PowerSwitch S4048-ON

Dell PowerSwitch S4048-ON User manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4048-ON User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S4048–ON
System
9.9(0.0)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2015 - 09
Rev. A00
Contents
1 About this Guide..................................................................................................37
Audience..............................................................................................................................................37
Conventions........................................................................................................................................ 37
Related Documents.............................................................................................................................37
2 Configuration Fundamentals........................................................................... 38
Accessing the Command Line............................................................................................................38
CLI Modes............................................................................................................................................38
Navigating CLI Modes...................................................................................................................40
The do Command...............................................................................................................................43
Undoing Commands.......................................................................................................................... 44
Obtaining Help....................................................................................................................................44
Entering and Editing Commands....................................................................................................... 45
Command History...............................................................................................................................46
Filtering show Command Outputs.....................................................................................................46
Multiple Users in Configuration Mode............................................................................................... 47
3 Getting Started................................................................................................... 48
Console Access...................................................................................................................................48
Serial Console................................................................................................................................48
Accessing the CLI Interface and Running Scripts Using SSH............................................................49
Entering CLI commands Using an SSH Connection................................................................... 50
Executing Local CLI Scripts Using an SSH Connection...............................................................50
Default Configuration..........................................................................................................................51
Configuring a Host Name................................................................................................................... 51
Accessing the System Remotely.........................................................................................................51
Accessing the System Remotely................................................................................................... 51
Configure the Management Port IP Address................................................................................51
Configure a Management Route.................................................................................................. 52
Configuring a Username and Password.......................................................................................52
Configuring the Enable Password...................................................................................................... 52
Configuration File Management.........................................................................................................53
Copy Files to and from the System.............................................................................................. 53
Mounting an NFS File System....................................................................................................... 54
Save the Running-Configuration..................................................................................................55
Configure the Overload Bit for a Startup Scenario......................................................................56
Viewing Files.................................................................................................................................. 56
Compressing Configuration Files................................................................................................. 57
3
Managing the File System...................................................................................................................60
Enabling Software Features on Devices Using a Command Option.................................................61
View Command History......................................................................................................................62
Upgrading Dell Networking OS.......................................................................................................... 62
Using Hashes to Verify Software Images Before Installation............................................................ 62
Using HTTP for File Transfers............................................................................................................. 63
4 Management........................................................................................................65
Configuring Privilege Levels............................................................................................................... 65
Creating a Custom Privilege Level................................................................................................65
Removing a Command from EXEC Mode................................................................................... 65
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................66
Allowing Access to CONFIGURATION Mode Commands..........................................................66
Allowing Access to Different Modes............................................................................................ 66
Applying a Privilege Level to a Username.................................................................................... 68
Applying a Privilege Level to a Terminal Line...............................................................................68
Configuring Logging...........................................................................................................................68
Audit and Security Logs................................................................................................................ 69
Configuring Logging Format .......................................................................................................71
Display the Logging Buffer and the Logging Configuration........................................................ 71
Setting Up a Secure Connection to a Syslog Server.................................................................... 72
Sending System Messages to a Syslog Server.............................................................................. 73
Track Login Activity............................................................................................................................. 73
Restrictions for Tracking Login Activity........................................................................................ 73
Configuring Login Activity Tracking............................................................................................. 73
Display Login Statistics..................................................................................................................74
Limit Concurrent Login Sessions........................................................................................................75
Restrictions for Limiting the Number of Concurrent Sessions....................................................75
Configuring Concurrent Session Limit......................................................................................... 75
Enabling the System to Clear Existing Sessions...........................................................................76
Log Messages in the Internal Buffer................................................................................................... 76
Configuration Task List for System Log Management.................................................................77
Disabling System Logging................................................................................................................... 77
Sending System Messages to a Syslog Server.................................................................................... 77
Configuring a UNIX System as a Syslog Server............................................................................ 77
Changing System Logging Settings....................................................................................................78
Display the Logging Buffer and the Logging Configuration..............................................................79
Configuring a UNIX Logging Facility Level.........................................................................................79
Synchronizing Log Messages..............................................................................................................81
Enabling Timestamp on Syslog Messages..........................................................................................81
File Transfer Services...........................................................................................................................82
Configuration Task List for File Transfer Services........................................................................82
4
Enabling the FTP Server................................................................................................................ 82
Configuring FTP Server Parameters............................................................................................. 82
Configuring FTP Client Parameters..............................................................................................83
Terminal Lines.....................................................................................................................................84
Denying and Permitting Access to a Terminal Line.....................................................................84
Configuring Login Authentication for Terminal Lines................................................................. 85
Setting Timeout for EXEC Privilege Mode......................................................................................... 86
Using Telnet to get to Another Network Device............................................................................... 87
Lock CONFIGURATION Mode............................................................................................................87
Viewing the Configuration Lock Status........................................................................................88
Restoring the Factory Default Settings.............................................................................................. 88
Important Points to Remember....................................................................................................88
Restoring Factory Default Environment Variables.......................................................................89
5 802.1ag................................................................................................................. 91
Ethernet CFM.......................................................................................................................................91
Maintenance Domains........................................................................................................................92
Maintenance Points.............................................................................................................................92
Maintenance End Points..................................................................................................................... 93
Implementation Information..............................................................................................................94
Configuring the CFM.......................................................................................................................... 94
Related Configuration Tasks.........................................................................................................94
Enable Ethernet CFM.......................................................................................................................... 94
Creating a Maintenance Domain....................................................................................................... 94
Creating a Maintenance Association..................................................................................................95
Create Maintenance Points................................................................................................................ 95
Creating a Maintenance End Point...............................................................................................95
Creating a Maintenance Intermediate Point................................................................................96
Displaying the MP Databases........................................................................................................97
Continuity Check Messages............................................................................................................... 97
Enabling CCM................................................................................................................................98
Enabling Cross-Checking.............................................................................................................99
Sending Loopback Messages and Responses................................................................................... 99
Sending Linktrace Messages and Responses.....................................................................................99
Caching Link Trace..................................................................................................................... 100
Enabling CFM SNMP Traps................................................................................................................101
Displaying Ethernet CFM Statistics...................................................................................................102
6 802.1X.................................................................................................................104
Port-Authentication Process............................................................................................................ 105
EAP over RADIUS.........................................................................................................................107
Configuring 802.1X........................................................................................................................... 107
5
Related Configuration Tasks.......................................................................................................107
Important Points to Remember....................................................................................................... 108
Enabling 802.1X.................................................................................................................................108
Configuring Request Identity Re-Transmissions..............................................................................110
Configuring a Quiet Period after a Failed Authentication..........................................................110
Forcibly Authorizing or Unauthorizing a Port................................................................................... 111
Re-Authenticating a Port...................................................................................................................112
Configuring Timeouts........................................................................................................................113
Configuring Dynamic VLAN Assignment with Port Authentication................................................ 114
Guest and Authentication-Fail VLANs...............................................................................................115
Configuring a Guest VLAN.......................................................................................................... 116
Configuring an Authentication-Fail VLAN.................................................................................. 116
7 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)......................................................................................................118
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..........................................118
Guidelines for Configuring ACL VLAN Groups.................................................................................119
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters........................120
Configuring ACL VLAN Groups...................................................................................................120
Configuring FP Blocks for VLAN Parameters..............................................................................121
Viewing CAM Usage.......................................................................................................................... 121
Allocating FP Blocks for VLAN Processes.........................................................................................123
8 Access Control Lists (ACLs)............................................................................ 124
IP Access Control Lists (ACLs).......................................................................................................... 124
CAM Usage.................................................................................................................................. 125
Implementing ACLs on Dell Networking OS..............................................................................126
Important Points to Remember........................................................................................................127
Configuration Task List for Route Maps..................................................................................... 128
Configuring Match Routes..........................................................................................................130
Configuring Set Conditions.........................................................................................................131
Configure a Route Map for Route Redistribution...................................................................... 132
Configure a Route Map for Route Tagging................................................................................ 133
Continue Clause..........................................................................................................................133
IP Fragment Handling....................................................................................................................... 134
IP Fragments ACL Examples....................................................................................................... 134
Layer 4 ACL Rules Examples....................................................................................................... 135
Configure a Standard IP ACL............................................................................................................ 136
Configuring a Standard IP ACL Filter.......................................................................................... 137
Configure an Extended IP ACL......................................................................................................... 138
Configuring Filters with a Sequence Number............................................................................138
Configuring Filters Without a Sequence Number......................................................................139
6
Configure Layer 2 and Layer 3 ACLs................................................................................................140
Assign an IP ACL to an Interface.......................................................................................................141
Applying an IP ACL............................................................................................................................ 141
Counting ACL Hits.......................................................................................................................142
Configure Ingress ACLs.....................................................................................................................142
Configure Egress ACLs......................................................................................................................143
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................... 144
IP Prefix Lists......................................................................................................................................144
Implementation Information...................................................................................................... 145
Configuration Task List for Prefix Lists....................................................................................... 145
ACL Resequencing............................................................................................................................149
Resequencing an ACL or Prefix List............................................................................................149
Route Maps........................................................................................................................................ 151
Implementation Information.......................................................................................................151
Logging of ACL Processes.................................................................................................................151
Guidelines for Configuring ACL Logging....................................................................................152
Configuring ACL Logging............................................................................................................153
Flow-Based Monitoring Support for ACLs....................................................................................... 153
Behavior of Flow-Based Monitoring...........................................................................................154
Enabling Flow-Based Monitoring............................................................................................... 155
Configuring UDF ACL........................................................................................................................156
9 Bidirectional Forwarding Detection (BFD).................................................. 160
How BFD Works................................................................................................................................160
BFD Packet Format...................................................................................................................... 161
BFD Sessions................................................................................................................................163
BFD Three-Way Handshake........................................................................................................163
Session State Changes................................................................................................................164
Important Points to Remember........................................................................................................165
Configure BFD...................................................................................................................................165
Configure BFD for Physical Ports............................................................................................... 166
Configure BFD for Static Routes.................................................................................................169
Configure BFD for OSPF..............................................................................................................171
Configure BFD for OSPFv3..........................................................................................................174
Configure BFD for IS-IS...............................................................................................................175
Configure BFD for BGP............................................................................................................... 178
Configure BFD for VRRP............................................................................................................. 184
Configuring Protocol Liveness....................................................................................................187
Troubleshooting BFD..................................................................................................................188
10 Border Gateway Protocol IPv4 (BGPv4).................................................... 190
Autonomous Systems (AS)................................................................................................................190
7
Sessions and Peers............................................................................................................................192
Establish a Session.......................................................................................................................193
Route Reflectors................................................................................................................................193
BGP Attributes................................................................................................................................... 194
Best Path Selection Criteria.........................................................................................................195
Weight..........................................................................................................................................197
Local Preference..........................................................................................................................197
Multi-Exit Discriminators (MEDs)................................................................................................198
Origin........................................................................................................................................... 199
AS Path........................................................................................................................................ 200
Next Hop.....................................................................................................................................200
Multiprotocol BGP............................................................................................................................ 201
Implement BGP with Dell Networking OS.......................................................................................201
Additional Path (Add-Path) Support........................................................................................... 201
Advertise IGP Cost as MED for Redistributed Routes................................................................ 201
Ignore Router-ID in Best-Path Calculation............................................................................... 202
Four-Byte AS Numbers...............................................................................................................202
AS4 Number Representation......................................................................................................203
AS Number Migration................................................................................................................. 204
BGP4 Management Information Base (MIB)..............................................................................206
Important Points to Remember................................................................................................. 206
Configuration Information............................................................................................................... 207
BGP Configuration............................................................................................................................207
Enabling BGP.............................................................................................................................. 208
Configuring AS4 Number Representations................................................................................ 212
Configuring Peer Groups............................................................................................................ 214
Configuring BGP Fast Fall-Over..................................................................................................216
Configuring Passive Peering....................................................................................................... 218
Maintaining Existing AS Numbers During an AS Migration........................................................219
Allowing an AS Number to Appear in its Own AS Path............................................................. 220
Enabling Graceful Restart............................................................................................................221
Enabling Neighbor Graceful Restart...........................................................................................222
Filtering on an AS-Path Attribute................................................................................................222
Regular Expressions as Filters.....................................................................................................224
Redistributing Routes..................................................................................................................225
Enabling Additional Paths........................................................................................................... 226
Configuring IP Community Lists................................................................................................ 226
Configuring an IP Extended Community List............................................................................ 228
Filtering Routes with Community Lists...................................................................................... 229
Manipulating the COMMUNITY Attribute...................................................................................229
Changing MED Attributes............................................................................................................231
Changing the LOCAL_PREFERENCE Attribute...........................................................................231
8
Changing the NEXT_HOP Attribute........................................................................................... 232
Changing the WEIGHT Attribute................................................................................................ 233
Enabling Multipath...................................................................................................................... 233
Filtering BGP Routes................................................................................................................... 233
Filtering BGP Routes Using Route Maps.................................................................................... 235
Filtering BGP Routes Using AS-PATH Information....................................................................236
Configuring BGP Route Reflectors.............................................................................................236
Aggregating Routes.....................................................................................................................237
Configuring BGP Confederations.............................................................................................. 238
Enabling Route Flap Dampening................................................................................................238
Changing BGP Timers.................................................................................................................241
Enabling BGP Neighbor Soft-Reconfiguration.......................................................................... 241
Route Map Continue...................................................................................................................243
Enabling MBGP Configurations........................................................................................................243
BGP Regular Expression Optimization.............................................................................................244
Debugging BGP................................................................................................................................ 244
Storing Last and Bad PDUs......................................................................................................... 245
Capturing PDUs.......................................................................................................................... 246
PDU Counters............................................................................................................................. 247
Sample Configurations..................................................................................................................... 247
11 Content Addressable Memory (CAM)......................................................... 254
CAM Allocation................................................................................................................................. 254
Test CAM Usage................................................................................................................................256
View CAM-ACL Settings................................................................................................................... 256
View CAM Usage...............................................................................................................................258
CAM Optimization............................................................................................................................ 259
Troubleshoot CAM Profiling.............................................................................................................259
CAM Profile Mismatches.............................................................................................................259
QoS CAM Region Limitation.......................................................................................................259
12 Control Plane Policing (CoPP)..................................................................... 261
Configure Control Plane Policing.................................................................................................... 262
Configuring CoPP for Protocols................................................................................................ 263
Configuring CoPP for CPU Queues...........................................................................................265
CoPP for OSPFv3 Packets.......................................................................................................... 266
Configuring CoPP for OSPFv3....................................................................................................270
Displaying CoPP Configuration ..................................................................................................271
13 Data Center Bridging (DCB)..........................................................................273
Ethernet Enhancements in Data Center Bridging............................................................................273
Priority-Based Flow Control....................................................................................................... 274
9
Enhanced Transmission Selection..............................................................................................275
Data Center Bridging Exchange Protocol (DCBx)..................................................................... 276
Data Center Bridging in a Traffic Flow....................................................................................... 277
Enabling Data Center Bridging......................................................................................................... 277
DCB Maps and its Attributes....................................................................................................... 278
Data Center Bridging: Default Configuration.................................................................................. 279
Configuring Priority-Based Flow Control........................................................................................ 279
Configuring Lossless Queues.....................................................................................................280
Configuring PFC in a DCB Map........................................................................................................282
PFC Configuration Notes............................................................................................................282
PFC Prerequisites and Restrictions.............................................................................................283
Applying a DCB Map on a Port.........................................................................................................283
Configuring PFC without a DCB Map..............................................................................................284
Configuring Lossless QueuesExample:......................................................................................284
Priority-Based Flow Control Using Dynamic Buffer Method..........................................................286
Pause and Resume of Traffic......................................................................................................286
Buffer Sizes for Lossless or PFC Packets....................................................................................287
Behavior of Tagged Packets.............................................................................................................287
Configuration Example for DSCP and PFC Priorities...................................................................... 288
Using PFC to Manage Converged Ethernet Traffic......................................................................... 289
Configure Enhanced Transmission Selection................................................................................. 289
ETS Prerequisites and Restrictions.............................................................................................289
Creating an ETS Priority Group.................................................................................................. 289
ETS Operation with DCBx...........................................................................................................291
Configuring Bandwidth Allocation for DCBx CIN......................................................................291
Configuring ETS in a DCB Map...................................................................................................292
Hierarchical Scheduling in ETS Output Policies..............................................................................294
Using ETS to Manage Converged Ethernet Traffic..........................................................................294
Applying DCB Policies in a Switch Stack......................................................................................... 294
Configure a DCBx Operation........................................................................................................... 295
DCBx Operation..........................................................................................................................295
DCBx Port Roles..........................................................................................................................295
DCB Configuration Exchange.................................................................................................... 297
Configuration Source Election................................................................................................... 297
Propagation of DCB Information............................................................................................... 298
Auto-Detection and Manual Configuration of the DCBx Version............................................298
DCBx Example............................................................................................................................ 299
DCBx Prerequisites and Restrictions..........................................................................................299
Configuring DCBx.......................................................................................................................300
Verifying the DCB Configuration..................................................................................................... 304
QoS dot1p Traffic Classification and Queue Assignment................................................................315
Configuring the Dynamic Buffer Method.........................................................................................317
10
Sample DCB Configuration.............................................................................................................. 318
PFC and ETS Configuration Command Examples.................................................................... 320
14 Dynamic Host Configuration Protocol (DHCP)........................................ 321
DHCP Packet Format and Options...................................................................................................321
Assign an IP Address using DHCP.................................................................................................... 323
Implementation Information............................................................................................................324
Configure the System to be a DHCP Server....................................................................................324
Configuring the Server for Automatic Address Allocation........................................................ 325
Specifying a Default Gateway.....................................................................................................327
Configure a Method of Hostname Resolution...........................................................................327
Using DNS for Address Resolution............................................................................................. 327
Using NetBIOS WINS for Address Resolution............................................................................ 327
Creating Manual Binding Entries................................................................................................ 327
Debugging the DHCP Server......................................................................................................328
Using DHCP Clear Commands.................................................................................................. 328
Configure the System to be a Relay Agent......................................................................................328
Configure the System to be a DHCP Client.................................................................................... 330
Configuring the DHCP Client System.........................................................................................331
DHCP Client on a Management Interface................................................................................. 332
DHCP Client Operation with Other Features.............................................................................333
Configure the System for User Port Stacking (Option 230)............................................................334
Configure Secure DHCP...................................................................................................................334
Option 82.................................................................................................................................... 334
DHCP Snooping.......................................................................................................................... 335
Drop DHCP Packets on Snooped VLANs Only..........................................................................338
Dynamic ARP Inspection............................................................................................................ 339
Configuring Dynamic ARP Inspection....................................................................................... 340
Source Address Validation................................................................................................................ 341
Enabling IP Source Address Validation.......................................................................................341
DHCP MAC Source Address Validation......................................................................................342
Enabling IP+MAC Source Address Validation............................................................................342
Viewing the Number of SAV Dropped Packets..........................................................................343
Clearing the Number of SAV Dropped Packets.........................................................................343
15 Equal Cost Multi-Path (ECMP)..................................................................... 344
ECMP for Flow-Based Affinity..........................................................................................................344
Configuring the Hash Algorithm................................................................................................ 344
Enabling Deterministic ECMP Next Hop....................................................................................344
Configuring the Hash Algorithm Seed....................................................................................... 345
Link Bundle Monitoring.................................................................................................................... 345
Managing ECMP Group Paths.................................................................................................... 346
11
Creating an ECMP Group Bundle...............................................................................................346
Modifying the ECMP Group Threshold...................................................................................... 347
RTAG7................................................................................................................................................347
Flow-based Hashing for ECMP........................................................................................................ 349
16 FCoE Transit.................................................................................................... 353
Fibre Channel over Ethernet.............................................................................................................353
Ensure Robustness in a Converged Ethernet Network................................................................... 353
FIP Snooping on Ethernet Bridges................................................................................................... 355
FIP Snooping in a Switch Stack.........................................................................................................357
Using FIP Snooping...........................................................................................................................357
FIP Snooping Prerequisites......................................................................................................... 357
Important Points to Remember................................................................................................. 358
Enabling the FCoE Transit Feature............................................................................................. 359
Enable FIP Snooping on VLANs..................................................................................................359
Configure the FC-MAP Value..................................................................................................... 359
Configure a Port for a Bridge-to-Bridge Link............................................................................359
Configure a Port for a Bridge-to-FCF Link................................................................................360
Impact on Other Software Features.......................................................................................... 360
FIP Snooping Restrictions...........................................................................................................360
Configuring FIP Snooping...........................................................................................................361
Displaying FIP Snooping Information...............................................................................................361
FCoE Transit Configuration Example...............................................................................................367
17 FIPS Cryptography......................................................................................... 369
Configuration Tasks..........................................................................................................................369
Preparing the System........................................................................................................................369
Enabling FIPS Mode.......................................................................................................................... 370
Generating Host-Keys...................................................................................................................... 370
Monitoring FIPS Mode Status............................................................................................................371
Disabling FIPS Mode......................................................................................................................... 374
18 Force10 Resilient Ring Protocol (FRRP)..................................................... 375
Protocol Overview............................................................................................................................ 375
Ring Status...................................................................................................................................376
Multiple FRRP Rings.....................................................................................................................377
Important FRRP Points................................................................................................................378
Important FRRP Concepts.......................................................................................................... 379
Implementing FRRP..........................................................................................................................380
FRRP Configuration.......................................................................................................................... 380
Creating the FRRP Group............................................................................................................381
Configuring the Control VLAN....................................................................................................381
12
Configuring and Adding the Member VLANs.............................................................................382
Setting the FRRP Timers............................................................................................................. 383
Clearing the FRRP Counters.......................................................................................................384
Viewing the FRRP Configuration................................................................................................384
Viewing the FRRP Information................................................................................................... 384
Troubleshooting FRRP......................................................................................................................385
Configuration Checks.................................................................................................................385
Sample Configuration and Topology...............................................................................................385
19 GARP VLAN Registration Protocol (GVRP)................................................ 387
Important Points to Remember....................................................................................................... 387
Configure GVRP................................................................................................................................388
Related Configuration Tasks...................................................................................................... 388
Enabling GVRP Globally....................................................................................................................389
Enabling GVRP on a Layer 2 Interface............................................................................................. 389
Configure GVRP Registration...........................................................................................................389
Configure a GARP Timer.................................................................................................................. 390
RPM Redundancy.............................................................................................................................. 391
20 High Availability (HA).....................................................................................392
Component Redundancy.................................................................................................................392
Automatic and Manual Stack Unit Failover................................................................................ 392
Synchronization between Management and Standby Units.....................................................393
Forcing an Stack Unit Failover....................................................................................................393
Specifying an Auto-Failover Limit.............................................................................................. 394
Disabling Auto-Reboot...............................................................................................................394
Manually Synchronizing Management and Standby Units........................................................394
Pre-Configuring a Stack Unit Slot....................................................................................................394
Removing a Provisioned Logical Stack Unit.................................................................................... 395
Hitless Behavior.................................................................................................................................395
Graceful Restart................................................................................................................................ 395
Software Resiliency...........................................................................................................................396
Software Component Health Monitoring..................................................................................396
System Health Monitoring..........................................................................................................396
Failure and Event Logging.......................................................................................................... 396
Hot-Lock Behavior............................................................................................................................397
21 Internet Group Management Protocol (IGMP).........................................398
IGMP Implementation Information..................................................................................................398
IGMP Protocol Overview..................................................................................................................398
IGMP Version 2........................................................................................................................... 398
IGMP Version 3........................................................................................................................... 400
13
Configure IGMP................................................................................................................................403
Related Configuration Tasks...................................................................................................... 403
Viewing IGMP Enabled Interfaces....................................................................................................404
Selecting an IGMP Version...............................................................................................................404
Viewing IGMP Groups...................................................................................................................... 405
Adjusting Timers............................................................................................................................... 405
Adjusting Query and Response Timers......................................................................................405
Preventing a Host from Joining a Group........................................................................................ 406
Enabling IGMP Immediate-Leave.................................................................................................... 409
IGMP Snooping.................................................................................................................................409
IGMP Snooping Implementation Information...........................................................................409
Configuring IGMP Snooping...................................................................................................... 409
Removing a Group-Port Association......................................................................................... 410
Disabling Multicast Flooding.......................................................................................................410
Specifying a Port as Connected to a Multicast Router.............................................................. 411
Configuring the Switch as Querier..............................................................................................411
Fast Convergence after MSTP Topology Changes..........................................................................412
Egress Interface Selection (EIS) for HTTP and IGMP Applications..................................................412
Protocol Separation.................................................................................................................... 413
Enabling and Disabling Management Egress Interface Selection.............................................414
Handling of Management Route Configuration........................................................................ 415
Handling of Switch-Initiated Traffic........................................................................................... 415
Handling of Switch-Destined Traffic..........................................................................................416
Handling of Transit Traffic (Traffic Separation).......................................................................... 417
Mapping of Management Applications and Traffic Type...........................................................417
Behavior of Various Applications for Switch-Initiated Traffic .................................................. 418
Behavior of Various Applications for Switch-Destined Traffic ................................................. 419
Interworking of EIS With Various Applications.......................................................................... 420
Designating a Multicast Router Interface.........................................................................................421
22 Interfaces.........................................................................................................422
Basic Interface Configuration...........................................................................................................422
Advanced Interface Configuration...................................................................................................422
Interface Types................................................................................................................................. 423
View Basic Interface Information.....................................................................................................423
Resetting an Interface to its Factory Default State..........................................................................425
Enabling a Physical Interface............................................................................................................425
Physical Interfaces............................................................................................................................ 426
Configuration Task List for Physical Interfaces..........................................................................426
Overview of Layer Modes...........................................................................................................426
Configuring Layer 2 (Data Link) Mode........................................................................................427
Configuring Layer 2 (Interface) Mode........................................................................................ 427
14
Configuring Layer 3 (Network) Mode........................................................................................ 428
Configuring Layer 3 (Interface) Mode........................................................................................428
Egress Interface Selection (EIS)........................................................................................................429
Important Points to Remember................................................................................................. 429
Configuring EIS........................................................................................................................... 429
Management Interfaces................................................................................................................... 430
Configuring Management Interfaces.........................................................................................430
Configuring a Management Interface on an Ethernet Port...................................................... 432
VLAN Interfaces.................................................................................................................................433
Loopback Interfaces......................................................................................................................... 433
Null Interfaces...................................................................................................................................434
Port Channel Interfaces....................................................................................................................434
Port Channel Definition and Standards..................................................................................... 434
Port Channel Benefits.................................................................................................................435
Port Channel Implementation....................................................................................................435
Interfaces in Port Channels........................................................................................................ 435
Configuration Tasks for Port Channel Interfaces......................................................................436
Creating a Port Channel............................................................................................................. 436
Adding a Physical Interface to a Port Channel.......................................................................... 436
Reassigning an Interface to a New Port Channel......................................................................438
Configuring the Minimum Oper Up Links in a Port Channel....................................................439
Adding or Removing a Port Channel from a VLAN................................................................... 439
Assigning an IP Address to a Port Channel................................................................................ 441
Deleting or Disabling a Port Channel.........................................................................................441
Load Balancing Through Port Channels.................................................................................... 441
Changing the Hash Algorithm.................................................................................................... 441
Bulk Configuration............................................................................................................................442
Interface Range...........................................................................................................................442
Bulk Configuration Examples..................................................................................................... 443
Defining Interface Range Macros.................................................................................................... 444
Define the Interface Range.........................................................................................................445
Choosing an Interface-Range Macro........................................................................................ 445
Monitoring and Maintaining Interfaces............................................................................................445
Maintenance Using TDR.............................................................................................................446
Non Dell-Qualified Transceivers......................................................................................................447
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 447
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................448
Important Points to Remember................................................................................................. 448
Example Scenarios......................................................................................................................449
Link Dampening................................................................................................................................450
Important Points to Remember................................................................................................. 450
Enabling Link Dampening........................................................................................................... 451
15
Link Bundle Monitoring.................................................................................................................... 452
Using Ethernet Pause Frames for Flow Control.............................................................................. 453
Enabling Pause Frames...............................................................................................................453
Configure the MTU Size on an Interface......................................................................................... 454
Port-Pipes......................................................................................................................................... 455
Auto-Negotiation on Ethernet Interfaces........................................................................................455
Setting the Speed and Duplex Mode of Ethernet Interfaces.....................................................456
Set Auto-Negotiation Options....................................................................................................457
View Advanced Interface Information............................................................................................. 458
Configuring the Interface Sampling Size................................................................................... 459
Dynamic Counters............................................................................................................................460
Clearing Interface Counters.......................................................................................................460
23 Internet Protocol Security (IPSec).............................................................. 462
Configuring IPSec ............................................................................................................................463
24 IPv4 Routing................................................................................................... 464
IP Addresses......................................................................................................................................464
Implementation Information......................................................................................................464
Configuration Tasks for IP Addresses.............................................................................................. 465
Assigning IP Addresses to an Interface............................................................................................ 465
Configuring Static Routes................................................................................................................ 466
Configure Static Routes for the Management Interface.................................................................467
IPv4 Path MTU Discovery Overview.................................................................................................467
Using the Configured Source IP Address in ICMP Messages......................................................... 468
Configuring the ICMP Source Interface.................................................................................... 468
Configuring the Duration to Establish a TCP Connection..............................................................469
Enabling Directed Broadcast............................................................................................................469
Resolution of Host Names............................................................................................................... 470
Enabling Dynamic Resolution of Host Names................................................................................ 470
Specifying the Local System Domain and a List of Domains.......................................................... 471
Configuring DNS with Traceroute....................................................................................................471
ARP.................................................................................................................................................... 472
Configuration Tasks for ARP.............................................................................................................472
Configuring Static ARP Entries......................................................................................................... 473
Enabling Proxy ARP...........................................................................................................................473
Clearing ARP Cache..........................................................................................................................473
ARP Learning via Gratuitous ARP..................................................................................................... 474
Enabling ARP Learning via Gratuitous ARP...................................................................................... 474
ARP Learning via ARP Request......................................................................................................... 474
Configuring ARP Retries................................................................................................................... 475
ICMP.................................................................................................................................................. 476
16
Configuration Tasks for ICMP.......................................................................................................... 476
Enabling ICMP Unreachable Messages............................................................................................476
UDP Helper........................................................................................................................................477
Configure UDP Helper................................................................................................................ 477
Important Points to Remember..................................................................................................477
Enabling UDP Helper........................................................................................................................ 477
Configuring a Broadcast Address.....................................................................................................477
Configurations Using UDP Helper................................................................................................... 478
UDP Helper with Broadcast-All Addresses...................................................................................... 478
UDP Helper with Subnet Broadcast Addresses............................................................................... 479
UDP Helper with Configured Broadcast Addresses........................................................................480
UDP Helper with No Configured Broadcast Addresses..................................................................480
Troubleshooting UDP Helper.......................................................................................................... 480
25 IPv6 Routing................................................................................................... 482
Protocol Overview............................................................................................................................482
Extended Address Space............................................................................................................ 482
Stateless Autoconfiguration....................................................................................................... 482
IPv6 Headers............................................................................................................................... 483
IPv6 Header Fields...................................................................................................................... 484
Extension Header Fields............................................................................................................. 485
Addressing...................................................................................................................................486
Implementing IPv6 with Dell Networking OS..................................................................................487
ICMPv6..............................................................................................................................................490
Path MTU Discovery.........................................................................................................................490
IPv6 Neighbor Discovery.................................................................................................................. 491
IPv6 Neighbor Discovery of MTU Packets.................................................................................492
Configuration Task List for IPv6 RDNSS.......................................................................................... 492
Configuring the IPv6 Recursive DNS Server.............................................................................. 492
Debugging IPv6 RDNSS Information Sent to the Host ............................................................ 493
Displaying IPv6 RDNSS Information...........................................................................................494
Secure Shell (SSH) Over an IPv6 Transport..................................................................................... 494
Configuration Tasks for IPv6............................................................................................................495
Adjusting Your CAM-Profile....................................................................................................... 495
Assigning an IPv6 Address to an Interface.................................................................................496
Assigning a Static IPv6 Route..................................................................................................... 496
Configuring Telnet with IPv6......................................................................................................497
SNMP over IPv6...........................................................................................................................497
Displaying IPv6 Information....................................................................................................... 497
Displaying an IPv6 Interface Information.................................................................................. 498
Showing IPv6 Routes..................................................................................................................499
Showing the Running-Configuration for an Interface..............................................................500
17
Clearing IPv6 Routes.................................................................................................................. 500
Configuring IPv6 RA Guard...............................................................................................................501
Configuring IPv6 RA Guard on an Interface.............................................................................. 503
Monitoring IPv6 RA Guard..........................................................................................................503
26 iSCSI Optimization........................................................................................ 504
iSCSI Optimization Overview........................................................................................................... 504
Monitoring iSCSI Traffic Flows................................................................................................... 506
Application of Quality of Service to iSCSI Traffic Flows............................................................506
Information Monitored in iSCSI Traffic Flows............................................................................506
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................ 507
Configuring Detection and Ports for Dell Compellent Arrays..................................................508
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................508
Enable and Disable iSCSI Optimization..................................................................................... 508
Default iSCSI Optimization Values...................................................................................................509
iSCSI Optimization Prerequisites......................................................................................................510
Configuring iSCSI Optimization....................................................................................................... 510
Displaying iSCSI Optimization Information......................................................................................512
27 Intermediate System to Intermediate System.......................................... 514
IS-IS Protocol Overview....................................................................................................................514
IS-IS Addressing.................................................................................................................................514
Multi-Topology IS-IS.........................................................................................................................515
Transition Mode...........................................................................................................................515
Interface Support.........................................................................................................................516
Adjacencies..................................................................................................................................516
Graceful Restart.................................................................................................................................516
Timers.......................................................................................................................................... 516
Implementation Information.............................................................................................................517
Configuration Information................................................................................................................518
Configuration Tasks for IS-IS......................................................................................................518
Configuring the Distance of a Route..........................................................................................527
Changing the IS-Type................................................................................................................. 527
Redistributing IPv4 Routes..........................................................................................................530
Redistributing IPv6 Routes..........................................................................................................530
Configuring Authentication Passwords......................................................................................531
Setting the Overload Bit..............................................................................................................532
Debugging IS-IS.......................................................................................................................... 532
IS-IS Metric Styles............................................................................................................................. 534
Configure Metric Values................................................................................................................... 534
Maximum Values in the Routing Table...................................................................................... 534
Change the IS-IS Metric Style in One Level Only...................................................................... 534
18
Leaks from One Level to Another.............................................................................................. 536
Sample Configurations..................................................................................................................... 537
28 Link Aggregation Control Protocol (LACP)...............................................540
Introduction to Dynamic LAGs and LACP....................................................................................... 540
Important Points to Remember................................................................................................. 540
LACP Modes................................................................................................................................ 541
Configuring LACP Commands................................................................................................... 541
LACP Configuration Tasks................................................................................................................542
Creating a LAG............................................................................................................................ 542
Configuring the LAG Interfaces as Dynamic..............................................................................543
Setting the LACP Long Timeout.................................................................................................543
Monitoring and Debugging LACP.............................................................................................. 544
Shared LAG State Tracking...............................................................................................................544
Configuring Shared LAG State Tracking.....................................................................................545
Important Points about Shared LAG State Tracking..................................................................546
LACP Basic Configuration Example................................................................................................. 547
Configure a LAG on ALPHA........................................................................................................ 547
29 Layer 2.............................................................................................................. 555
Manage the MAC Address Table...................................................................................................... 555
Clearing the MAC Address Table................................................................................................555
Setting the Aging Time for Dynamic Entries..............................................................................555
Configuring a Static MAC Address............................................................................................. 556
Displaying the MAC Address Table.............................................................................................556
MAC Learning Limit...........................................................................................................................556
Setting the MAC Learning Limit.................................................................................................. 557
mac learning-limit Dynamic....................................................................................................... 557
mac learning-limit mac-address-sticky.....................................................................................558
mac learning-limit station-move............................................................................................... 558
mac learning-limit no-station-move.........................................................................................558
Learning Limit Violation Actions.................................................................................................559
Setting Station Move Violation Actions......................................................................................559
Recovering from Learning Limit and Station Move Violations..................................................560
NIC Teaming.....................................................................................................................................560
Configure Redundant Pairs...............................................................................................................561
Important Points about Configuring Redundant Pairs..............................................................563
Far-End Failure Detection................................................................................................................ 564
FEFD State Changes....................................................................................................................565
Configuring FEFD........................................................................................................................566
Enabling FEFD on an Interface................................................................................................... 567
Debugging FEFD......................................................................................................................... 568
19
30 Link Layer Discovery Protocol (LLDP)........................................................570
802.1AB (LLDP) Overview................................................................................................................. 570
Protocol Data Units.....................................................................................................................570
Optional TLVs.................................................................................................................................... 571
Management TLVs....................................................................................................................... 571
TIA-1057 (LLDP-MED) Overview...................................................................................................... 573
TIA Organizationally Specific TLVs............................................................................................. 574
Configure LLDP.................................................................................................................................578
Related Configuration Tasks.......................................................................................................578
Important Points to Remember..................................................................................................578
LLDP Compatibility......................................................................................................................579
CONFIGURATION versus INTERFACE Configurations....................................................................579
Enabling LLDP...................................................................................................................................580
Disabling and Undoing LLDP......................................................................................................580
Enabling LLDP on Management Ports.............................................................................................580
Disabling and Undoing LLDP on Management Ports................................................................580
Advertising TLVs................................................................................................................................ 581
Viewing the LLDP Configuration......................................................................................................582
Viewing Information Advertised by Adjacent LLDP Agents.............................................................583
Configuring LLDPDU Intervals......................................................................................................... 584
Configuring Transmit and Receive Mode........................................................................................584
Configuring the Time to Live Value................................................................................................. 585
Debugging LLDP...............................................................................................................................586
Relevant Management Objects........................................................................................................ 587
31 Microsoft Network Load Balancing............................................................ 593
NLB Unicast Mode Scenario.............................................................................................................593
NLB Multicast Mode Scenario.......................................................................................................... 594
Limitations of the NLB Feature.........................................................................................................594
Microsoft Clustering......................................................................................................................... 594
Enable and Disable VLAN Flooding .................................................................................................595
Configuring a Switch for NLB ..........................................................................................................595
Enabling a Switch for Multicast NLB.......................................................................................... 595
32 Multicast Source Discovery Protocol (MSDP)...........................................597
Protocol Overview............................................................................................................................ 597
Anycast RP........................................................................................................................................ 599
Implementation Information............................................................................................................599
Configure Multicast Source Discovery Protocol.............................................................................599
Related Configuration Tasks...................................................................................................... 599
Enable MSDP.....................................................................................................................................603
20
/