discovery..................................................................................................................388
IPv6 Neighbor Discovery of MTU Packets.................................................................................389
Configuration Task List for IPv6 RDNSS.......................................................................................... 389
Configuring the IPv6 Recursive DNS Server.............................................................................. 389
Debugging IPv6 RDNSS Information Sent to the Host ............................................................ 390
Displaying IPv6 RDNSS Information........................................................................................... 391
Secure Shell (SSH) Over an IPv6 Transport...................................................................................... 391
Configuration Tasks for IPv6............................................................................................................ 392
Adjusting Your CAM-Profile........................................................................................................392
Assigning an IPv6 Address to an Interface.................................................................................393
Assigning a Static IPv6 Route..................................................................................................... 393
Configuring Telnet with IPv6......................................................................................................394
SNMP over IPv6...........................................................................................................................394
Showing IPv6 Information..........................................................................................................394
Showing an IPv6 Interface..........................................................................................................395
Showing IPv6 Routes..................................................................................................................396
Showing the Running-Configuration for an Interface.............................................................. 397
Clearing IPv6 Routes...................................................................................................................397
Configuring IPv6 RA Guard.............................................................................................................. 398
Configuring IPv6 RA Guard on an Interface..............................................................................400
Monitoring IPv6 RA Guard..........................................................................................................400
22 Intermediate System to Intermediate System.......................................... 401
IS-IS Protocol Overview................................................................................................................... 401
IS-IS Addressing................................................................................................................................ 401
Multi-Topology IS-IS........................................................................................................................ 402
Transition Mode..........................................................................................................................403
Interface Support........................................................................................................................403
Adjacencies................................................................................................................................. 403
Graceful Restart................................................................................................................................403
Timers..........................................................................................................................................404
Implementation Information........................................................................................................... 404
Configuration Information............................................................................................................... 405
Configuration Tasks for IS-IS..................................................................................................... 405
Configuring the Distance of a Route..........................................................................................414
Changing the IS-Type................................................................................................................. 414
Redistributing IPv4 Routes.......................................................................................................... 417
Redistributing IPv6 Routes..........................................................................................................418
Configuring Authentication Passwords......................................................................................418
Setting the Overload Bit..............................................................................................................419
Debugging IS-IS..........................................................................................................................420
IS-IS Metric Styles..............................................................................................................................421
Configure Metric Values................................................................................................................... 421
Maximum Values in the Routing Table...................................................................................... 422
Change the IS-IS Metric Style in One Level Only...................................................................... 422
Leaks from One Level to Another.............................................................................................. 423
Sample Configurations.....................................................................................................................424
23 Link Aggregation Control Protocol (LACP)...............................................427
Introduction to Dynamic LAGs and LACP........................................................................................427
Important Points to Remember..................................................................................................427
LACP Modes................................................................................................................................428
Configuring LACP Commands...................................................................................................428
LACP Configuration Tasks................................................................................................................429
Creating a LAG............................................................................................................................ 429
Configuring the LAG Interfaces as Dynamic............................................................................. 430
Setting the LACP Long Timeout.................................................................................................430
Monitoring and Debugging LACP...............................................................................................431
Shared LAG State Tracking............................................................................................................... 431
Configuring Shared LAG State Tracking.................................................................................... 432
Important Points about Shared LAG State Tracking..................................................................433
LACP Basic Configuration Example................................................................................................. 434
Configure a LAG on ALPHA........................................................................................................434
Setting Up a Threshold for Utilization of High-Gigabit Port Channels...........................................441
Guidelines for Monitoring High-Gigabit Port Channels............................................................443
Enabling the Verification of Member Links Utilization in a High-Gigabit Port Channel................444
Viewing Buffer Utilization and Queue Statistics on High-Gigabit Ethernet Backplane Ports....... 444
24 Layer 2..............................................................................................................446
Manage the MAC Address Table......................................................................................................446
Clearing the MAC Address Table............................................................................................... 446
Setting the Aging Time for Dynamic Entries..............................................................................446
Configuring a Static MAC Address............................................................................................. 447
Displaying the MAC Address Table.............................................................................................447
MAC Learning Limit...........................................................................................................................447
Setting the MAC Learning Limit................................................................................................. 448
mac learning-limit Dynamic.......................................................................................................448
mac learning-limit mac-address-sticky.................................................................................... 449
mac learning-limit station-move...............................................................................................449
mac learning-limit no-station-move.........................................................................................449
Learning Limit Violation Actions................................................................................................ 450
Setting Station Move Violation Actions......................................................................................450
Recovering from Learning Limit and Station Move Violations.................................................. 451
NIC Teaming......................................................................................................................................451
Configure Redundant Pairs.............................................................................................................. 452
Important Points about Configuring Redundant Pairs..............................................................454
Far-End Failure Detection................................................................................................................ 455
FEFD State Changes....................................................................................................................456
Configuring FEFD........................................................................................................................ 457
Enabling FEFD on an Interface...................................................................................................458
Debugging FEFD......................................................................................................................... 459
25 Link Layer Discovery Protocol (LLDP)........................................................ 461
802.1AB (LLDP) Overview................................................................................................................. 461
Protocol Data Units.....................................................................................................................461
Optional TLVs....................................................................................................................................462
Management TLVs...................................................................................................................... 462
TIA-1057 (LLDP-MED) Overview......................................................................................................464
TIA Organizationally Specific TLVs.............................................................................................465
Configure LLDP................................................................................................................................ 469
Related Configuration Tasks...................................................................................................... 469
Important Points to Remember................................................................................................. 470
LLDP Compatibility..................................................................................................................... 470
CONFIGURATION versus INTERFACE Configurations....................................................................470
Enabling LLDP....................................................................................................................................471
Disabling and Undoing LLDP...................................................................................................... 471
Enabling LLDP on Management Ports..............................................................................................471
Disabling and Undoing LLDP on Management Ports................................................................ 471
Advertising TLVs................................................................................................................................472
Viewing the LLDP Configuration......................................................................................................473
Viewing Information Advertised by Adjacent LLDP Agents.............................................................474
Configuring LLDPDU Intervals..........................................................................................................475
Configuring Transmit and Receive Mode........................................................................................ 475
Configuring a Time to Live............................................................................................................... 476
Debugging LLDP............................................................................................................................... 477
Relevant Management Objects........................................................................................................478
26 Microsoft Network Load Balancing........................................................... 484
NLB Unicast Mode Scenario............................................................................................................ 484
NLB Multicast Mode Scenario.......................................................................................................... 485
Limitations With Enabling NLB on Switches....................................................................................485
Benefits and Working of Microsoft Clustering................................................................................ 485
Enable and Disable VLAN Flooding .................................................................................................486
Configuring a Switch for NLB ......................................................................................................... 486
.....................................................................................................................................................486
27 Multicast Source Discovery Protocol (MSDP)...........................................487
Protocol Overview............................................................................................................................487
Anycast RP........................................................................................................................................ 489
Implementation Information............................................................................................................489
Configure Multicast Source Discovery Protocol.............................................................................489
Related Configuration Tasks...................................................................................................... 489
Enable MSDP.....................................................................................................................................493
Manage the Source-Active Cache...................................................................................................494
Viewing the Source-Active Cache............................................................................................. 494
Limiting the Source-Active Cache............................................................................................. 495
Clearing the Source-Active Cache.............................................................................................495
Enabling the Rejected Source-Active Cache.............................................................................495
Accept Source-Active Messages that Fail the RFP Check.............................................................. 495
Specifying Source-Active Messages................................................................................................ 499
Limiting the Source-Active Messages from a Peer......................................................................... 500
Preventing MSDP from Caching a Local Source.............................................................................500
Preventing MSDP from Caching a Remote Source.........................................................................501
Preventing MSDP from Advertising a Local Source........................................................................ 502
Logging Changes in Peership States................................................................................................503
Terminating a Peership.....................................................................................................................503
Clearing Peer Statistics..................................................................................................................... 503
Debugging MSDP............................................................................................................................. 504
MSDP with Anycast RP..................................................................................................................... 504
Configuring Anycast RP....................................................................................................................506
Reducing Source-Active Message Flooding..............................................................................506
Specifying the RP Address Used in SA Messages...................................................................... 506
MSDP Sample Configurations..........................................................................................................509
28 Multiple Spanning Tree Protocol (MSTP)...................................................513
Protocol Overview.............................................................................................................................513
Spanning Tree Variations.................................................................................................................. 514
Implementation Information...................................................................................................... 514
Configure Multiple Spanning Tree Protocol.................................................................................... 514
Related Configuration Tasks.......................................................................................................514
Enable Multiple Spanning Tree Globally...........................................................................................515
Adding and Removing Interfaces......................................................................................................515
Creating Multiple Spanning Tree Instances......................................................................................515
Influencing MSTP Root Selection..................................................................................................... 517
Interoperate with Non-Dell Networking OS Bridges.......................................................................517
Changing the Region Name or Revision..........................................................................................518
Modifying Global Parameters........................................................................................................... 518
Modifying the Interface Parameters................................................................................................. 519
Configuring an EdgePort..................................................................................................................520
Flush MAC Addresses after a Topology Change..............................................................................521
MSTP Sample Configurations........................................................................................................... 521
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration............................................................ 522
Debugging and Verifying MSTP Configurations.............................................................................. 525
29 Multicast Features..........................................................................................528
Enabling IP Multicast.........................................................................................................................528
Multicast with ECMP.........................................................................................................................528
Implementation Information............................................................................................................529
First Packet Forwarding for Lossless Multicast................................................................................530
Multicast Policies.............................................................................................................................. 530
IPv4 Multicast Policies................................................................................................................ 530
30 Object Tracking..............................................................................................538
Object Tracking Overview................................................................................................................538
Track Layer 2 Interfaces..............................................................................................................539
Track Layer 3 Interfaces..............................................................................................................539
Track IPv4 and IPv6 Routes........................................................................................................540
Set Tracking Delays..................................................................................................................... 541
VRRP Object Tracking................................................................................................................. 541
Object Tracking Configuration.........................................................................................................541
Tracking a Layer 2 Interface........................................................................................................541
Tracking a Layer 3 Interface....................................................................................................... 543
Track an IPv4/IPv6 Route........................................................................................................... 544
Displaying Tracked Objects..............................................................................................................548
31 Open Shortest Path First (OSPFv2 and OSPFv3).......................................550
Protocol Overview............................................................................................................................550
Autonomous System (AS) Areas................................................................................................. 550
Area Types....................................................................................................................................551
Networks and Neighbors............................................................................................................552
Router Types............................................................................................................................... 552
Designated and Backup Designated Routers............................................................................ 554
Link-State Advertisements (LSAs)............................................................................................... 554
Router Priority and Cost............................................................................................................. 556
OSPF with Dell Networking OS........................................................................................................ 556
Graceful Restart...........................................................................................................................557
Fast Convergence (OSPFv2, IPv4 Only)..................................................................................... 558
Multi-Process OSPFv2 (IPv4 only)..............................................................................................558
RFC-2328 Compliant OSPF Flooding........................................................................................ 559
OSPF ACK Packing......................................................................................................................560
Setting OSPF Adjacency with Cisco Routers.............................................................................560
Configuration Information................................................................................................................561
Configuration Task List for OSPFv2 (OSPF for IPv4).................................................................. 561
Sample Configurations for OSPFv2..................................................................................................576
Basic OSPFv2 Router Topology..................................................................................................576
OSPF Area 0 — Te 1/1 and 1/2.................................................................................................... 576
OSPF Area 0 — Te 3/1 and 3/2....................................................................................................577
OSPF Area 0 — Te 2/1 and 2/2....................................................................................................577
Configuration Task List for OSPFv3 (OSPF for IPv6)........................................................................577
Enabling IPv6 Unicast Routing....................................................................................................578
Assigning IPv6 Addresses on an Interface..................................................................................578
Assigning Area ID on an Interface.............................................................................................. 578
Assigning OSPFv3 Process ID and Router ID Globally...............................................................579
Configuring Stub Areas............................................................................................................... 579
Configuring Passive-Interface.................................................................................................... 579
Redistributing Routes................................................................................................................. 580
Configuring a Default Route...................................................................................................... 580
Enabling OSPFv3 Graceful Restart..............................................................................................581
OSPFv3 Authentication Using IPsec...........................................................................................583
Troubleshooting OSPFv3............................................................................................................590
32 Policy-based Routing (PBR)......................................................................... 592
Overview........................................................................................................................................... 592
Implementing Policy-based Routing with Dell Networking OS.....................................................594
Configuration Task List for Policy-based Routing.......................................................................... 594
PBR Exceptions (Permit)..............................................................................................................597
Sample Configuration...................................................................................................................... 600
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View
Redirect-List GOLD.....................................................................................................................601
33 PIM Sparse-Mode (PIM-SM)......................................................................... 605
Implementation Information............................................................................................................605
Protocol Overview............................................................................................................................605
Requesting Multicast Traffic.......................................................................................................605
Refuse Multicast Traffic.............................................................................................................. 606
Send Multicast Traffic................................................................................................................. 606
Configuring PIM-SM.........................................................................................................................607
Related Configuration Tasks.......................................................................................................607
Enable PIM-SM..................................................................................................................................607
Configuring S,G Expiry Timers.........................................................................................................608
Configuring a Static Rendezvous Point...........................................................................................609
Overriding Bootstrap Router Updates....................................................................................... 609
Configuring a Designated Router.....................................................................................................610
Creating Multicast Boundaries and Domains.................................................................................. 610
Enabling PIM-SM Graceful Restart....................................................................................................611
34 PIM Source-Specific Mode (PIM-SSM)....................................................... 612
Implementation Information............................................................................................................ 612
Important Points to Remember..................................................................................................612
Configure PIM-SMM......................................................................................................................... 613
/