PowerSwitch S6000

Dell PowerSwitch S6000, Networking S6000 Specification

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6000 Specification. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S6000
System
9.5(0.1)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 07
Rev. A00
Contents
1 About this Guide................................................................................................. 32
Audience..............................................................................................................................................32
Conventions........................................................................................................................................ 32
Related Documents............................................................................................................................ 32
2 Configuration Fundamentals........................................................................... 33
Accessing the Command Line............................................................................................................33
CLI Modes............................................................................................................................................33
Navigating CLI Modes................................................................................................................... 34
The do Command............................................................................................................................... 37
Undoing Commands...........................................................................................................................38
Obtaining Help.................................................................................................................................... 39
Entering and Editing Commands....................................................................................................... 39
Command History.............................................................................................................................. 40
Filtering show Command Outputs.....................................................................................................40
Multiple Users in Configuration Mode............................................................................................... 42
3 Getting Started....................................................................................................43
Console Access...................................................................................................................................43
Serial Console................................................................................................................................43
Default Configuration......................................................................................................................... 44
Configuring a Host Name...................................................................................................................44
Accessing the System Remotely.........................................................................................................45
Accessing the and S6000Remotely............................................................................................. 45
Configure the Management Port IP Address............................................................................... 45
Configure a Management Route..................................................................................................46
Configuring a Username and Password.......................................................................................46
Configuring the Enable Password......................................................................................................46
Configuration File Management.........................................................................................................47
Copy Files to and from the System.............................................................................................. 47
Save the Running-Configuration..................................................................................................48
Configure the Overload Bit for a Startup Scenario......................................................................49
Viewing Files..................................................................................................................................49
Managing the File System...................................................................................................................50
View Command History...................................................................................................................... 51
Upgrading Dell Networking OS...........................................................................................................51
Using HTTP for File Transfers..............................................................................................................51
Using Hashes to Validate Software Images........................................................................................52
4 Management....................................................................................................... 54
Configuring Privilege Levels............................................................................................................... 54
Creating a Custom Privilege Level................................................................................................54
Removing a Command from EXEC Mode................................................................................... 54
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 54
Allowing Access to CONFIGURATION Mode Commands.......................................................... 55
Allowing Access to the Following Modes.....................................................................................55
Applying a Privilege Level to a Username.....................................................................................57
Applying a Privilege Level to a Terminal Line............................................................................... 57
Configuring Logging........................................................................................................................... 57
Audit and Security Logs.................................................................................................................58
Configuring Logging Format ...................................................................................................... 59
Setting Up a Secure Connection to a Syslog Server....................................................................60
Log Messages in the Internal Buffer................................................................................................... 61
Configuration Task List for System Log Management.................................................................61
Disabling System Logging...................................................................................................................61
Sending System Messages to a Syslog Server....................................................................................62
Configuring a UNIX System as a Syslog Server............................................................................62
Changing System Logging Settings....................................................................................................62
Display the Logging Buffer and the Logging Configuration............................................................. 63
Configuring a UNIX Logging Facility Level.........................................................................................64
Synchronizing Log Messages............................................................................................................. 65
Enabling Timestamp on Syslog Messages......................................................................................... 65
File Transfer Services.......................................................................................................................... 66
Configuration Task List for File Transfer Services........................................................................66
Enabling the FTP Server................................................................................................................ 66
Configuring FTP Server Parameters..............................................................................................67
Configuring FTP Client Parameters.............................................................................................. 67
Terminal Lines.....................................................................................................................................68
Denying and Permitting Access to a Terminal Line.....................................................................68
Configuring Login Authentication for Terminal Lines................................................................. 69
Setting Time Out of EXEC Privilege Mode......................................................................................... 70
Using Telnet to get to Another Network Device............................................................................... 70
Lock CONFIGURATION Mode............................................................................................................ 71
Viewing the Configuration Lock Status.........................................................................................71
Restoring the Factory Default Settings...............................................................................................72
S6000MXL Switch..........................................................................................................................72
Important Points to Remember....................................................................................................72
Restoring Factory Default Environment Variables....................................................................... 73
5 802.1X................................................................................................................... 75
The Port-Authentication Process.......................................................................................................76
EAP over RADIUS...........................................................................................................................78
Configuring 802.1X............................................................................................................................. 78
Related Configuration Tasks.........................................................................................................78
Important Points to Remember..........................................................................................................79
Enabling 802.1X...................................................................................................................................79
Configuring Request Identity Re-Transmissions................................................................................81
Configuring a Quiet Period after a Failed Authentication............................................................81
Forcibly Authorizing or Unauthorizing a Port....................................................................................82
Re-Authenticating a Port.................................................................................................................... 83
Configuring Timeouts.........................................................................................................................84
Configuring Dynamic VLAN Assignment with Port Authentication..................................................85
Guest and Authentication-Fail VLANs................................................................................................86
Configuring a Guest VLAN............................................................................................................ 87
Configuring an Authentication-Fail VLAN....................................................................................87
6 Access Control Lists (ACLs).............................................................................. 89
IP Access Control Lists (ACLs)............................................................................................................90
CAM Usage....................................................................................................................................90
Implementing ACLs on Dell Networking OS................................................................................92
Important Points to Remember..........................................................................................................93
Configuration Task List for Route Maps.......................................................................................93
Configuring Match Routes............................................................................................................96
Configuring Set Conditions...........................................................................................................97
Configure a Route Map for Route Redistribution........................................................................98
Configure a Route Map for Route Tagging..................................................................................99
Continue Clause............................................................................................................................99
IP Fragment Handling.......................................................................................................................100
IP Fragments ACL Examples.......................................................................................................100
Layer 4 ACL Rules Examples....................................................................................................... 101
Configure a Standard IP ACL............................................................................................................ 102
Configuring a Standard IP ACL Filter..........................................................................................103
Configure an Extended IP ACL.........................................................................................................104
Configuring Filters with a Sequence Number............................................................................104
Configuring Filters Without a Sequence Number......................................................................105
Configure Layer 2 and Layer 3 ACLs................................................................................................ 106
Assign an IP ACL to an Interface.......................................................................................................107
Applying an IP ACL............................................................................................................................ 107
Counting ACL Hits.......................................................................................................................108
Configure Ingress ACLs.................................................................................................................... 108
Configure Egress ACLs..................................................................................................................... 109
Applying Egress Layer 3 ACLs (Control-Plane)...........................................................................110
IP Prefix Lists......................................................................................................................................110
Implementation Information....................................................................................................... 111
Configuration Task List for Prefix Lists........................................................................................ 111
ACL Resequencing.............................................................................................................................115
Resequencing an ACL or Prefix List............................................................................................ 115
Route Maps........................................................................................................................................ 117
Implementation Information....................................................................................................... 117
Flow-Based Monitoring Support for ACLs........................................................................................117
Behavior of Flow-Based Monitoring...........................................................................................118
Enabling Flow-Based Monitoring................................................................................................119
7 Bidirectional Forwarding Detection (BFD)................................................... 121
How BFD Works.................................................................................................................................121
BFD Packet Format......................................................................................................................122
BFD Sessions................................................................................................................................124
BFD Three-Way Handshake........................................................................................................124
Session State Changes................................................................................................................ 125
Important Points to Remember........................................................................................................126
Configure BFD...................................................................................................................................126
Configure BFD for Physical Ports................................................................................................127
Configure BFD for Static Routes.................................................................................................130
Configure BFD for OSPF............................................................................................................. 132
Configure BFD for OSPFv3..........................................................................................................135
Configure BFD for IS-IS...............................................................................................................136
Configure BFD for BGP............................................................................................................... 139
Configure BFD for VRRP............................................................................................................. 146
Configuring Protocol Liveness................................................................................................... 149
Troubleshooting BFD..................................................................................................................149
8 Border Gateway Protocol IPv4 (BGPv4)....................................................... 151
Autonomous Systems (AS)................................................................................................................ 151
Sessions and Peers............................................................................................................................ 153
Establish a Session.......................................................................................................................154
Route Reflectors................................................................................................................................154
BGP Attributes................................................................................................................................... 155
Best Path Selection Criteria.........................................................................................................156
Weight..........................................................................................................................................158
Local Preference......................................................................................................................... 158
Multi-Exit Discriminators (MEDs)................................................................................................ 159
Origin...........................................................................................................................................160
AS Path......................................................................................................................................... 161
Next Hop...................................................................................................................................... 161
Multiprotocol BGP.............................................................................................................................162
Implement BGP with Dell Networking OS....................................................................................... 162
Additional Path (Add-Path) Support........................................................................................... 162
Advertise IGP Cost as MED for Redistributed Routes................................................................ 162
Ignore Router-ID for Some Best-Path Calculations..................................................................163
Four-Byte AS Numbers............................................................................................................... 163
AS4 Number Representation...................................................................................................... 164
AS Number Migration..................................................................................................................165
BGP4 Management Information Base (MIB)...............................................................................167
Important Points to Remember..................................................................................................167
Configuration Information................................................................................................................168
BGP Configuration............................................................................................................................168
Enabling BGP...............................................................................................................................169
Configuring AS4 Number Representations................................................................................ 173
Configuring Peer Groups............................................................................................................ 175
Configuring BGP Fast Fall-Over..................................................................................................177
Configuring Passive Peering....................................................................................................... 179
Maintaining Existing AS Numbers During an AS Migration........................................................180
Allowing an AS Number to Appear in its Own AS Path.............................................................. 181
Enabling Graceful Restart............................................................................................................182
Enabling Neighbor Graceful Restart...........................................................................................183
Filtering on an AS-Path Attribute................................................................................................183
Regular Expressions as Filters..................................................................................................... 185
Redistributing Routes..................................................................................................................186
Enabling Additional Paths............................................................................................................187
Configuring IP Community Lists.................................................................................................187
Configuring an IP Extended Community List.............................................................................189
Filtering Routes with Community Lists...................................................................................... 190
Manipulating the COMMUNITY Attribute...................................................................................190
Changing MED Attributes............................................................................................................192
Changing the LOCAL_PREFERENCE Attribute...........................................................................192
Changing the NEXT_HOP Attribute............................................................................................193
Changing the WEIGHT Attribute.................................................................................................194
Enabling Multipath...................................................................................................................... 194
Filtering BGP Routes................................................................................................................... 194
Filtering BGP Routes Using Route Maps.................................................................................... 196
Filtering BGP Routes Using AS-PATH Information.................................................................... 197
Configuring BGP Route Reflectors............................................................................................. 197
Aggregating Routes.....................................................................................................................198
Configuring BGP Confederations...............................................................................................199
Enabling Route Flap Dampening................................................................................................ 199
Changing BGP Timers................................................................................................................ 202
Enabling BGP Neighbor Soft-Reconfiguration..........................................................................202
Route Map Continue.................................................................................................................. 204
Enabling MBGP Configurations....................................................................................................... 204
BGP Regular Expression Optimization.............................................................................................205
Debugging BGP................................................................................................................................ 205
Storing Last and Bad PDUs.........................................................................................................206
Capturing PDUs...........................................................................................................................207
PDU Counters.............................................................................................................................208
Sample Configurations.....................................................................................................................209
9 Content Addressable Memory (CAM)........................................................... 215
CAM Allocation..................................................................................................................................215
Test CAM Usage................................................................................................................................ 217
View CAM Profiles............................................................................................................................. 217
View CAM-ACL Settings....................................................................................................................218
View CAM Usage...............................................................................................................................220
CAM Optimization............................................................................................................................ 220
Troubleshoot CAM Profiling............................................................................................................. 221
CAM Profile Mismatches............................................................................................................. 221
QoS CAM Region Limitation....................................................................................................... 221
Syslog Error When the Table is Full............................................................................................ 221
Syslog Warning Upon 90 Percent Utilization of CAM............................................................... 222
Syslog Warning for Discrepancies Between Configured Extended Prefixes............................ 222
10 Control Plane Policing (CoPP).....................................................................223
Configure Control Plane Policing.................................................................................................... 224
Configuring CoPP for Protocols.................................................................................................225
Configuring CoPP for CPU Queues........................................................................................... 227
Show Commands....................................................................................................................... 228
11 Data Center Bridging (DCB)..........................................................................230
Ethernet Enhancements in Data Center Bridging........................................................................... 230
Priority-Based Flow Control....................................................................................................... 231
Enhanced Transmission Selection..............................................................................................233
Data Center Bridging Exchange Protocol (DCBx)..................................................................... 235
Data Center Bridging in a Traffic Flow....................................................................................... 235
Enabling Data Center Bridging.........................................................................................................236
QoS dot1p Traffic Classification and Queue Assignment...............................................................236
SNMP Support for PFC and Buffer Statistics Tracking.....................................................................237
Configuring Priority-Based Flow Control........................................................................................238
Configuring Lossless Queues.....................................................................................................240
Configuring the PFC Buffer in a Switch Stack............................................................................241
Configure Enhanced Transmission Selection..................................................................................242
ETS Prerequisites and Restrictions............................................................................................. 242
Creating a QoS DCB Output Policy........................................................................................... 243
Creating an ETS Priority Group.................................................................................................. 245
Applying an ETS Output Policy for a Priority Group to an Interface........................................ 246
ETS Operation with DCBx...........................................................................................................247
Configuring Bandwidth Allocation for DCBx CIN..................................................................... 248
Applying DCB Policies in a Switch Stack......................................................................................... 248
Applying DCB Policies with an ETS Configuration..........................................................................249
Configure a DCBx Operation........................................................................................................... 249
DCBx Operation..........................................................................................................................250
DCBx Port Roles..........................................................................................................................250
DCB Configuration Exchange.................................................................................................... 252
Configuration Source Election................................................................................................... 252
Propagation of DCB Information............................................................................................... 253
Auto-Detection and Manual Configuration of the DCBx Version............................................ 253
Behavior of Tagged Packets....................................................................................................... 254
Configuration Example for DSCP and PFC Priorities.................................................................254
DCBx Example.............................................................................................................................255
DCBx Prerequisites and Restrictions..........................................................................................256
Configuring DCBx.......................................................................................................................256
Verifying the DCB Configuration..................................................................................................... 260
Generation of PFC for a Priority for Untagged Packets...................................................................271
Operations on Untagged Packets.................................................................................................... 272
Performing PFC Using DSCP Bits Instead of 802.1p Bits.................................................................272
PFC and ETS Configuration Examples............................................................................................. 273
Using PFC and ETS to Manage Data Center Traffic.........................................................................273
PFC and ETS Configuration Command Examples.....................................................................275
Using PFC and ETS to Manage Converged Ethernet Traffic in a Switch Stack........................ 276
Hierarchical Scheduling in ETS Output Policies........................................................................ 276
Configuring DCB Maps and its Attributes.........................................................................................277
DCB Map: Configuration Procedure.......................................................................................... 277
Important Points to Remember..................................................................................................278
Applying a DCB Map on a Port................................................................................................... 278
Configuring PFC without a DCB Map........................................................................................ 279
Configuring Lossless Queues.....................................................................................................280
Data Center Bridging: Default Configuration.................................................................................. 281
Configuring PFC and ETS in a DCB Map..........................................................................................281
PFC Configuration Notes............................................................................................................281
PFC Prerequisites and Restrictions.............................................................................................282
ETS Configuration Notes............................................................................................................ 283
ETS Prerequisites and Restrictions............................................................................................. 283
Priority-Based Flow Control Using Dynamic Buffer Method..........................................................284
Pause and Resume of Traffic......................................................................................................284
Buffer Sizes for Lossless or PFC Packets....................................................................................285
Interworking of DCB Map With DCB Buffer Threshold Settings.....................................................285
Configuring the Dynamic Buffer Method........................................................................................286
Applying a DCB Map in a Switch Stack ...........................................................................................288
12 Dynamic Host Configuration Protocol (DHCP)........................................289
DHCP Packet Format and Options.................................................................................................. 289
Assign an IP Address using DHCP.................................................................................................... 291
Implementation Information............................................................................................................292
Configure the System to be a DHCP Server....................................................................................293
Configuring the Server for Automatic Address Allocation........................................................ 293
Specifying a Default Gateway.....................................................................................................295
Configure a Method of Hostname Resolution.......................................................................... 295
Using DNS for Address Resolution.............................................................................................295
Using NetBIOS WINS for Address Resolution............................................................................ 295
Creating Manual Binding Entries................................................................................................296
Debugging the DHCP Server......................................................................................................296
Using DHCP Clear Commands.................................................................................................. 296
Configure the System to be a DHCP Client.....................................................................................297
Configuring the DHCP Client System........................................................................................ 297
DHCP Client on a Management Interface................................................................................. 299
DHCP Client Operation with Other Features............................................................................ 299
Configure the System for User Port Stacking (Option 230)........................................................... 300
Configure Secure DHCP...................................................................................................................301
Option 82.....................................................................................................................................301
DHCP Snooping..........................................................................................................................302
Drop DHCP Packets on Snooped VLANs Only..........................................................................304
Dynamic ARP Inspection............................................................................................................ 304
Configuring Dynamic ARP Inspection....................................................................................... 305
Source Address Validation................................................................................................................306
Enabling IP Source Address Validation...................................................................................... 306
DHCP MAC Source Address Validation......................................................................................307
Enabling IP+MAC Source Address Validation............................................................................ 307
13 Equal Cost Multi-Path (ECMP)..................................................................... 309
ECMP for Flow-Based Affinity..........................................................................................................309
Configuring the Hash Algorithm................................................................................................309
Enabling Deterministic ECMP Next Hop....................................................................................309
Configuring the Hash Algorithm Seed....................................................................................... 310
Link Bundle Monitoring.....................................................................................................................310
Managing ECMP Group Paths..................................................................................................... 311
Creating an ECMP Group Bundle............................................................................................... 312
Modifying the ECMP Group Threshold.......................................................................................312
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table................. 313
Support for ECMP in host table.................................................................................................. 313
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes .................................................. 314
14 FCoE Transit.....................................................................................................315
Fibre Channel over Ethernet.............................................................................................................315
Ensure Robustness in a Converged Ethernet Network................................................................... 315
FIP Snooping on Ethernet Bridges....................................................................................................317
FIP Snooping in a Switch Stack.........................................................................................................319
Using FIP Snooping........................................................................................................................... 319
FIP Snooping Prerequisites......................................................................................................... 319
Important Points to Remember................................................................................................. 320
Enabling the FCoE Transit Feature.............................................................................................320
Enable FIP Snooping on VLANs.................................................................................................. 321
Configure the FC-MAP Value......................................................................................................321
Configure a Port for a Bridge-to-Bridge Link............................................................................ 321
Configure a Port for a Bridge-to-FCF Link.................................................................................321
Impact on Other Software Features........................................................................................... 321
FIP Snooping Restrictions...........................................................................................................322
Configuring FIP Snooping...........................................................................................................322
Displaying FIP Snooping Information...............................................................................................323
FCoE Transit Configuration Example...............................................................................................329
15 Flex Hash and Optimized Boot-Up..............................................................331
Flex Hash Capability Overview..........................................................................................................331
Configuring the Flex Hash Mechanism............................................................................................ 331
Configuring Fast Boot and LACP Fast Switchover...........................................................................332
Optimizing the Boot Time................................................................................................................332
Booting Process When Optimized Boot Time Mechanism is Enabled.....................................333
Guidelines for Configuring Optimized Booting Mechanism.....................................................333
Interoperation of Applications with Fast Boot and System States..................................................334
LACP and IPv4 Routing...............................................................................................................334
LACP and IPv6 Routing............................................................................................................... 335
BGP Graceful Restart.................................................................................................................. 335
Cold Boot Caused by Power Cycling the System..................................................................... 335
Unexpected Reload of the System.............................................................................................335
Software Upgrade....................................................................................................................... 336
LACP Fast Switchover................................................................................................................. 336
Changes to BGP Multipath......................................................................................................... 336
Delayed Installation of ECMP Routes Into BGP.........................................................................336
RDMA Over Converged Ethernet (RoCE) Overview........................................................................ 337
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.............................................................338
16 Force10 Resilient Ring Protocol (FRRP).....................................................339
Protocol Overview............................................................................................................................339
Ring Status.................................................................................................................................. 340
Multiple FRRP Rings.....................................................................................................................341
Important FRRP Points................................................................................................................ 341
Important FRRP Concepts.......................................................................................................... 341
Implementing FRRP.......................................................................................................................... 343
FRRP Configuration.......................................................................................................................... 343
Creating the FRRP Group........................................................................................................... 343
Configuring the Control VLAN...................................................................................................344
Configuring and Adding the Member VLANs.............................................................................345
Setting the FRRP Timers............................................................................................................. 346
Clearing the FRRP Counters....................................................................................................... 347
Viewing the FRRP Configuration................................................................................................ 347
Viewing the FRRP Information....................................................................................................347
Troubleshooting FRRP......................................................................................................................348
Configuration Checks.................................................................................................................348
Sample Configuration and Topology.............................................................................................. 348
17 GARP VLAN Registration Protocol (GVRP)................................................ 350
Important Points to Remember....................................................................................................... 350
Configure GVRP................................................................................................................................ 351
Related Configuration Tasks....................................................................................................... 351
Enabling GVRP Globally....................................................................................................................352
Enabling GVRP on a Layer 2 Interface............................................................................................. 352
Configure GVRP Registration........................................................................................................... 352
Configure a GARP Timer...................................................................................................................353
18 Internet Group Management Protocol (IGMP).........................................355
IGMP Implementation Information..................................................................................................355
IGMP Protocol Overview.................................................................................................................. 355
IGMP Version 2............................................................................................................................355
IGMP Version 3............................................................................................................................357
Configure IGMP................................................................................................................................ 360
Related Configuration Tasks...................................................................................................... 360
Viewing IGMP Enabled Interfaces.....................................................................................................361
Selecting an IGMP Version................................................................................................................361
Viewing IGMP Groups.......................................................................................................................362
Adjusting Timers............................................................................................................................... 362
Adjusting Query and Response Timers......................................................................................362
Adjusting the IGMP Querier Timeout Value...............................................................................363
Configuring a Static IGMP Group.....................................................................................................363
Enabling IGMP Immediate-Leave.................................................................................................... 364
IGMP Snooping.................................................................................................................................364
IGMP Snooping Implementation Information...........................................................................364
Configuring IGMP Snooping...................................................................................................... 364
Removing a Group-Port Association......................................................................................... 365
Disabling Multicast Flooding...................................................................................................... 365
Specifying a Port as Connected to a Multicast Router..............................................................366
Configuring the Switch as Querier.............................................................................................366
Fast Convergence after MSTP Topology Changes..........................................................................367
Egress Interface Selection (EIS) for HTTP and IGMP Applications..................................................367
Protocol Separation....................................................................................................................368
Enabling and Disabling Management Egress Interface Selection.............................................369
Handling of Management Route Configuration........................................................................370
Handling of Switch-Initiated Traffic........................................................................................... 370
Handling of Switch-Destined Traffic.......................................................................................... 371
Handling of Transit Traffic (Traffic Separation).......................................................................... 372
Mapping of Management Applications and Traffic Type...........................................................372
Behavior of Various Applications for Switch-Initiated Traffic ...................................................373
Behavior of Various Applications for Switch-Destined Traffic ................................................. 374
Interworking of EIS With Various Applications...........................................................................375
Designating a Multicast Router Interface.........................................................................................376
19 Interfaces......................................................................................................... 377
Basic Interface Configuration........................................................................................................... 377
Advanced Interface Configuration................................................................................................... 377
Interface Types..................................................................................................................................378
View Basic Interface Information..................................................................................................... 378
Enabling a Physical Interface........................................................................................................... 380
Physical Interfaces............................................................................................................................380
Configuration Task List for Physical Interfaces..........................................................................381
40G to 1G Breakout Cable Adaptor............................................................................................381
Overview of Layer Modes........................................................................................................... 381
Configuring Layer 2 (Data Link) Mode....................................................................................... 382
Configuring Layer 2 (Interface) Mode........................................................................................382
Configuring Layer 3 (Network) Mode.........................................................................................383
Configuring Layer 3 (Interface) Mode........................................................................................ 383
Egress Interface Selection (EIS)........................................................................................................384
Important Points to Remember................................................................................................. 384
Configuring EIS........................................................................................................................... 385
Management Interfaces....................................................................................................................385
Configuring Management Interfaces......................................................................................... 385
Configuring Management Interfaces on the S-Series...............................................................386
VLAN Interfaces................................................................................................................................ 386
Loopback Interfaces......................................................................................................................... 387
Null Interfaces...................................................................................................................................388
Port Channel Interfaces....................................................................................................................388
Port Channel Definition and Standards..................................................................................... 388
Port Channel Benefits.................................................................................................................389
Port Channel Implementation....................................................................................................389
10/100/1000 Mbps Interfaces in Port Channels........................................................................389
Configuration Tasks for Port Channel Interfaces......................................................................390
Creating a Port Channel.............................................................................................................390
Adding a Physical Interface to a Port Channel...........................................................................391
Reassigning an Interface to a New Port Channel......................................................................393
Configuring the Minimum Oper Up Links in a Port Channel....................................................393
.....................................................................................................................................................394
Assigning an IP Address to a Port Channel................................................................................394
Deleting or Disabling a Port Channel.........................................................................................395
Load Balancing Through Port Channels....................................................................................395
Load-Balancing on the S- Series................................................................................................395
Changing the Hash Algorithm....................................................................................................396
Bulk Configuration............................................................................................................................397
Interface Range........................................................................................................................... 397
Bulk Configuration Examples..................................................................................................... 398
Defining Interface Range Macros.................................................................................................... 399
Define the Interface Range.........................................................................................................399
Choosing an Interface-Range Macro........................................................................................400
Monitoring and Maintaining Interfaces........................................................................................... 400
Maintenance Using TDR............................................................................................................. 401
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 402
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................402
Important Points to Remember................................................................................................. 403
Support for LM4 Optics..............................................................................................................404
Example Scenarios......................................................................................................................404
Link Dampening............................................................................................................................... 408
Important Points to Remember.................................................................................................408
Enabling Link Dampening.......................................................................................................... 408
Link Bundle Monitoring.....................................................................................................................410
Using Ethernet Pause Frames for Flow Control.............................................................................. 410
Threshold Settings....................................................................................................................... 411
Enabling Pause Frames................................................................................................................411
Configure the MTU Size on an Interface..........................................................................................412
Port-Pipes..........................................................................................................................................413
Auto-Negotiation on Ethernet Interfaces........................................................................................ 413
Setting the Speed and Duplex Mode of Ethernet Interfaces.....................................................414
Set Auto-Negotiation Options....................................................................................................415
View Advanced Interface Information..............................................................................................416
Configuring the Interface Sampling Size....................................................................................417
Dynamic Counters............................................................................................................................ 418
Clearing Interface Counters....................................................................................................... 418
Enhanced Validation of Interface Ranges........................................................................................419
Compressing Configuration Files.....................................................................................................419
20 IPv4 Routing................................................................................................... 423
IP Addresses...................................................................................................................................... 423
Implementation Information......................................................................................................423
Configuration Tasks for IP Addresses.............................................................................................. 423
Assigning IP Addresses to an Interface............................................................................................424
Configuring Static Routes.................................................................................................................425
Configure Static Routes for the Management Interface.................................................................426
Using the Configured Source IP Address in ICMP Messages..........................................................427
Configuring the ICMP Source Interface.....................................................................................427
Configuring the Duration to Establish a TCP Connection..............................................................427
Enabling Directed Broadcast............................................................................................................428
Resolution of Host Names............................................................................................................... 428
Enabling Dynamic Resolution of Host Names................................................................................ 429
Specifying the Local System Domain and a List of Domains..........................................................429
Configuring DNS with Traceroute................................................................................................... 430
ARP.....................................................................................................................................................431
Configuration Tasks for ARP.............................................................................................................431
Configuring Static ARP Entries..........................................................................................................431
Enabling Proxy ARP...........................................................................................................................432
Clearing ARP Cache..........................................................................................................................432
ARP Learning via Gratuitous ARP..................................................................................................... 433
Enabling ARP Learning via Gratuitous ARP...................................................................................... 433
ARP Learning via ARP Request......................................................................................................... 433
Configuring ARP Retries................................................................................................................... 434
ICMP.................................................................................................................................................. 435
Configuration Tasks for ICMP.......................................................................................................... 435
Enabling ICMP Unreachable Messages............................................................................................435
UDP Helper....................................................................................................................................... 436
Configure UDP Helper................................................................................................................436
Important Points to Remember................................................................................................. 436
Enabling UDP Helper........................................................................................................................436
Configuring a Broadcast Address.....................................................................................................437
Configurations Using UDP Helper....................................................................................................437
UDP Helper with Broadcast-All Addresses...................................................................................... 437
UDP Helper with Subnet Broadcast Addresses............................................................................... 438
UDP Helper with Configured Broadcast Addresses........................................................................ 439
UDP Helper with No Configured Broadcast Addresses.................................................................. 439
Troubleshooting UDP Helper.......................................................................................................... 440
21 IPv6 Routing....................................................................................................441
Protocol Overview............................................................................................................................ 441
Extended Address Space.............................................................................................................441
Stateless Autoconfiguration........................................................................................................441
IPv6 Headers............................................................................................................................... 442
Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support.............................................. 442
IPv6 Header Fields...................................................................................................................... 444
Extension Header Fields............................................................................................................. 445
Addressing...................................................................................................................................446
Implementing IPv6 with Dell Networking OS................................................................................. 448
ICMPv6..............................................................................................................................................450
Path MTU Discovery......................................................................................................................... 450
IPv6 Neighbor Discovery.................................................................................................................. 451
IPv6 Neighbor Discovery of MTU Packets................................................................................. 452
Configuring the IPv6 Recursive DNS Server.............................................................................. 452
Debugging IPv6 RDNSS Information Sent to the Host .............................................................453
Displaying IPv6 RDNSS Information...........................................................................................453
Secure Shell (SSH) Over an IPv6 Transport......................................................................................454
Configuration Tasks for IPv6............................................................................................................454
Adjusting Your CAM-Profile........................................................................................................455
Assigning an IPv6 Address to an Interface.................................................................................455
Assigning a Static IPv6 Route..................................................................................................... 456
Configuring Telnet with IPv6......................................................................................................457
SNMP over IPv6...........................................................................................................................457
Showing IPv6 Information.......................................................................................................... 457
Showing an IPv6 Interface..........................................................................................................458
Showing IPv6 Routes..................................................................................................................459
Showing the Running-Configuration for an Interface..............................................................460
Clearing IPv6 Routes.................................................................................................................. 460
22 iSCSI Optimization.........................................................................................462
iSCSI Optimization Overview........................................................................................................... 462
Monitoring iSCSI Traffic Flows................................................................................................... 464
Application of Quality of Service to iSCSI Traffic Flows............................................................464
Information Monitored in iSCSI Traffic Flows............................................................................464
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................ 465
Configuring Detection and Ports for Dell Compellent Arrays..................................................466
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................466
Enable and Disable iSCSI Optimization..................................................................................... 466
Default iSCSI Optimization Values................................................................................................... 467
iSCSI Optimization Prerequisites..................................................................................................... 468
Configuring iSCSI Optimization.......................................................................................................468
Displaying iSCSI Optimization Information..................................................................................... 470
23 Intermediate System to Intermediate System.......................................... 472
IS-IS Protocol Overview................................................................................................................... 472
IS-IS Addressing................................................................................................................................ 472
Multi-Topology IS-IS.........................................................................................................................473
Transition Mode.......................................................................................................................... 474
Interface Support........................................................................................................................ 474
Adjacencies................................................................................................................................. 474
Graceful Restart................................................................................................................................ 474
Timers.......................................................................................................................................... 475
Implementation Information............................................................................................................ 475
Configuration Information............................................................................................................... 476
Configuration Tasks for IS-IS......................................................................................................476
Configuring the Distance of a Route......................................................................................... 485
Changing the IS-Type.................................................................................................................485
Redistributing IPv4 Routes......................................................................................................... 488
Redistributing IPv6 Routes......................................................................................................... 489
Configuring Authentication Passwords..................................................................................... 490
Setting the Overload Bit............................................................................................................. 490
Debugging IS-IS.......................................................................................................................... 491
IS-IS Metric Styles............................................................................................................................. 492
Configure Metric Values...................................................................................................................492
Maximum Values in the Routing Table...................................................................................... 493
Change the IS-IS Metric Style in One Level Only......................................................................493
Leaks from One Level to Another.............................................................................................. 495
Sample Configurations.....................................................................................................................495
24 Link Aggregation Control Protocol (LACP).............................................. 498
Introduction to Dynamic LAGs and LACP....................................................................................... 498
Important Points to Remember................................................................................................. 498
LACP Modes................................................................................................................................499
Configuring LACP Commands...................................................................................................499
LACP Configuration Tasks................................................................................................................500
Creating a LAG............................................................................................................................500
Configuring the LAG Interfaces as Dynamic..............................................................................501
Setting the LACP Long Timeout................................................................................................. 501
Monitoring and Debugging LACP.............................................................................................. 502
Shared LAG State Tracking...............................................................................................................502
Configuring Shared LAG State Tracking.................................................................................... 503
Important Points about Shared LAG State Tracking..................................................................504
LACP Basic Configuration Example................................................................................................. 505
Configure a LAG on ALPHA........................................................................................................505
25 Layer 2...............................................................................................................513
Manage the MAC Address Table.......................................................................................................513
Clearing the MAC Address Table................................................................................................ 513
Setting the Aging Time for Dynamic Entries.............................................................................. 513
Configuring a Static MAC Address..............................................................................................514
Displaying the MAC Address Table.............................................................................................514
MAC Learning Limit...........................................................................................................................514
Setting the MAC Learning Limit.................................................................................................. 515
mac learning-limit Dynamic....................................................................................................... 515
mac learning-limit mac-address-sticky..................................................................................... 516
mac learning-limit station-move................................................................................................516
mac learning-limit no-station-move......................................................................................... 516
Learning Limit Violation Actions................................................................................................. 517
Setting Station Move Violation Actions.......................................................................................517
Recovering from Learning Limit and Station Move Violations.................................................. 518
NIC Teaming..................................................................................................................................... 518
Configure Redundant Pairs...............................................................................................................519
Important Points about Configuring Redundant Pairs...............................................................521
Far-End Failure Detection.................................................................................................................522
FEFD State Changes....................................................................................................................523
Configuring FEFD........................................................................................................................524
Enabling FEFD on an Interface................................................................................................... 525
Debugging FEFD......................................................................................................................... 526
26 Link Layer Discovery Protocol (LLDP)........................................................528
802.1AB (LLDP) Overview.................................................................................................................528
Protocol Data Units.....................................................................................................................528
Optional TLVs....................................................................................................................................529
Management TLVs...................................................................................................................... 529
TIA-1057 (LLDP-MED) Overview...................................................................................................... 531
TIA Organizationally Specific TLVs.............................................................................................532
Configure LLDP.................................................................................................................................536
Related Configuration Tasks.......................................................................................................536
Important Points to Remember..................................................................................................537
LLDP Compatibility......................................................................................................................537
CONFIGURATION versus INTERFACE Configurations.................................................................... 537
Enabling LLDP...................................................................................................................................538
Disabling and Undoing LLDP......................................................................................................538
Enabling LLDP on Management Ports............................................................................................. 538
Disabling and Undoing LLDP on Management Ports................................................................538
Advertising TLVs................................................................................................................................539
Viewing the LLDP Configuration......................................................................................................540
Viewing Information Advertised by Adjacent LLDP Agents.............................................................541
Configuring LLDPDU Intervals......................................................................................................... 542
Configuring Transmit and Receive Mode........................................................................................ 542
Configuring a Time to Live............................................................................................................... 543
Debugging LLDP...............................................................................................................................544
Relevant Management Objects........................................................................................................545
27 Microsoft Network Load Balancing............................................................ 551
NLB Unicast Mode Scenario............................................................................................................. 551
NLB Multicast Mode Scenario.......................................................................................................... 552
Limitations With Enabling NLB on Switches.................................................................................... 552
Benefits and Working of Microsoft Clustering.................................................................................552
Enable and Disable VLAN Flooding .................................................................................................553
Configuring a Switch for NLB ..........................................................................................................553
..................................................................................................................................................... 553
28 Multicast Source Discovery Protocol (MSDP)...........................................554
Protocol Overview............................................................................................................................554
Anycast RP.........................................................................................................................................556
Implementation Information............................................................................................................556
Configure Multicast Source Discovery Protocol............................................................................. 556
Related Configuration Tasks.......................................................................................................556
Enable MSDP.....................................................................................................................................560
Manage the Source-Active Cache....................................................................................................561
Viewing the Source-Active Cache..............................................................................................561
Limiting the Source-Active Cache............................................................................................. 562
Clearing the Source-Active Cache.............................................................................................562
Enabling the Rejected Source-Active Cache.............................................................................562
Accept Source-Active Messages that Fail the RFP Check...............................................................562
Specifying Source-Active Messages................................................................................................ 566
Limiting the Source-Active Messages from a Peer..........................................................................567
Preventing MSDP from Caching a Local Source............................................................................. 567
Preventing MSDP from Caching a Remote Source.........................................................................568
Preventing MSDP from Advertising a Local Source........................................................................ 569
Logging Changes in Peership States................................................................................................570
Terminating a Peership.....................................................................................................................570
Clearing Peer Statistics..................................................................................................................... 570
Debugging MSDP.............................................................................................................................. 571
MSDP with Anycast RP...................................................................................................................... 571
Configuring Anycast RP.................................................................................................................... 573
Reducing Source-Active Message Flooding.............................................................................. 573
Specifying the RP Address Used in SA Messages.......................................................................573
MSDP Sample Configurations.......................................................................................................... 576
29 Multiple Spanning Tree Protocol (MSTP).................................................. 579
Protocol Overview............................................................................................................................ 579
Spanning Tree Variations..................................................................................................................580
Implementation Information......................................................................................................580
Configure Multiple Spanning Tree Protocol....................................................................................580
Related Configuration Tasks...................................................................................................... 580
Enable Multiple Spanning Tree Globally.......................................................................................... 581
Adding and Removing Interfaces..................................................................................................... 581
Creating Multiple Spanning Tree Instances..................................................................................... 581
Influencing MSTP Root Selection.....................................................................................................583
Interoperate with Non-Dell Networking OS Bridges...................................................................... 583
Changing the Region Name or Revision......................................................................................... 584
Modifying Global Parameters...........................................................................................................584
Modifying the Interface Parameters.................................................................................................585
Configuring an EdgePort..................................................................................................................586
Flush MAC Addresses after a Topology Change............................................................................. 587
MSTP Sample Configurations...........................................................................................................587
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration............................................................ 588
Debugging and Verifying MSTP Configurations.............................................................................. 591
30 Multicast Features..........................................................................................594
Enabling IP Multicast........................................................................................................................ 594
Multicast with ECMP.........................................................................................................................594
Implementation Information............................................................................................................595
First Packet Forwarding for Lossless Multicast................................................................................596
Multicast Policies.............................................................................................................................. 596
IPv4 Multicast Policies................................................................................................................ 596
/