Force10 MXL Blade

Dell Force10 MXL Blade User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell Force10 MXL Blade User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Networking Conguration Guide for the MXL
10/40GbE Switch I/O Module
9.7(0.0)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell
and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be
trademarks of their respective companies.
2015 - 01
Rev. A00
Contents
1 About this Guide............................................................................................................ 30
Audience.......................................................................................................................................................................... 30
Conventions..................................................................................................................................................................... 30
Information Symbols.........................................................................................................................................................30
Related Documents...........................................................................................................................................................31
2 Conguration Fundamentals..........................................................................................32
Accessing the Command Line.......................................................................................................................................... 32
CLI Modes........................................................................................................................................................................32
Navigating CLI Modes................................................................................................................................................ 33
The do Command.............................................................................................................................................................36
Undoing Commands.........................................................................................................................................................36
Obtaining Help..................................................................................................................................................................37
Entering and Editing Commands.......................................................................................................................................37
Command History............................................................................................................................................................ 38
Filtering show Command Outputs.................................................................................................................................... 38
Multiple Users in Conguration Mode...............................................................................................................................39
3 Getting Started..............................................................................................................41
Console Access................................................................................................................................................................ 42
Serial Console.............................................................................................................................................................42
External Serial Port with a USB Connector.................................................................................................................44
Accessing the CLI Interface and Running Scripts Using SSH........................................................................................... 44
Entering CLI commands Using an SSH Connection....................................................................................................44
Executing Local CLI Scripts Using an SSH Connection.............................................................................................. 44
Boot Process....................................................................................................................................................................45
Default Conguration....................................................................................................................................................... 46
Conguring a Host Name.................................................................................................................................................46
Conguring a Host Name................................................................................................................................................. 47
Accessing the System Remotely.......................................................................................................................................47
Accessing the MXL Switch Remotely.........................................................................................................................47
Congure the Management Port IP Address.............................................................................................................. 47
Congure a Management Route.................................................................................................................................48
Conguring a Username and Password...................................................................................................................... 48
Conguring the Enable Password.....................................................................................................................................48
Conguration File Management........................................................................................................................................49
Copy Files to and from the System............................................................................................................................ 49
Save the Running-Conguration................................................................................................................................ 50
Viewing Files............................................................................................................................................................... 51
Managing the File System................................................................................................................................................ 52
View the Command History..............................................................................................................................................53
Using HTTP for File Transfers.......................................................................................................................................... 53
3
Upgrading and Downgrading the Dell Networking OS...................................................................................................... 53
Using Hashes to Validate Software Images...................................................................................................................... 53
4 Management.................................................................................................................55
Conguring Privilege Levels............................................................................................................................................. 55
Creating a Custom Privilege Level..............................................................................................................................55
Customizing a Privilege Level.....................................................................................................................................56
Applying a Privilege Level to a Username....................................................................................................................57
Applying a Privilege Level to a Terminal Line............................................................................................................... 57
Conguring Logging......................................................................................................................................................... 58
Audit and Security Logs............................................................................................................................................. 58
Conguring Logging Format .....................................................................................................................................60
Setting Up a Secure Connection to a Syslog Server...................................................................................................60
Display the Logging Buer and the Logging Conguration................................................................................................61
Log Messages in the Internal Buer................................................................................................................................. 62
Conguration Task List for System Log Management................................................................................................ 62
Disabling System Logging.................................................................................................................................................62
Sending System Messages to a Syslog Server................................................................................................................. 62
Conguring a UNIX System as a Syslog Server..........................................................................................................62
Changing System Logging Settings..................................................................................................................................63
Display the Logging Buer and the Logging Conguration............................................................................................... 64
Conguring a UNIX Logging Facility Level........................................................................................................................ 64
Synchronizing Log Messages........................................................................................................................................... 65
Enabling Timestamp on Syslog Messages........................................................................................................................ 66
Enabling Secure Mode..................................................................................................................................................... 66
File Transfer Services........................................................................................................................................................67
Conguration Task List for File Transfer Services........................................................................................................67
Enabling the FTP Server.............................................................................................................................................67
Conguring FTP Server Parameters...........................................................................................................................67
Conguring FTP Client Parameters............................................................................................................................ 68
Terminal Lines...................................................................................................................................................................68
Denying and Permitting Access to a Terminal Line......................................................................................................68
Conguring Login Authentication for Terminal Lines...................................................................................................69
Setting Time Out of EXEC Privilege Mode....................................................................................................................... 70
Using Telnet to get to Another Network Device............................................................................................................... 70
Lock CONFIGURATION Mode.......................................................................................................................................... 71
Viewing the Conguration Lock Status....................................................................................................................... 71
Recovering from a Forgotten Password............................................................................................................................72
Recovering from a Forgotten Enable Password................................................................................................................ 73
Recovering from a Failed Start......................................................................................................................................... 73
5 802.1X........................................................................................................................... 75
The Port-Authentication Process..................................................................................................................................... 76
EAP over RADIUS.......................................................................................................................................................77
Conguring 802.1X........................................................................................................................................................... 78
Related Conguration Tasks....................................................................................................................................... 78
4
Important Points to Remember........................................................................................................................................ 78
Enabling 802.1X................................................................................................................................................................ 79
Conguring Request Identity Re-Transmissions..........................................................................................................80
Conguring a Quiet Period after a Failed Authentication.............................................................................................81
Forcibly Authorizing or Unauthorizing a Port.................................................................................................................... 82
Re-Authenticating a Port..................................................................................................................................................82
Conguring Timeouts....................................................................................................................................................... 83
Conguring Dynamic VLAN Assignment with Port Authentication................................................................................... 84
Guest and Authentication-Fail VLANs........................................................................................................................ 85
Conguring a Guest VLAN......................................................................................................................................... 86
Conguring an Authentication-Fail VLAN................................................................................................................... 86
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)..... 88
Optimizing CAM Utilization During the Attachment of ACLs to VLANs............................................................................88
Guidelines for Conguring ACL VLAN groups...................................................................................................................89
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters........................................................... 89
Conguring ACL VLAN Groups.................................................................................................................................. 89
Conguring FP Blocks for VLAN Parameters............................................................................................................. 90
Viewing CAM Usage......................................................................................................................................................... 91
Allocating FP Blocks for VLAN Processes........................................................................................................................ 92
7 Access Control Lists (ACLs).......................................................................................... 94
IP Access Control Lists (ACLs).........................................................................................................................................94
Implementing ACL on the Dell Networking OS................................................................................................................. 95
ACLs and VLANs..............................................................................................................................................................95
ACL Optimization............................................................................................................................................................. 95
Determine the Order in which ACLs are Used to Classify Trac...................................................................................... 95
Example of the order Keyword to Determine ACL Sequence......................................................................................95
IP Fragment Handling.......................................................................................................................................................96
IP Fragments ACL Examples............................................................................................................................................ 96
Layer 4 ACL Rules Examples............................................................................................................................................ 96
Congure a Standard IP ACL............................................................................................................................................97
Conguring a Standard IP ACL Filter................................................................................................................................98
Congure an Extended IP ACL.........................................................................................................................................99
Conguring Filters with a Sequence Number................................................................................................................... 99
Conguring Filters Without a Sequence Number............................................................................................................100
Established Flag..............................................................................................................................................................100
Congure Layer 2 and Layer 3 ACLs...............................................................................................................................100
Assign an IP ACL to an Interface..................................................................................................................................... 101
Applying an IP ACL.......................................................................................................................................................... 101
Counting ACL Hits.......................................................................................................................................................... 102
Congure Ingress ACLs...................................................................................................................................................102
Congure Egress ACLs................................................................................................................................................... 103
Applying Egress Layer 3 ACLs (Control-Plane)................................................................................................................103
IP Prex Lists..................................................................................................................................................................104
Implementation Information...................................................................................................................................... 104
5
Conguration Task List for Prex Lists............................................................................................................................104
Creating a Prex List...................................................................................................................................................... 105
Creating a Prex List Without a Sequence Number........................................................................................................105
Viewing Prex Lists.........................................................................................................................................................106
Applying a Prex List for Route Redistribution................................................................................................................ 107
Applying a Filter to a Prex List (OSPF)..........................................................................................................................107
ACL Resequencing..........................................................................................................................................................108
Resequencing an ACL or Prex List................................................................................................................................ 108
Route Maps.....................................................................................................................................................................110
Implementation Information.......................................................................................................................................110
Important Points to Remember....................................................................................................................................... 110
Conguration Task List for Route Maps...........................................................................................................................110
Creating a Route Map......................................................................................................................................................110
Congure Route Map Filters............................................................................................................................................112
Conguring Match Routes...............................................................................................................................................112
Conguring Set Conditions..............................................................................................................................................113
Congure a Route Map for Route Redistribution............................................................................................................. 114
Congure a Route Map for Route Tagging.......................................................................................................................114
Continue Clause.............................................................................................................................................................. 115
Logging of ACL Processes...............................................................................................................................................115
Guidelines for Conguring ACL Logging...........................................................................................................................116
Conguring ACL Logging.................................................................................................................................................116
Flow-Based Monitoring Support for ACLs....................................................................................................................... 117
Behavior of Flow-Based Monitoring...........................................................................................................................117
Enabling Flow-Based Monitoring..................................................................................................................................... 119
8 Bidirectional Forwarding Detection (BFD)....................................................................120
How BFD Works............................................................................................................................................................. 120
BFD Packet Format................................................................................................................................................... 121
BFD Sessions............................................................................................................................................................122
BFD Three-Way Handshake...................................................................................................................................... 123
Session State Changes............................................................................................................................................. 125
Important Points to Remember.......................................................................................................................................125
Congure BFD................................................................................................................................................................ 125
Congure BFD for Physical Ports..............................................................................................................................126
Enabling BFD Globally............................................................................................................................................... 126
Establishing a Session on Physical Ports................................................................................................................... 127
Changing Physical Port Session Parameters............................................................................................................. 128
Disabling and Re-Enabling BFD.................................................................................................................................129
Congure BFD for Static Routes.....................................................................................................................................129
Related Conguration Tasks......................................................................................................................................129
Establishing Sessions for Static Routes.....................................................................................................................130
Changing Static Route Session Parameters.............................................................................................................. 130
Disabling BFD for Static Routes.................................................................................................................................131
Congure BFD for OSPF................................................................................................................................................. 131
Related Conguration Tasks.......................................................................................................................................131
6
Establishing Sessions with OSPF Neighbors............................................................................................................. 132
Changing OSPF Session Parameters........................................................................................................................ 133
Disabling BFD for OSPF............................................................................................................................................133
Congure BFD for OSPFv3.............................................................................................................................................133
Related Conguration Tasks......................................................................................................................................134
Establishing Sessions with OSPFv3 Neighbors......................................................................................................... 134
Changing OSPFv3 Session Parameters.....................................................................................................................134
Disabling BFD for OSPFv3........................................................................................................................................ 134
Congure BFD for BGP.................................................................................................................................................. 135
Prerequisites............................................................................................................................................................. 135
Establishing Sessions with BGP Neighbors...............................................................................................................135
Disabling BFD for BGP.............................................................................................................................................. 137
Use BFD in a BGP Peer Group.................................................................................................................................. 137
Displaying BFD for BGP Information......................................................................................................................... 138
Congure BFD for VRRP................................................................................................................................................ 142
Related Conguration Tasks......................................................................................................................................142
Establishing Sessions with All VRRP Neighbors........................................................................................................ 142
Establishing VRRP Sessions on VRRP Neighbors..................................................................................................... 143
Changing VRRP Session Parameters........................................................................................................................ 143
Disabling BFD for VRRP............................................................................................................................................144
Congure BFD for VLANs...............................................................................................................................................144
Related Conguration Task....................................................................................................................................... 144
Establish Sessions with VLAN Neighbors..................................................................................................................145
Changing VLAN Session Parameters........................................................................................................................ 145
Disabling BFD for VLANs.......................................................................................................................................... 146
Congure BFD for Port-Channels................................................................................................................................... 146
Related Conguration Tasks......................................................................................................................................146
Establish Sessions on Port-Channels........................................................................................................................ 146
Changing Physical Port Session Parameters............................................................................................................. 147
Disabling BFD for Port-Channels...............................................................................................................................147
Conguring Protocol Liveness.........................................................................................................................................147
Troubleshooting BFD.......................................................................................................................................................148
9 Border Gateway Protocol IPv4 (BGPv4)...................................................................... 149
Autonomous Systems (AS)............................................................................................................................................. 149
Sessions and Peers..........................................................................................................................................................151
Establish a Session.................................................................................................................................................... 151
Route Reectors.............................................................................................................................................................152
Communities.............................................................................................................................................................153
BGP Attributes............................................................................................................................................................... 153
Best Path Selection Criteria......................................................................................................................................153
Weight......................................................................................................................................................................155
Local Preference.......................................................................................................................................................155
Multi-Exit Discriminators (MEDs)............................................................................................................................. 156
Origin........................................................................................................................................................................ 157
AS Path.....................................................................................................................................................................157
7
Next Hop..................................................................................................................................................................158
Multiprotocol BGP.......................................................................................................................................................... 158
Implement BGP with the Dell Networking OS.................................................................................................................158
Additional Path (Add-Path) Support......................................................................................................................... 158
Advertise IGP Cost as MED for Redistributed Routes...............................................................................................159
Ignore Router-ID for Some Best-Path Calculations................................................................................................... 159
Four-Byte AS Numbers.............................................................................................................................................159
AS4 Number Representation.................................................................................................................................... 160
AS Number Migration................................................................................................................................................ 161
BGP4 Management Information Base (MIB).............................................................................................................163
Important Points to Remember.................................................................................................................................163
Conguration Information............................................................................................................................................... 164
BGP Conguration..........................................................................................................................................................164
Enabling BGP............................................................................................................................................................165
Enabling MBGP Congurations.................................................................................................................................194
BGP Regular Expression Optimization............................................................................................................................ 194
Debugging BGP.............................................................................................................................................................. 194
Storing Last and Bad PDUs...................................................................................................................................... 195
PDU Counters...........................................................................................................................................................196
Sample Congurations....................................................................................................................................................196
10 Content Addressable Memory (CAM)........................................................................205
CAM Allocation.............................................................................................................................................................. 205
Test CAM Usage............................................................................................................................................................206
View CAM-ACL Settings................................................................................................................................................206
CAM Optimization..........................................................................................................................................................207
11 Control Plane Policing (CoPP)....................................................................................208
Congure Control Plane Policing....................................................................................................................................209
Conguring CoPP for Protocols................................................................................................................................210
Conguring CoPP for CPU Queues........................................................................................................................... 211
Show Commands......................................................................................................................................................212
12 Data Center Bridging (DCB)....................................................................................... 214
Ethernet Enhancements in Data Center Bridging............................................................................................................214
Priority-Based Flow Control......................................................................................................................................215
Enhanced Transmission Selection............................................................................................................................. 215
Data Center Bridging Exchange Protocol (DCBx)..................................................................................................... 216
Data Center Bridging in a Trac Flow....................................................................................................................... 217
Enabling Data Center Bridging........................................................................................................................................ 217
QoS dot1p Trac Classication and Queue Assignment..................................................................................................218
Conguring Priority-Based Flow Control.........................................................................................................................219
Conguring Lossless Queues....................................................................................................................................220
Conguring the PFC Buer in a Switch Stack..........................................................................................................220
Congure Enhanced Transmission Selection................................................................................................................... 221
ETS Prerequisites and Restrictions........................................................................................................................... 221
8
Creating an ETS Priority Group................................................................................................................................ 222
ETS Operation with DCBx........................................................................................................................................223
Conguring Bandwidth Allocation for DCBx CIN...................................................................................................... 223
Applying DCB Policies in a Switch Stack........................................................................................................................ 224
Applying DCB Policies with an ETS Conguration.......................................................................................................... 224
Congure a DCBx Operation.......................................................................................................................................... 225
DCBx Operation....................................................................................................................................................... 225
DCBx Port Roles...................................................................................................................................................... 225
DCB Conguration Exchange................................................................................................................................... 227
Conguration Source Election.................................................................................................................................. 227
Propagation of DCB Information.............................................................................................................................. 228
Auto-Detection and Manual Conguration of the DCBx Version.............................................................................. 228
DCBx Example......................................................................................................................................................... 228
DCBx Prerequisites and Restrictions........................................................................................................................ 229
Conguring DCBx.................................................................................................................................................... 229
Verifying the DCB Conguration.................................................................................................................................... 233
PFC and ETS Conguration Examples............................................................................................................................ 241
Using PFC and ETS to Manage Data Center Trac.................................................................................................. 241
Using PFC and ETS to Manage Converged Ethernet Trac in a Switch Stack........................................................ 244
Hierarchical Scheduling in ETS Output Policies........................................................................................................ 245
Conguring DCB Maps and its Attributes.......................................................................................................................245
DCB Map: Conguration Procedure......................................................................................................................... 245
Important Points to Remember................................................................................................................................ 246
Applying a DCB Map on a Port.................................................................................................................................246
Conguring PFC without a DCB Map.......................................................................................................................247
Conguring Lossless Queues....................................................................................................................................247
Priority-Based Flow Control Using Dynamic Buer Method........................................................................................... 248
Pause and Resume of Trac....................................................................................................................................248
Buer Sizes for Lossless or PFC Packets.................................................................................................................249
Interworking of DCB Map With DCB Buer Threshold Settings.....................................................................................249
Conguring the Dynamic Buer Method........................................................................................................................250
13 Debugging and Diagnostics........................................................................................252
Oine Diagnostics......................................................................................................................................................... 252
Important Points to Remember................................................................................................................................ 252
Running Oine Diagnostics......................................................................................................................................252
Trace Logs..................................................................................................................................................................... 255
Auto Save on Crash or Rollover................................................................................................................................255
Using the Show Hardware Commands...........................................................................................................................255
Enabling Environmental Monitoring................................................................................................................................ 256
Recognize an Over-Temperature Condition.............................................................................................................. 258
Troubleshoot an Over-Temperature Condition.......................................................................................................... 258
Recognize an Under-Voltage Condition....................................................................................................................259
Troubleshoot an Under-Voltage Condition................................................................................................................259
Buer Tuning................................................................................................................................................................. 259
Deciding to Tune Buers...........................................................................................................................................261
9
Using a Pre-Dened Buer Prole........................................................................................................................... 263
Sample Buer Prole Conguration......................................................................................................................... 264
Troubleshooting Packet Loss..........................................................................................................................................264
Displaying Drop Counters......................................................................................................................................... 264
Dataplane Statistics................................................................................................................................................. 266
Display Stack Port Statistics.....................................................................................................................................267
Display Stack Member Counters.............................................................................................................................. 267
Enabling Application Core Dumps................................................................................................................................... 267
Mini Core Dumps............................................................................................................................................................268
Enabling TCP Dumps..................................................................................................................................................... 269
14 Dynamic Host Conguration Protocol (DHCP)...........................................................270
DHCP Packet Format and Options.................................................................................................................................270
Assign an IP Address using DHCP............................................................................................................................ 272
Implementation Information............................................................................................................................................272
Congure the System to be a DHCP Server...................................................................................................................273
Conguring the Server for Automatic Address Allocation......................................................................................... 273
Conguration Tasks.................................................................................................................................................. 274
Specifying a Default Gateway...................................................................................................................................275
Enabling the DHCP Server....................................................................................................................................... 275
Congure a Method of Hostname Resolution...........................................................................................................275
Creating Manual Binding Entries...............................................................................................................................276
Debugging the DHCP Server....................................................................................................................................277
Using DHCP Clear Commands................................................................................................................................. 277
Congure the System to be a Relay Agent..................................................................................................................... 277
Congure the System to be a DHCP Client....................................................................................................................279
Conguring the DHCP Client System.......................................................................................................................279
DHCP Client on a Management Interface................................................................................................................ 282
DHCP Client Operation with Other Features............................................................................................................283
Congure Secure DHCP.................................................................................................................................................284
Option 82.................................................................................................................................................................284
DHCP Snooping....................................................................................................................................................... 284
Drop DHCP Packets on Snooped VLANs Only......................................................................................................... 287
Dynamic ARP Inspection..........................................................................................................................................288
Conguring Dynamic ARP Inspection.......................................................................................................................289
Source Address Validation........................................................................................................................................290
15 Equal Cost Multi-Path (ECMP)................................................................................. 292
ECMP for Flow-Based Anity....................................................................................................................................... 292
Enabling Deterministic ECMP Next Hop...................................................................................................................292
Link Bundle Monitoring...................................................................................................................................................292
Managing ECMP Group Paths....................................................................................................................................... 293
16 FC FLEXIO FPORT.................................................................................................... 294
FC FLEXIO FPORT........................................................................................................................................................ 294
Conguring Switch Mode to FCF Port Mode.................................................................................................................294
10
Name Server..................................................................................................................................................................295
FCoE Maps....................................................................................................................................................................295
Creating an FCoE Map...................................................................................................................................................296
Zoning............................................................................................................................................................................ 297
Creating Zone and Adding Members.............................................................................................................................. 297
Creating Zone Alias and Adding Members......................................................................................................................298
Creating Zonesets..........................................................................................................................................................298
Activating a Zoneset...................................................................................................................................................... 298
Displaying the Fabric Parameters................................................................................................................................... 299
17 FCoE Transit.............................................................................................................. 302
Fibre Channel over Ethernet.......................................................................................................................................... 302
Ensure Robustness in a Converged Ethernet Network...................................................................................................302
FIP Snooping on Ethernet Bridges................................................................................................................................. 303
FIP Snooping in a Switch Stack..................................................................................................................................... 305
Using FIP Snooping........................................................................................................................................................305
Important Points to Remember................................................................................................................................305
Enabling the FCoE Transit Feature...........................................................................................................................305
Enable FIP Snooping on VLANs............................................................................................................................... 306
Congure the FC-MAP Value...................................................................................................................................306
Congure a Port for a Bridge-to-Bridge Link............................................................................................................306
Congure a Port for a Bridge-to-FCF Link............................................................................................................... 306
Impact on Other Software Features.........................................................................................................................306
FIP Snooping Prerequisites.......................................................................................................................................307
FIP Snooping Restrictions........................................................................................................................................ 307
Conguring FIP Snooping.........................................................................................................................................307
Displaying FIP Snooping Information.............................................................................................................................. 308
FCoE Transit Conguration Example...............................................................................................................................313
18 FIPS Cryptography.....................................................................................................316
Preparing the System..................................................................................................................................................... 316
Enabling FIPS Mode........................................................................................................................................................316
Generating Host-Keys.....................................................................................................................................................317
Monitoring FIPS Mode Status.........................................................................................................................................317
Disabling FIPS Mode....................................................................................................................................................... 318
19 Force10 Resilient Ring Protocol (FRRP)..................................................................... 319
Protocol Overview.......................................................................................................................................................... 319
Ring Status.............................................................................................................................................................. 320
Multiple FRRP Rings................................................................................................................................................. 321
Important FRRP Points............................................................................................................................................ 322
Important FRRP Concepts....................................................................................................................................... 323
Implementing FRRP....................................................................................................................................................... 324
FRRP Conguration....................................................................................................................................................... 324
Creating the FRRP Group........................................................................................................................................ 324
Conguring the Control VLAN..................................................................................................................................324
11
Conguring and Adding the Member VLANs........................................................................................................... 326
Setting the FRRP Timers..........................................................................................................................................327
Clearing the FRRP Counters.................................................................................................................................... 327
Viewing the FRRP Conguration.............................................................................................................................. 327
Viewing the FRRP Information................................................................................................................................. 327
Troubleshooting FRRP....................................................................................................................................................328
Conguration Checks...............................................................................................................................................328
Sample Conguration and Topology............................................................................................................................... 328
20 GARP VLAN Registration Protocol (GVRP)............................................................... 331
Important Points to Remember.......................................................................................................................................331
Congure GVRP............................................................................................................................................................. 331
Related Conguration Tasks..................................................................................................................................... 332
Enabling GVRP Globally..................................................................................................................................................332
Enabling GVRP on a Layer 2 Interface............................................................................................................................333
Congure GVRP Registration.........................................................................................................................................333
Congure a GARP Timer................................................................................................................................................334
21 Internet Group Management Protocol (IGMP)...........................................................335
IGMP Protocol Overview............................................................................................................................................... 335
IGMP Version 2........................................................................................................................................................335
IGMP Version 3........................................................................................................................................................336
IGMP Snooping..............................................................................................................................................................339
IGMP Snooping Implementation Information............................................................................................................339
Conguring IGMP Snooping.....................................................................................................................................340
Enabling IGMP Immediate-Leave............................................................................................................................. 340
Disabling Multicast Flooding......................................................................................................................................341
Specifying a Port as Connected to a Multicast Router..............................................................................................341
Conguring the Switch as Querier............................................................................................................................ 341
Fast Convergence after MSTP Topology Changes..........................................................................................................341
Designating a Multicast Router Interface....................................................................................................................... 342
22 Interfaces..................................................................................................................343
Basic Interface Conguration......................................................................................................................................... 343
Advanced Interface Conguration..................................................................................................................................343
Interface Types...............................................................................................................................................................343
View Basic Interface Information....................................................................................................................................344
Enabling a Physical Interface..........................................................................................................................................346
Physical Interfaces......................................................................................................................................................... 346
Conguration Task List for Physical Interfaces......................................................................................................... 346
Overview of Layer Modes........................................................................................................................................ 346
Conguring Layer 2 (Data Link) Mode......................................................................................................................347
Conguring Layer 2 (Interface) Mode...................................................................................................................... 347
Conguring Layer 3 (Network) Mode...................................................................................................................... 348
Conguring Layer 3 (Interface) Mode...................................................................................................................... 348
Management Interfaces................................................................................................................................................. 349
12
Conguring Management Interfaces on the MXL Switch.........................................................................................349
VLAN Interfaces............................................................................................................................................................. 351
Loopback Interfaces........................................................................................................................................................351
Null Interfaces................................................................................................................................................................352
Port Channel Interfaces................................................................................................................................................. 352
Port Channel Denition and Standards.....................................................................................................................352
Port Channel Benets.............................................................................................................................................. 352
Port Channel Implementation...................................................................................................................................353
100/1000/10000 Mbps Interfaces in Port Channels.................................................................................................353
Conguration Tasks for Port Channel Interfaces...................................................................................................... 353
Creating a Port Channel...........................................................................................................................................354
Adding a Physical Interface to a Port Channel..........................................................................................................354
Reassigning an Interface to a New Port Channel..................................................................................................... 356
Conguring the Minimum Oper Up Links in a Port Channel......................................................................................356
Adding or Removing a Port Channel from a VLAN................................................................................................... 357
Assigning an IP Address to a Port Channel............................................................................................................... 357
Deleting or Disabling a Port Channel.........................................................................................................................357
Server Ports...................................................................................................................................................................358
Default Conguration without Start-up Cong.........................................................................................................358
Bulk Conguration..........................................................................................................................................................358
Interface Range....................................................................................................................................................... 358
Bulk Conguration Examples....................................................................................................................................359
Dening Interface Range Macros...................................................................................................................................360
Dene the Interface Range...................................................................................................................................... 360
Choosing an Interface-Range Macro........................................................................................................................360
Monitoring and Maintaining Interfaces............................................................................................................................ 361
Maintenance Using TDR.......................................................................................................................................... 362
Splitting QSFP Ports to SFP+ Ports...............................................................................................................................362
Merging SFP+ Ports to QSFP 40G Ports.................................................................................................................363
Congure the MTU Size on an Interface..................................................................................................................363
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port......................................................................................... 364
Important Points to Remember................................................................................................................................ 364
Support for LM4 Optics...........................................................................................................................................365
Example Scenarios...................................................................................................................................................365
Layer 2 Flow Control Using Ethernet Pause Frames.......................................................................................................370
Enabling Pause Frames.............................................................................................................................................370
Congure MTU Size on an Interface............................................................................................................................... 371
Port-Pipes...................................................................................................................................................................... 372
Auto-Negotiation on Ethernet Interfaces........................................................................................................................372
Setting the Speed and Duplex Mode of Ethernet Interfaces.................................................................................... 372
View Advanced Interface Information............................................................................................................................. 374
Conguring the Interface Sampling Size...................................................................................................................375
Dynamic Counters.................................................................................................................................................... 376
Enhanced Validation of Interface Ranges........................................................................................................................377
Enhanced Control of Remote Fault Indication Processing...............................................................................................377
13
23 Internet Protocol Security (IPSec)............................................................................ 378
Conguring IPSec ..........................................................................................................................................................378
24 IPv4 Routing............................................................................................................. 380
IP Addresses.................................................................................................................................................................. 380
Implementation Information......................................................................................................................................380
Conguration Tasks for IP Addresses....................................................................................................................... 380
IPv4 Path MTU Discovery Overview..............................................................................................................................383
Using the Congured Source IP Address in ICMP Messages......................................................................................... 384
Conguring the ICMP Source Interface................................................................................................................... 384
Conguring the Duration to Establish a TCP Connection............................................................................................... 384
Enabling Directed Broadcast.......................................................................................................................................... 385
Resolution of Host Names............................................................................................................................................. 385
Enabling Dynamic Resolution of Host Names...........................................................................................................385
Specifying the Local System Domain and a List of Domains.....................................................................................386
Conguring DNS with Traceroute.............................................................................................................................386
ARP................................................................................................................................................................................387
Conguration Tasks for ARP.....................................................................................................................................387
ARP Learning via Gratuitous ARP...................................................................................................................................388
ARP Learning via ARP Request......................................................................................................................................389
Conguring ARP Retries................................................................................................................................................ 389
ICMP............................................................................................................................................................................. 390
Conguration Tasks for ICMP.................................................................................................................................. 390
UDP Helper....................................................................................................................................................................390
Congure UDP Helper..............................................................................................................................................390
Important Points to Remember.................................................................................................................................391
Enabling UDP Helper.................................................................................................................................................391
Congurations Using UDP Helper................................................................................................................................... 391
UDP Helper with Broadcast-All Addresses................................................................................................................391
UDP Helper with Subnet Broadcast Addresses........................................................................................................ 392
UDP Helper with Congured Broadcast Addresses..................................................................................................393
UDP Helper with No Congured Broadcast Addresses............................................................................................ 393
Troubleshooting UDP Helper.......................................................................................................................................... 393
25 IPv6 Addressing........................................................................................................ 395
Protocol Overview......................................................................................................................................................... 395
Extended Address Space......................................................................................................................................... 395
Stateless Autoconguration..................................................................................................................................... 395
IPv6 Header Fields.........................................................................................................................................................396
Version (4 bits)......................................................................................................................................................... 397
Trac Class (8 bits)..................................................................................................................................................397
Flow Label (20 bits)..................................................................................................................................................397
Payload Length (16 bits)...........................................................................................................................................397
Next Header (8 bits)................................................................................................................................................ 397
Hop Limit (8 bits).....................................................................................................................................................398
14
Source Address (128 bits)........................................................................................................................................ 398
Destination Address (128 bits)..................................................................................................................................398
Extension Header Fields.................................................................................................................................................398
Hop-by-Hop Options Header................................................................................................................................... 398
Addressing..................................................................................................................................................................... 399
Link-local Addresses.................................................................................................................................................399
Static and Dynamic Addressing................................................................................................................................399
Implementing IPv6 with the Dell Networking OS........................................................................................................... 400
ICMPv6..........................................................................................................................................................................402
Path MTU Discovery......................................................................................................................................................402
IPv6 Neighbor Discovery................................................................................................................................................403
IPv6 Neighbor Discovery of MTU Packets............................................................................................................... 403
Conguring the IPv6 Recursive DNS Server............................................................................................................ 403
Debugging IPv6 RDNSS Information Sent to the Host ............................................................................................404
Displaying IPv6 RDNSS Information.........................................................................................................................405
IPv6 Multicast................................................................................................................................................................ 407
Secure Shell (SSH) Over an IPv6 Transport................................................................................................................... 407
Conguration Task List for IPv6......................................................................................................................................407
Adjusting Your CAM-Prole......................................................................................................................................408
Assigning an IPv6 Address to an Interface............................................................................................................... 408
Assigning a Static IPv6 Route.................................................................................................................................. 409
Conguring Telnet with IPv6....................................................................................................................................409
SNMP over IPv6.......................................................................................................................................................410
Showing IPv6 Information.........................................................................................................................................410
Showing an IPv6 Interface........................................................................................................................................410
Showing IPv6 Routes................................................................................................................................................ 411
Showing the Running-Conguration for an Interface................................................................................................ 412
Clearing IPv6 Routes................................................................................................................................................ 412
26 iSCSI Optimization.....................................................................................................414
iSCSI Optimization Overview.......................................................................................................................................... 414
Monitoring iSCSI Trac Flows..................................................................................................................................415
Information Monitored in iSCSI Trac Flows.............................................................................................................415
Detection and Auto-Conguration for Dell EqualLogic Arrays....................................................................................416
Conguring Detection and Ports for Dell Compellent Arrays..................................................................................... 416
iSCSI Optimization: Operation...................................................................................................................................416
Default iSCSI Optimization Values.............................................................................................................................417
Displaying iSCSI Optimization Information.......................................................................................................................417
27 Intermediate System to Intermediate System.............................................................419
IS-IS Protocol Overview..................................................................................................................................................419
IS-IS Addressing..............................................................................................................................................................419
Multi-Topology IS-IS....................................................................................................................................................... 420
Transition Mode....................................................................................................................................................... 420
Interface Support.....................................................................................................................................................420
Adjacencies..............................................................................................................................................................420
15
Graceful Restart............................................................................................................................................................. 421
Timers.......................................................................................................................................................................421
Implementation Information............................................................................................................................................ 421
Conguration Information...............................................................................................................................................422
Conguration Tasks for IS-IS....................................................................................................................................422
IS-IS Metric Styles......................................................................................................................................................... 436
Congure Metric Values.................................................................................................................................................436
Maximum Values in the Routing Table...................................................................................................................... 437
Change the IS-IS Metric Style in One Level Only......................................................................................................437
Leaks from One Level to Another.............................................................................................................................438
Sample Congurations................................................................................................................................................... 439
28 Link Aggregation Control Protocol (LACP)................................................................ 444
Introduction to Dynamic LAGs and LACP.......................................................................................................................444
Important Points to Remember................................................................................................................................ 444
LACP Modes............................................................................................................................................................445
Conguring LACP Commands................................................................................................................................. 445
LACP Conguration Tasks..............................................................................................................................................446
Creating a LAG.........................................................................................................................................................446
Conguring the LAG Interfaces as Dynamic.............................................................................................................446
Setting the LACP Long Timeout...............................................................................................................................447
Shared LAG State Tracking............................................................................................................................................ 448
Conguring Shared LAG State Tracking......................................................................................................................... 448
Important Points about Shared LAG State Tracking................................................................................................. 449
LACP Basic Conguration Example................................................................................................................................450
Congure a LAG on ALPHA..................................................................................................................................... 450
29 Layer 2......................................................................................................................458
Manage the MAC Address Table....................................................................................................................................458
Clearing the MAC Address Table..............................................................................................................................458
Setting the Aging Time for Dynamic Entries.............................................................................................................458
Conguring a Static MAC Address...........................................................................................................................459
Displaying the MAC Address Table........................................................................................................................... 459
MAC Learning Limit........................................................................................................................................................459
Setting the MAC Learning Limit............................................................................................................................... 460
mac learning-limit Dynamic...................................................................................................................................... 460
mac learning-limit station-move............................................................................................................................... 460
Learning Limit Violation Actions................................................................................................................................460
Setting Station Move Violation Actions....................................................................................................................460
Recovering from Learning Limit and Station Move Violations....................................................................................461
NIC Teaming................................................................................................................................................................... 461
MAC Move Optimization..........................................................................................................................................463
30 Link Layer Discovery Protocol (LLDP).......................................................................464
802.1AB (LLDP) Overview............................................................................................................................................. 464
Protocol Data Units..................................................................................................................................................464
16
Optional TLVs.................................................................................................................................................................465
Management TLVs...................................................................................................................................................465
TIA-1057 (LLDP-MED) Overview....................................................................................................................................467
TIA Organizationally Specic TLVs............................................................................................................................467
Extended Power via MDI TLV...................................................................................................................................470
Congure LLDP.............................................................................................................................................................. 471
Related Conguration Tasks......................................................................................................................................471
Important Points to Remember.................................................................................................................................471
LLDP Compatibility................................................................................................................................................... 471
CONFIGURATION versus INTERFACE Congurations....................................................................................................471
Enabling LLDP................................................................................................................................................................472
Disabling and Undoing LLDP.....................................................................................................................................472
Advertising TLVs............................................................................................................................................................ 472
Viewing the LLDP Conguration.................................................................................................................................... 473
Viewing Information Advertised by Adjacent LLDP Agents............................................................................................. 474
Conguring LLDPDU Intervals........................................................................................................................................475
Conguring Transmit and Receive Mode........................................................................................................................476
Conguring a Time to Live..............................................................................................................................................477
Debugging LLDP............................................................................................................................................................ 477
Relevant Management Objects...................................................................................................................................... 478
31 Microsoft Network Load Balancing............................................................................ 483
NLB Unicast Mode Scenario.......................................................................................................................................... 483
NLB Multicast Mode Scenario....................................................................................................................................... 483
Limitations With Enabling NLB on Switches...................................................................................................................484
Benets and Working of Microsoft Clustering................................................................................................................484
Enable and Disable VLAN Flooding ................................................................................................................................484
Conguring a Switch for NLB ........................................................................................................................................484
................................................................................................................................................................................ 485
32 Multicast Source Discovery Protocol (MSDP).......................................................... 486
Protocol Overview......................................................................................................................................................... 486
Anycast RP.................................................................................................................................................................... 488
Implementation Information............................................................................................................................................488
Congure the Multicast Source Discovery Protocol....................................................................................................... 488
Related Conguration Tasks..................................................................................................................................... 489
Enabling MSDP.............................................................................................................................................................. 493
Manage the Source-Active Cache................................................................................................................................. 494
Viewing the Source-Active Cache............................................................................................................................494
Limiting the Source-Active Cache............................................................................................................................494
Clearing the Source-Active Cache........................................................................................................................... 495
Enabling the Rejected Source-Active Cache............................................................................................................495
Accept Source-Active Messages that Fail the RFP Check.............................................................................................495
Specifying Source-Active Messages.............................................................................................................................. 499
Limiting the Source-Active Messages from a Peer........................................................................................................ 500
Preventing MSDP from Caching a Local Source............................................................................................................500
17
Preventing MSDP from Caching a Remote Source.........................................................................................................501
Preventing MSDP from Advertising a Local Source........................................................................................................ 501
Logging Changes in Peership States.............................................................................................................................. 502
Terminating a Peership...................................................................................................................................................502
Clearing Peer Statistics..................................................................................................................................................503
Debugging MSDP.......................................................................................................................................................... 503
MSDP with Anycast RP.................................................................................................................................................504
Conguring Anycast RP.................................................................................................................................................505
Reducing Source-Active Message Flooding............................................................................................................. 506
Specifying the RP Address Used in SA Messages....................................................................................................506
MSDP Sample Congurations........................................................................................................................................508
33 Multiple Spanning Tree Protocol (MSTP)................................................................... 511
Protocol Overview........................................................................................................................................................... 511
Spanning Tree Variations.................................................................................................................................................512
Implementation Information............................................................................................................................................ 512
Congure Multiple Spanning Tree Protocol..................................................................................................................... 512
Related Conguration Tasks......................................................................................................................................512
Enable Multiple Spanning Tree Globally........................................................................................................................... 513
Creating Multiple Spanning Tree Instances......................................................................................................................513
Inuencing MSTP Root Selection....................................................................................................................................514
Interoperate with Non-Dell Networking OS Bridges........................................................................................................515
Changing the Region Name or Revision..........................................................................................................................515
Modifying Global Parameters.......................................................................................................................................... 515
Enable BPDU Filtering Globally........................................................................................................................................517
Modifying the Interface Parameters................................................................................................................................517
Conguring an EdgePort.................................................................................................................................................518
Flush MAC Addresses after a Topology Change..............................................................................................................519
MSTP Sample Congurations.........................................................................................................................................519
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-CongurationSFTOS
Example Running-Conguration................................................................................................................................519
Debugging and Verifying MSTP Congurations..............................................................................................................522
34 Multicast Features.................................................................................................... 525
Enabling IP Multicast......................................................................................................................................................525
Multicast with ECMP.....................................................................................................................................................525
Implementation Information............................................................................................................................................526
First Packet Forwarding for Lossless Multicast...............................................................................................................527
Multicast Policies............................................................................................................................................................527
IPv4 Multicast Policies....................................................................................................................................................527
Limiting the Number of Multicast Routes.................................................................................................................527
Preventing a Host from Joining a Group...................................................................................................................528
Rate Limiting IGMP Join Requests...........................................................................................................................530
Preventing a PIM Router from Forming an Adjacency...............................................................................................531
Preventing a Source from Registering with the RP...................................................................................................531
Preventing a PIM Router from Processing a Join..................................................................................................... 533
18
35 Open Shortest Path First (OSPFv2 and OSPFv3)..................................................... 535
Protocol Overview......................................................................................................................................................... 535
Autonomous System (AS) Areas..............................................................................................................................535
Area Types............................................................................................................................................................... 536
Networks and Neighbors..........................................................................................................................................537
Router Types............................................................................................................................................................537
Link-State Advertisements (LSAs)...........................................................................................................................539
Router Priority and Cost.......................................................................................................................................... 540
OSPF with the Dell Networking OS................................................................................................................................ 541
Graceful Restart.......................................................................................................................................................542
Fast Convergence (OSPFv2, IPv4 Only)..................................................................................................................543
Multi-Process OSPFv2 (IPv4 only).......................................................................................................................... 543
RFC-2328 Compliant OSPF Flooding....................................................................................................................... 543
OSPF ACK Packing..................................................................................................................................................544
Setting OSPF Adjacency with Cisco Routers........................................................................................................... 544
Conguration Information.............................................................................................................................................. 545
Conguration Task List for OSPFv2 (OSPF for IPv4)...............................................................................................545
Troubleshooting OSPFv2..........................................................................................................................................557
Conguration Task List for OSPFv3 (OSPF for IPv6).....................................................................................................560
Enabling IPv6 Unicast Routing.................................................................................................................................560
Assigning IPv6 Addresses on an Interface................................................................................................................560
Assigning Area ID on an Interface............................................................................................................................. 561
Assigning OSPFv3 Process ID and Router ID Globally...............................................................................................561
Conguring Stub Areas.............................................................................................................................................561
Conguring Passive-Interface.................................................................................................................................. 562
Redistributing Routes...............................................................................................................................................562
Conguring a Default Route.....................................................................................................................................562
Enabling OSPFv3 Graceful Restart.......................................................................................................................... 563
Displaying Graceful Restart......................................................................................................................................564
OSPFv3 Authentication Using IPsec........................................................................................................................565
36 Policy-based Routing (PBR)......................................................................................573
Overview........................................................................................................................................................................573
Implementing Policy-based Routing with Dell Networking OS........................................................................................ 574
Conguration Task List for Policy-based Routing............................................................................................................575
PBR Exceptions (Permit)......................................................................................................................................... 577
Sample Conguration.....................................................................................................................................................579
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD....................580
37 PIM Sparse-Mode (PIM-SM)....................................................................................584
Implementation Information............................................................................................................................................584
Protocol Overview......................................................................................................................................................... 584
Requesting Multicast Trac.....................................................................................................................................584
Refuse Multicast Trac........................................................................................................................................... 585
Send Multicast Trac.............................................................................................................................................. 585
19
Conguring PIM-SM......................................................................................................................................................585
Related Conguration Tasks.....................................................................................................................................586
Enable PIM-SM..............................................................................................................................................................586
Conguring S,G Expiry Timers........................................................................................................................................587
Conguring a Static Rendezvous Point..........................................................................................................................588
Overriding Bootstrap Router Updates......................................................................................................................588
Conguring a Designated Router................................................................................................................................... 589
Creating Multicast Boundaries and Domains.................................................................................................................. 589
Enabling PIM-SM Graceful Restart................................................................................................................................589
38 PIM Source-Specic Mode (PIM-SSM)................................................................... 590
Congure PIM-SMM..................................................................................................................................................... 590
Related Conguration Tasks.....................................................................................................................................590
Implementation Information........................................................................................................................................... 590
Important Points to Remember................................................................................................................................590
Enabling PIM-SSM......................................................................................................................................................... 591
Use PIM-SSM with IGMP Version 2 Hosts..................................................................................................................... 591
Conguring PIM-SSM with IGMPv2.........................................................................................................................591
39 Port Monitoring.........................................................................................................593
Important Points to Remember......................................................................................................................................593
Conguring Port Monitoring...........................................................................................................................................594
Enabling Flow-Based Monitoring....................................................................................................................................595
Remote Port Mirroring................................................................................................................................................... 596
Remote Port Mirroring Example...............................................................................................................................596
Conguring Remote Port Mirroring.......................................................................................................................... 597
Displaying Remote-Port Mirroring Congurations.................................................................................................... 598
Conguring the Sample Remote Port Mirroring....................................................................................................... 599
Conguring the Encapsulated Remote Port Mirroring....................................................................................................602
Conguration steps for ERPM ................................................................................................................................ 602
ERPM Behavior on a typical Dell Networking OS .......................................................................................................... 603
Decapsulation of ERPM packets at the Destination IP/ Analyzer............................................................................. 603
40 Private VLANs (PVLAN)........................................................................................... 605
Private VLAN Concepts.................................................................................................................................................605
Using the Private VLAN Commands........................................................................................................................ 606
Conguration Task List.............................................................................................................................................607
Private VLAN Conguration Example....................................................................................................................... 610
41 Per-VLAN Spanning Tree Plus (PVST+)...................................................................... 614
Protocol Overview.......................................................................................................................................................... 614
Implementation Information...................................................................................................................................... 615
Congure Per-VLAN Spanning Tree Plus........................................................................................................................ 615
Related Conguration Tasks......................................................................................................................................615
Enabling PVST+..............................................................................................................................................................615
Disabling PVST+............................................................................................................................................................. 615
20
/