PowerSwitch S5048F-ON

Dell PowerSwitch S5048F-ON Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S5048F-ON Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Networking OS Conguration Guide for
the S5048F–ON System
9.14.1.5
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2019 - 05
Rev. A00
Contents
1 About this Guide...........................................................................................................................................35
Audience........................................................................................................................................................................... 35
Conventions......................................................................................................................................................................35
Related Documents......................................................................................................................................................... 35
2 Conguration Fundamentals........................................................................................................................ 36
Accessing the Command Line........................................................................................................................................36
CLI Modes.........................................................................................................................................................................36
Navigating CLI Modes............................................................................................................................................... 38
The do Command............................................................................................................................................................. 41
Undoing Commands.........................................................................................................................................................41
Obtaining Help..................................................................................................................................................................42
Entering and Editing Commands....................................................................................................................................42
Command History............................................................................................................................................................ 43
Filtering show Command Outputs................................................................................................................................. 43
Example of the grep Keyword.................................................................................................................................. 44
Multiple Users in Conguration Mode...........................................................................................................................45
Conguring alias command.............................................................................................................................................45
Viewing alias conguration....................................................................................................................................... 45
3 Getting Started............................................................................................................................................47
Console Access................................................................................................................................................................48
Serial Console.............................................................................................................................................................48
Micro USB-B Access.................................................................................................................................................49
Default Conguration...................................................................................................................................................... 50
Conguring a Host Name............................................................................................................................................... 50
Accessing the System Remotely................................................................................................................................... 50
Accessing the System Remotely............................................................................................................................. 50
Congure the Management Port IP Address.........................................................................................................50
Congure a Management Route...............................................................................................................................51
Conguring a Username and Password...................................................................................................................51
Conguring the Enable Password..................................................................................................................................52
Conguration File Management.....................................................................................................................................52
Copy Files to and from the System......................................................................................................................... 52
Mounting an NFS File System..................................................................................................................................54
Save the Running-Conguration............................................................................................................................. 55
Congure the Overload Bit for a Startup Scenario............................................................................................... 56
Viewing Files...............................................................................................................................................................56
Managing the File System...............................................................................................................................................57
View Command History.................................................................................................................................................. 58
Upgrading Dell EMC Networking OS............................................................................................................................ 59
Using HTTP for File Transfers........................................................................................................................................ 59
Contents
3
Verify Software Images Before Installation...................................................................................................................60
4 Management................................................................................................................................................62
Conguring Privilege Levels............................................................................................................................................62
Creating a Custom Privilege Level...........................................................................................................................62
Removing a Command from EXEC Mode.............................................................................................................. 63
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................63
Allowing Access to CONFIGURATION Mode Commands....................................................................................63
Allowing Access to Dierent Modes........................................................................................................................63
Applying a Privilege Level to a Username...............................................................................................................65
Applying a Privilege Level to a Terminal Line.......................................................................................................... 65
Conguring Logging........................................................................................................................................................ 65
Audit and Security Logs............................................................................................................................................ 66
Conguring Logging Format ...................................................................................................................................67
Setting Up a Secure Connection to a Syslog Server.............................................................................................67
Log Messages in the Internal Buer..............................................................................................................................69
Conguration Task List for System Log Management..........................................................................................69
Disabling System Logging............................................................................................................................................... 69
Sending System Messages to a Syslog Server............................................................................................................69
Conguring a UNIX System as a Syslog Server.....................................................................................................69
Track Login Activity..........................................................................................................................................................70
Restrictions for Tracking Login Activity...................................................................................................................70
Conguring Login Activity Tracking......................................................................................................................... 70
Display Login Statistics...............................................................................................................................................71
Limit Concurrent Login Sessions....................................................................................................................................72
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................72
Conguring Concurrent Session Limit.....................................................................................................................72
Enabling the System to Clear Existing Sessions.................................................................................................... 73
Enabling Secured CLI Mode............................................................................................................................................74
Changing System Logging Settings............................................................................................................................... 74
Display the Logging Buer and the Logging Conguration........................................................................................75
Conguring a UNIX Logging Facility Level.................................................................................................................... 77
Synchronizing Log Messages......................................................................................................................................... 78
Enabling Timestamp on Syslog Messages.................................................................................................................... 79
File Transfer Services...................................................................................................................................................... 80
Conguration Task List for File Transfer Services..................................................................................................80
Enabling the FTP Server...........................................................................................................................................80
Conguring FTP Server Parameters........................................................................................................................ 81
Conguring FTP Client Parameters..........................................................................................................................81
Terminal Lines................................................................................................................................................................... 82
Denying and Permitting Access to a Terminal Line................................................................................................82
Conguring Login Authentication for Terminal Lines.............................................................................................83
Setting Timeout for EXEC Privilege Mode................................................................................................................... 84
Using Telnet to get to Another Network Device..........................................................................................................84
Lock CONFIGURATION Mode.......................................................................................................................................85
Viewing the Conguration Lock Status...................................................................................................................85
4
Contents
Reloading the system...................................................................................................................................................... 86
Restoring the Factory Default Settings........................................................................................................................ 86
Important Points to Remember................................................................................................................................87
Restoring Factory Default Environment Variables..................................................................................................87
5 802.1X..........................................................................................................................................................88
Port-Authentication Process..........................................................................................................................................90
EAP over RADIUS......................................................................................................................................................90
Conguring 802.1X........................................................................................................................................................... 91
Related Conguration Tasks......................................................................................................................................91
Important Points to Remember...................................................................................................................................... 91
Enabling 802.1X................................................................................................................................................................ 92
Conguring dot1x Prole ................................................................................................................................................93
Conguring the Static MAB and MAB Prole .............................................................................................................94
Conguring Critical VLAN ..............................................................................................................................................94
Conguring MAC addresses for a do1x Prole.............................................................................................................95
Conguring Request Identity Re-Transmissions...........................................................................................................96
Conguring a Quiet Period after a Failed Authentication..................................................................................... 96
Forcibly Authorizing or Unauthorizing a Port................................................................................................................97
Re-Authenticating a Port................................................................................................................................................98
Conguring Timeouts......................................................................................................................................................99
Conguring Dynamic VLAN Assignment with Port Authentication.........................................................................100
Guest and Authentication-Fail VLANs..........................................................................................................................101
Conguring a Guest VLAN...................................................................................................................................... 101
Conguring an Authentication-Fail VLAN.............................................................................................................. 101
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 103
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 103
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 104
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................104
Conguring ACL VLAN Groups.............................................................................................................................. 104
Conguring FP Blocks for VLAN Parameters.......................................................................................................105
Viewing CAM Usage...................................................................................................................................................... 106
Allocating FP Blocks for VLAN Processes.................................................................................................................. 108
ACL Optimization to Increase Number of Supported IPv4 ACLs.............................................................................109
Restrictions for ACL Optimization..........................................................................................................................109
Optimizing ACL for More Number of IPv4 ACL Rules.........................................................................................109
7 Access Control Lists (ACLs)........................................................................................................................ 111
IP Access Control Lists (ACLs)......................................................................................................................................112
CAM Usage................................................................................................................................................................112
Implementing ACLs on Dell EMC Networking OS.................................................................................................114
Congure ACL Range Proles....................................................................................................................................... 115
Important Points to Remember.....................................................................................................................................116
Conguration Task List for Route Maps.................................................................................................................116
Conguring Match Routes.......................................................................................................................................119
Contents
5
Conguring Set Conditions..................................................................................................................................... 120
Congure a Route Map for Route Redistribution..................................................................................................121
Congure a Route Map for Route Tagging............................................................................................................ 121
Continue Clause........................................................................................................................................................122
IP Fragment Handling.................................................................................................................................................... 122
IP Fragments ACL Examples...................................................................................................................................122
Layer 4 ACL Rules Examples...................................................................................................................................123
Congure a Standard IP ACL........................................................................................................................................ 124
Conguring a Standard IP ACL Filter..................................................................................................................... 125
Congure an Extended IP ACL..................................................................................................................................... 125
Conguring Filters with a Sequence Number....................................................................................................... 126
Conguring Filters Without a Sequence Number.................................................................................................129
Congure Layer 2 and Layer 3 ACLs............................................................................................................................130
Assign an IP ACL to an Interface..................................................................................................................................130
Applying an IP ACL..........................................................................................................................................................131
Counting ACL Hits.....................................................................................................................................................131
Congure Ingress ACLs................................................................................................................................................. 132
Congure Egress ACLs.................................................................................................................................................. 132
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 133
Conguring UDF ACL.....................................................................................................................................................134
IP Prex Lists...................................................................................................................................................................137
Implementation Information.................................................................................................................................... 138
Conguration Task List for Prex Lists.................................................................................................................. 138
ACL Resequencing..........................................................................................................................................................141
Resequencing an ACL or Prex List.......................................................................................................................142
Route Maps.....................................................................................................................................................................143
Implementation Information.................................................................................................................................... 143
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 144
How BFD Works............................................................................................................................................................. 144
BFD Packet Format..................................................................................................................................................145
BFD Sessions............................................................................................................................................................ 146
BFD Three-Way Handshake.................................................................................................................................... 147
Session State Changes............................................................................................................................................149
Important Points to Remember.................................................................................................................................... 149
Congure BFD................................................................................................................................................................ 150
Congure BFD for Physical Ports.......................................................................................................................... 150
Congure BFD for Static Routes............................................................................................................................152
Congure BFD for OSPF.........................................................................................................................................154
Congure BFD for OSPFv3.....................................................................................................................................159
Congure BFD for IS-IS...........................................................................................................................................162
Congure BFD for BGP...........................................................................................................................................165
Congure BFD for VRRP..........................................................................................................................................171
Conguring Protocol Liveness.................................................................................................................................174
Troubleshooting BFD................................................................................................................................................ 174
6
Contents
9 Border Gateway Protocol (BGP)................................................................................................................ 176
BGP IP version 4 (BGPv4) Overview.......................................................................................................................... 176
BGP Autonomous Systems..................................................................................................................................... 176
AS4 Number Representation.................................................................................................................................. 178
Four-Byte AS Numbers........................................................................................................................................... 180
BGP router ID............................................................................................................................................................180
Sessions and Peers.................................................................................................................................................. 180
Establish a Session....................................................................................................................................................181
BGP Attributes for selecting Best Path..................................................................................................................181
Multiprotocol BGP....................................................................................................................................................186
BGP global and address family conguration........................................................................................................ 187
Implement BGP with Dell EMC Networking OS...................................................................................................189
Conguration Information........................................................................................................................................192
Basic BGP conguration tasks......................................................................................................................................192
Prerequisite for conguring a BGP network......................................................................................................... 192
Restrictions............................................................................................................................................................... 193
Enabling BGP............................................................................................................................................................ 193
Enabling four-byte autonomous system numbers................................................................................................195
Changing a BGP router ID.......................................................................................................................................196
Conguring AS4 Number Representations........................................................................................................... 196
Conguring a BGP peer...........................................................................................................................................198
Example-Conguring BGP routing between peers..............................................................................................199
BGP peer group....................................................................................................................................................... 200
Advanced BGP conguration tasks.............................................................................................................................206
Route-refresh and Soft-reconguration............................................................................................................... 207
Aggregating Routes.................................................................................................................................................209
Filtering BGP..............................................................................................................................................................211
Conguring BGP Fast Fall-Over............................................................................................................................. 218
Conguring Passive Peering................................................................................................................................... 219
Enabling Graceful Restart.......................................................................................................................................220
Redistributing Routes...............................................................................................................................................221
Enabling Additional Paths........................................................................................................................................222
Conguring IP Community Lists............................................................................................................................ 223
Conguring an IP Extended Community List....................................................................................................... 224
Congure BGP attributes....................................................................................................................................... 225
Enabling Multipath...................................................................................................................................................229
Route Reectors......................................................................................................................................................230
Enabling Route Flap Dampening............................................................................................................................. 231
Changing BGP keepalive and hold timers.............................................................................................................233
Setting the extended timer.....................................................................................................................................234
Enabling or disabling BGP neighbors.....................................................................................................................235
Route Map Continue............................................................................................................................................... 236
Conguring BGP Confederations.......................................................................................................................... 236
Conguring a BGP VRF address family.................................................................................................................237
Maintaining Existing AS Numbers During an AS Migration................................................................................ 238
Contents
7
Allowing an AS Number to Appear in its Own AS Path...................................................................................... 239
Enabling MBGP Congurations............................................................................................................................. 240
MBGP support for IPv6..........................................................................................................................................240
Conguring IPv6 MBGP between peers............................................................................................................... 241
Example-Conguring IPv4 and IPv6 neighbors................................................................................................... 242
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor......................................... 244
BGP Regular Expression Optimization..................................................................................................................246
Debugging BGP........................................................................................................................................................246
10 Content Addressable Memory (CAM).......................................................................................................249
CAM Allocation...............................................................................................................................................................249
Test CAM Usage.............................................................................................................................................................251
View CAM-ACL Settings............................................................................................................................................... 251
View CAM Usage...........................................................................................................................................................253
CAM Optimization......................................................................................................................................................... 253
Troubleshoot CAM Proling..........................................................................................................................................253
CAM Prole Mismatches........................................................................................................................................ 253
QoS CAM Region Limitation...................................................................................................................................254
Syslog Error When the Table is Full....................................................................................................................... 254
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................254
Syslog Warning for Discrepancies Between Congured Extended Prexes....................................................254
Unied Forwarding Table (UFT) Modes......................................................................................................................254
Conguring UFT Modes......................................................................................................................................... 255
11 Control Plane Policing (CoPP).................................................................................................................. 257
Congure Control Plane Policing................................................................................................................................. 258
Conguring CoPP for Protocols............................................................................................................................ 259
Conguring CoPP for CPU Queues....................................................................................................................... 261
Protocol to CPU Queue Mapping.......................................................................................................................... 262
Conguring Protocol to CPU Queue Mapping.....................................................................................................262
Displaying CoPP Conguration ............................................................................................................................. 263
12 Data Center Bridging (DCB).....................................................................................................................265
Ethernet Enhancements in Data Center Bridging..................................................................................................... 265
Priority-Based Flow Control................................................................................................................................... 266
Enhanced Transmission Selection..........................................................................................................................267
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................268
Data Center Bridging in a Trac Flow.................................................................................................................. 269
Buer Organization................................................................................................................................................. 269
Enabling Data Center Bridging..................................................................................................................................... 272
DCB Maps and its Attributes..................................................................................................................................273
Data Center Bridging: Default Conguration..............................................................................................................273
Conguring Priority-Based Flow Control.................................................................................................................... 274
Conguring Lossless Queues..................................................................................................................................275
Conguring PFC in a DCB Map................................................................................................................................... 276
PFC Conguration Notes........................................................................................................................................276
8
Contents
PFC Prerequisites and Restrictions....................................................................................................................... 277
Applying a DCB Map on a Port.................................................................................................................................... 278
Conguring PFC without a DCB Map.........................................................................................................................278
Conguring Lossless QueuesExample:..................................................................................................................279
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................280
Pause and Resume of Trac..................................................................................................................................280
Buer Sizes for Lossless or PFC Packets............................................................................................................ 280
Shared headroom for lossless or PFC packets........................................................................................................... 281
Example Scenario.................................................................................................................................................... 282
Conguring Shared Head Room Buer................................................................................................................ 283
Viewing Shared Head Room Usage.......................................................................................................................283
Monitoring Buer Statistics for Tracking Purposes............................................................................................ 284
Behavior of Tagged Packets.........................................................................................................................................284
Conguration Example for DSCP and PFC Priorities................................................................................................284
SNMP Support for PFC and Buer Statistics Tracking............................................................................................285
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................286
PFC and ETS Conguration Examples........................................................................................................................287
Using PFC to Manage Converged Ethernet Trac...................................................................................................287
Operations on Untagged Packets................................................................................................................................ 287
Generation of PFC for a Priority for Untagged Packets...........................................................................................288
Congure Enhanced Transmission Selection..............................................................................................................288
Creating an ETS Priority Group..............................................................................................................................288
ETS Operation with DCBx......................................................................................................................................289
Conguring ETS in a DCB Map............................................................................................................................. 290
Hierarchical Scheduling in ETS Output Policies..........................................................................................................291
Using ETS to Manage Converged Ethernet Trac...................................................................................................292
Applying DCB Policies in a Switch Stack.................................................................................................................... 292
Congure a DCBx Operation........................................................................................................................................292
DCBx Operation....................................................................................................................................................... 292
DCBx Port Roles...................................................................................................................................................... 293
DCB Conguration Exchange................................................................................................................................ 294
Conguration Source Election................................................................................................................................294
Propagation of DCB Information........................................................................................................................... 295
Auto-Detection and Manual Conguration of the DCBx Version...................................................................... 295
DCBx Example......................................................................................................................................................... 296
DCBx Prerequisites and Restrictions.....................................................................................................................296
Conguring DCBx....................................................................................................................................................296
Verifying the DCB Conguration................................................................................................................................. 300
QoS dot1p Trac Classication and Queue Assignment..........................................................................................308
Conguring the Dynamic Buer Method................................................................................................................... 308
Sample DCB Conguration...........................................................................................................................................309
PFC and ETS Conguration Command Examples................................................................................................ 311
13 Dynamic Host Conguration Protocol (DHCP)..........................................................................................312
DHCP Packet Format and Options.............................................................................................................................. 312
Assign an IP Address using DHCP................................................................................................................................314
Contents
9
Implementation Information.......................................................................................................................................... 314
Congure the System to be a DHCP Server.............................................................................................................. 315
Conguring the Server for Automatic Address Allocation.................................................................................. 315
Specifying a Default Gateway................................................................................................................................. 317
Congure a Method of Hostname Resolution...................................................................................................... 317
Using DNS for Address Resolution.........................................................................................................................317
Using NetBIOS WINS for Address Resolution...................................................................................................... 317
Creating Manual Binding Entries............................................................................................................................ 318
Debugging the DHCP Server..................................................................................................................................318
Using DHCP Clear Commands............................................................................................................................... 318
Congure the System to be a DHCP Client................................................................................................................319
Conguring the DHCP Client System....................................................................................................................319
DHCP Client on a Management Interface.............................................................................................................321
DHCP Client Operation with Other Features........................................................................................................321
Conguring DHCP relay source interface...................................................................................................................322
Global DHCP relay source IPv4 or IPv6 conguration ....................................................................................... 322
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................323
Congure Secure DHCP............................................................................................................................................... 324
Option 82.................................................................................................................................................................. 324
DHCPv6 relay agent options..................................................................................................................................325
DHCP Snooping.......................................................................................................................................................325
Drop DHCP Packets on Snooped VLANs Only....................................................................................................330
Dynamic ARP Inspection........................................................................................................................................ 330
Conguring Dynamic ARP Inspection.................................................................................................................... 331
Source Address Validation............................................................................................................................................ 333
Enabling IP Source Address Validation..................................................................................................................333
DHCP MAC Source Address Validation................................................................................................................ 334
Enabling IP+MAC Source Address Validation.......................................................................................................334
Viewing the Number of SAV Dropped Packets................................................................................................... 335
Clearing the Number of SAV Dropped Packets...................................................................................................335
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 336
ECMP for Flow-Based Anity.....................................................................................................................................336
Conguring the Hash Algorithm............................................................................................................................ 336
Enabling Deterministic ECMP Next Hop.............................................................................................................. 336
Conguring the Hash Algorithm Seed...................................................................................................................337
Link Bundle Monitoring..................................................................................................................................................337
Managing ECMP Group Paths...............................................................................................................................338
Creating an ECMP Group Bundle..........................................................................................................................338
Modifying the ECMP Group Threshold.................................................................................................................338
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................339
Support for ECMP in host table............................................................................................................................ 340
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 340
15 FIP Snooping............................................................................................................................................ 341
Fibre Channel over Ethernet.........................................................................................................................................341
10
Contents
Ensure Robustness in a Converged Ethernet Network.............................................................................................341
FIP Snooping on Ethernet Bridges.............................................................................................................................. 343
Using FIP Snooping....................................................................................................................................................... 345
FIP Snooping Prerequisites.....................................................................................................................................345
Important Points to Remember............................................................................................................................. 345
Enabling the FCoE Transit Feature........................................................................................................................ 347
Enable FIP Snooping on VLANs.............................................................................................................................347
Congure the FC-MAP Value.................................................................................................................................347
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 347
Congure a Port for a Bridge-to-FCF Link...........................................................................................................348
Impact on Other Software Features..................................................................................................................... 348
FIP Snooping Restrictions...................................................................................................................................... 348
Conguring FIP Snooping.......................................................................................................................................349
Displaying FIP Snooping Information...........................................................................................................................349
FCoE Transit Conguration Example...........................................................................................................................354
16 Flex Hash and Optimized Boot-Up............................................................................................................356
Flex Hash Capability Overview.................................................................................................................................... 356
Conguring the Flex Hash Mechanism.......................................................................................................................356
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................357
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces......................................................................................358
17 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 359
Protocol Overview.........................................................................................................................................................359
Ring Status............................................................................................................................................................... 360
Multiple FRRP Rings............................................................................................................................................... 360
Important FRRP Points............................................................................................................................................361
Important FRRP Concepts..................................................................................................................................... 362
Implementing FRRP.......................................................................................................................................................363
FRRP Conguration...................................................................................................................................................... 363
Creating the FRRP Group.......................................................................................................................................363
Conguring the Control VLAN...............................................................................................................................363
Conguring and Adding the Member VLANs...................................................................................................... 365
Setting the FRRP Timers........................................................................................................................................366
Clearing the FRRP Counters..................................................................................................................................366
Viewing the FRRP Conguration...........................................................................................................................366
Viewing the FRRP Information.............................................................................................................................. 366
Troubleshooting FRRP...................................................................................................................................................367
Conguration Checks..............................................................................................................................................367
Sample Conguration and Topology............................................................................................................................ 367
FRRP Support on VLT...................................................................................................................................................368
Example Scenario.................................................................................................................................................... 369
Important Points to Remember..............................................................................................................................370
18 GARP VLAN Registration Protocol (GVRP)...............................................................................................371
Important Points to Remember.................................................................................................................................... 371
Contents
11
Congure GVRP.............................................................................................................................................................372
Related Conguration Tasks................................................................................................................................... 372
Enabling GVRP Globally................................................................................................................................................ 373
Enabling GVRP on a Layer 2 Interface........................................................................................................................ 373
Congure GVRP Registration.......................................................................................................................................373
Congure a GARP Timer...............................................................................................................................................374
19 Internet Group Management Protocol (IGMP)......................................................................................... 375
IGMP Implementation Information...............................................................................................................................375
IGMP Protocol Overview.............................................................................................................................................. 375
IGMP Version 2........................................................................................................................................................ 375
IGMP Version 3.........................................................................................................................................................377
Congure IGMP............................................................................................................................................................. 380
Related Conguration Tasks...................................................................................................................................380
Viewing IGMP Enabled Interfaces................................................................................................................................381
Selecting an IGMP Version............................................................................................................................................381
Viewing IGMP Groups...................................................................................................................................................382
Adjusting Timers............................................................................................................................................................ 382
Adjusting Query and Response Timers................................................................................................................. 382
Enabling IGMP Immediate-Leave.................................................................................................................................383
IGMP Snooping..............................................................................................................................................................383
IGMP Snooping Implementation Information....................................................................................................... 383
Conguring IGMP Snooping...................................................................................................................................384
Removing a Group-Port Association..................................................................................................................... 384
Disabling Multicast Flooding...................................................................................................................................385
Specifying a Port as Connected to a Multicast Router...................................................................................... 385
Conguring the Switch as Querier........................................................................................................................ 385
Fast Convergence after MSTP Topology Changes...................................................................................................386
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................386
Protocol Separation................................................................................................................................................. 387
Enabling and Disabling Management Egress Interface Selection...................................................................... 388
Handling of Management Route Conguration................................................................................................... 388
Handling of Switch-Initiated Trac....................................................................................................................... 389
Handling of Switch-Destined Trac..................................................................................................................... 390
Handling of Transit Trac (Trac Separation).................................................................................................... 390
Mapping of Management Applications and Trac Type.....................................................................................390
Behavior of Various Applications for Switch-Initiated Trac .............................................................................391
Behavior of Various Applications for Switch-Destined Trac ...........................................................................392
Interworking of EIS With Various Applications.....................................................................................................393
Designating a Multicast Router Interface................................................................................................................... 394
20 Interfaces................................................................................................................................................ 395
Basic Interface Conguration.......................................................................................................................................395
Advanced Interface Conguration...............................................................................................................................395
Interface Types...............................................................................................................................................................396
View Basic Interface Information.................................................................................................................................396
12
Contents
Resetting an Interface to its Factory Default State...................................................................................................398
Enabling a Physical Interface........................................................................................................................................399
Physical Interfaces.........................................................................................................................................................399
Conguration Task List for Physical Interfaces....................................................................................................399
Overview of Layer Modes...................................................................................................................................... 400
Conguring Layer 2 (Data Link) Mode................................................................................................................. 400
Conguring Layer 2 (Interface) Mode.................................................................................................................. 400
Conguring Layer 3 (Network) Mode................................................................................................................... 401
Conguring Layer 3 (Interface) Mode................................................................................................................... 401
Egress Interface Selection (EIS)..................................................................................................................................402
Important Points to Remember............................................................................................................................. 402
Conguring EIS........................................................................................................................................................ 402
Management Interfaces................................................................................................................................................403
Conguring Management Interfaces.....................................................................................................................403
Conguring a Management Interface on an Ethernet Port................................................................................403
VLAN Interfaces............................................................................................................................................................ 404
Loopback Interfaces......................................................................................................................................................405
Null Interfaces................................................................................................................................................................ 405
Port Channel Interfaces................................................................................................................................................405
Port Channel Denition and Standards.................................................................................................................406
Port Channel Benets.............................................................................................................................................406
Port Channel Implementation................................................................................................................................ 406
Interfaces in Port Channels.................................................................................................................................... 407
Conguration Tasks for Port Channel Interfaces.................................................................................................407
Creating a Port Channel..........................................................................................................................................407
Adding a Physical Interface to a Port Channel.....................................................................................................408
Reassigning an Interface to a New Port Channel................................................................................................409
Conguring the Minimum Oper Up Links in a Port Channel............................................................................... 410
Adding or Removing a Port Channel from a VLAN..............................................................................................410
Assigning an IP Address to a Port Channel............................................................................................................411
Deleting or Disabling a Port Channel......................................................................................................................412
Load Balancing Through Port Channels................................................................................................................ 412
Load-Balancing Method...........................................................................................................................................412
Changing the Hash Algorithm.................................................................................................................................413
Bulk Conguration.......................................................................................................................................................... 414
Interface Range........................................................................................................................................................ 414
Bulk Conguration Examples.................................................................................................................................. 414
Dening Interface Range Macros.................................................................................................................................416
Dene the Interface Range..................................................................................................................................... 416
Choosing an Interface-Range Macro.....................................................................................................................416
Monitoring and Maintaining Interfaces........................................................................................................................ 416
Maintenance Using TDR.......................................................................................................................................... 417
Non Dell-Qualied Transceivers....................................................................................................................................418
Splitting 100G Ports....................................................................................................................................................... 419
Link Dampening.............................................................................................................................................................. 419
Contents
13
Important Points to Remember............................................................................................................................. 420
Conguration Example of Link Dampening...........................................................................................................420
Enabling Link Dampening........................................................................................................................................422
Link Bundle Monitoring................................................................................................................................................. 423
Using Ethernet Pause Frames for Flow Control........................................................................................................ 424
Enabling Pause Frames........................................................................................................................................... 424
Congure the MTU Size on an Interface....................................................................................................................425
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................426
Port-Pipes.......................................................................................................................................................................426
CR4 Auto-Negotiation...................................................................................................................................................426
Setting the Speed of Ethernet Interfaces...................................................................................................................427
Speed Setting on 25G Interfaces................................................................................................................................ 428
Conguring 10G speed on 25G ports..........................................................................................................................429
FEC Conguration......................................................................................................................................................... 430
View Advanced Interface Information.........................................................................................................................432
Conguring the Interface Sampling Size.............................................................................................................. 433
Conguring the Trac Sampling Size Globally...........................................................................................................434
Dynamic Counters......................................................................................................................................................... 435
Clearing Interface Counters....................................................................................................................................436
Enhanced Validation of Interface Ranges...................................................................................................................436
Compressing Conguration Files................................................................................................................................. 436
OUI on 25G and 50G Interfaces..................................................................................................................................439
Conguring OUI on 25G and 50G Interfaces.......................................................................................................439
21 IPv4 Routing............................................................................................................................................ 440
IP Addresses....................................................................................................................................................................441
Implementation Information.................................................................................................................................... 441
Conguration Tasks for IP Addresses.......................................................................................................................... 441
Assigning IP Addresses to an Interface........................................................................................................................441
Conguring Static Routes.............................................................................................................................................442
Adding description for IPv4 and IPv6 static routes.............................................................................................443
Congure Static Routes for the Management Interface.......................................................................................... 444
Using the Congured Source IP Address in ICMP Messages..................................................................................444
Conguring the ICMP Source Interface............................................................................................................... 445
Conguring the Duration to Establish a TCP Connection........................................................................................ 445
Enabling Directed Broadcast........................................................................................................................................ 445
Resolution of Host Names............................................................................................................................................446
Enabling Dynamic Resolution of Host Names............................................................................................................446
Specifying the Local System Domain and a List of Domains....................................................................................447
Conguring DNS with Traceroute................................................................................................................................447
ARP..................................................................................................................................................................................448
Conguration Tasks for ARP........................................................................................................................................ 448
Conguring Static ARP Entries....................................................................................................................................448
Enabling Proxy ARP.......................................................................................................................................................449
Clearing ARP Cache......................................................................................................................................................449
ARP Learning via Gratuitous ARP................................................................................................................................449
14
Contents
Enabling ARP Learning via Gratuitous ARP................................................................................................................450
ARP Learning via ARP Request................................................................................................................................... 450
Conguring ARP Retries................................................................................................................................................451
ICMP................................................................................................................................................................................ 451
Conguration Tasks for ICMP.......................................................................................................................................451
Enabling ICMP Unreachable Messages....................................................................................................................... 451
ICMP Redirects..............................................................................................................................................................452
UDP Helper.....................................................................................................................................................................453
Congure UDP Helper.............................................................................................................................................453
Important Points to Remember............................................................................................................................. 453
Enabling UDP Helper.....................................................................................................................................................453
Conguring a Broadcast Address................................................................................................................................ 454
Congurations Using UDP Helper............................................................................................................................... 454
UDP Helper with Broadcast-All Addresses.................................................................................................................454
UDP Helper with Subnet Broadcast Addresses.........................................................................................................455
UDP Helper with Congured Broadcast Addresses..................................................................................................455
UDP Helper with No Congured Broadcast Addresses............................................................................................456
Troubleshooting UDP Helper........................................................................................................................................456
22 IPv6 Routing............................................................................................................................................ 457
Protocol Overview......................................................................................................................................................... 457
Extended Address Space........................................................................................................................................457
Path MTU discovery................................................................................................................................................457
Stateless Autoconguration................................................................................................................................... 458
IPv6 Headers............................................................................................................................................................459
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support................................................................... 459
IPv6 Header Fields.................................................................................................................................................. 460
Extension Header Fields.......................................................................................................................................... 461
Addressing................................................................................................................................................................ 462
Implementing IPv6 with Dell EMC Networking OS................................................................................................... 463
ICMPv6...........................................................................................................................................................................463
Path MTU discovery......................................................................................................................................................464
IPv6 Neighbor Discovery.............................................................................................................................................. 464
IPv6 Neighbor Discovery of MTU Packets.......................................................................................................... 465
Conguring the IPv6 Recursive DNS Server....................................................................................................... 465
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................466
Displaying IPv6 RDNSS Information......................................................................................................................466
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 467
Conguration Tasks for IPv6........................................................................................................................................ 467
Adjusting Your CAM-Prole.................................................................................................................................... 467
Assigning an IPv6 Address to an Interface...........................................................................................................468
Assigning a Static IPv6 Route................................................................................................................................469
Conguring Telnet with IPv6..................................................................................................................................469
SNMP over IPv6......................................................................................................................................................470
Displaying IPv6 Information.................................................................................................................................... 470
Displaying an IPv6 Interface Information.............................................................................................................. 470
Contents
15
Showing IPv6 Routes...............................................................................................................................................471
Showing the Running-Conguration for an Interface......................................................................................... 472
Clearing IPv6 Routes............................................................................................................................................... 473
Conguring IPv6 RA Guard.......................................................................................................................................... 473
23 iSCSI Optimization...................................................................................................................................476
iSCSI Optimization Overview....................................................................................................................................... 476
Monitoring iSCSI Trac Flows............................................................................................................................... 478
Application of Quality of Service to iSCSI Trac Flows......................................................................................478
Information Monitored in iSCSI Trac Flows....................................................................................................... 478
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 479
Conguring Detection and Ports for Dell Compellent Arrays............................................................................. 479
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................480
Enable and Disable iSCSI Optimization.................................................................................................................480
Default iSCSI Optimization Values................................................................................................................................481
iSCSI Optimization Prerequisites.................................................................................................................................. 481
Conguring iSCSI Optimization.................................................................................................................................... 481
Displaying iSCSI Optimization Information..................................................................................................................483
24 Intermediate System to Intermediate System.......................................................................................... 485
IS-IS Protocol Overview............................................................................................................................................... 485
IS-IS Addressing.............................................................................................................................................................485
Multi-Topology IS-IS...................................................................................................................................................... 486
Transition Mode....................................................................................................................................................... 486
Interface Support.....................................................................................................................................................487
Adjacencies...............................................................................................................................................................487
Graceful Restart.............................................................................................................................................................487
Timers........................................................................................................................................................................487
Implementation Information..........................................................................................................................................487
Conguration Information.............................................................................................................................................488
Conguration Tasks for IS-IS..................................................................................................................................489
Conguring the Distance of a Route.....................................................................................................................496
Changing the IS-Type.............................................................................................................................................. 497
Redistributing IPv4 Routes.....................................................................................................................................499
Redistributing IPv6 Routes.....................................................................................................................................500
Conguring Authentication Passwords................................................................................................................. 501
Setting the Overload Bit..........................................................................................................................................501
Debugging IS-IS.......................................................................................................................................................502
IS-IS Metric Styles.........................................................................................................................................................503
Congure Metric Values............................................................................................................................................... 503
Maximum Values in the Routing Table.................................................................................................................. 504
Change the IS-IS Metric Style in One Level Only................................................................................................504
Leaks from One Level to Another..........................................................................................................................505
Sample Congurations..................................................................................................................................................506
25 Link Aggregation Control Protocol (LACP).............................................................................................. 509
16
Contents
Introduction to Dynamic LAGs and LACP.................................................................................................................. 509
Important Points to Remember............................................................................................................................. 509
LACP Modes.............................................................................................................................................................510
Conguring LACP Commands................................................................................................................................510
LACP Conguration Tasks..............................................................................................................................................511
Creating a LAG.......................................................................................................................................................... 511
Conguring the LAG Interfaces as Dynamic..........................................................................................................511
Setting the LACP Long Timeout............................................................................................................................ 512
Monitoring and Debugging LACP...........................................................................................................................512
Shared LAG State Tracking........................................................................................................................................... 513
Conguring Shared LAG State Tracking................................................................................................................513
Important Points about Shared LAG State Tracking............................................................................................515
LACP Basic Conguration Example............................................................................................................................. 515
Congure a LAG on ALPHA....................................................................................................................................515
26 Layer 2.....................................................................................................................................................524
Manage the MAC Address Table................................................................................................................................. 524
Clearing the MAC Address Table........................................................................................................................... 524
Setting the Aging Time for Dynamic Entries........................................................................................................524
Conguring a Static MAC Address........................................................................................................................525
Displaying the MAC Address Table........................................................................................................................ 525
MAC Learning Limit.......................................................................................................................................................525
Setting the MAC Learning Limit............................................................................................................................ 526
mac learning-limit Dynamic.....................................................................................................................................526
mac learning-limit mac-address-sticky................................................................................................................. 526
mac learning-limit station-move.............................................................................................................................527
mac learning-limit no-station-move.......................................................................................................................527
Learning Limit Violation Actions............................................................................................................................. 527
Setting Station Move Violation Actions................................................................................................................ 528
Recovering from Learning Limit and Station Move Violations........................................................................... 528
Disabling MAC Address Learning on the System.......................................................................................................529
Enabling port security................................................................................................................................................... 529
NIC Teaming................................................................................................................................................................... 529
Congure Redundant Pairs.......................................................................................................................................... 530
Important Points about Conguring Redundant Pairs........................................................................................ 532
Far-End Failure Detection.............................................................................................................................................533
FEFD State Changes...............................................................................................................................................534
Conguring FEFD.................................................................................................................................................... 535
Enabling FEFD on an Interface.............................................................................................................................. 535
Debugging FEFD......................................................................................................................................................536
27 Link Layer Discovery Protocol (LLDP)..................................................................................................... 538
802.1AB (LLDP) Overview............................................................................................................................................538
Protocol Data Units................................................................................................................................................. 538
Optional TLVs.................................................................................................................................................................539
Management TLVs.................................................................................................................................................. 539
Contents
17
TIA-1057 (LLDP-MED) Overview................................................................................................................................. 541
TIA Organizationally Specic TLVs.........................................................................................................................541
Congure LLDP............................................................................................................................................................. 545
Related Conguration Tasks...................................................................................................................................545
Important Points to Remember............................................................................................................................. 545
LLDP Compatibility..................................................................................................................................................545
CONFIGURATION versus INTERFACE Congurations............................................................................................ 545
Enabling LLDP................................................................................................................................................................546
Disabling and Undoing LLDP..................................................................................................................................546
Enabling LLDP on Management Ports........................................................................................................................546
Disabling and Undoing LLDP on Management Ports.......................................................................................... 547
Advertising TLVs............................................................................................................................................................ 547
Viewing the LLDP Conguration................................................................................................................................. 548
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................549
Examples of Viewing Information Advertised by Neighbors.............................................................................. 549
Conguring LLDPDU Intervals.....................................................................................................................................550
Conguring Transmit and Receive Mode................................................................................................................... 550
Conguring the Time to Live Value.............................................................................................................................. 551
Debugging LLDP............................................................................................................................................................552
Relevant Management Objects................................................................................................................................... 553
28 Microsoft Network Load Balancing..........................................................................................................558
NLB Unicast Mode Scenario........................................................................................................................................558
NLB Multicast Mode Scenario.....................................................................................................................................558
Limitations of the NLB Feature....................................................................................................................................559
Microsoft Clustering......................................................................................................................................................559
Enable and Disable VLAN Flooding ............................................................................................................................ 559
Conguring a Switch for NLB .....................................................................................................................................559
Enabling a Switch for Multicast NLB.................................................................................................................... 560
29 Multicast Source Discovery Protocol (MSDP)..........................................................................................561
Protocol Overview..........................................................................................................................................................561
Anycast RP.....................................................................................................................................................................562
Implementation Information......................................................................................................................................... 563
Congure Multicast Source Discovery Protocol........................................................................................................563
Related Conguration Tasks...................................................................................................................................563
Enable MSDP................................................................................................................................................................. 567
Manage the Source-Active Cache..............................................................................................................................568
Viewing the Source-Active Cache........................................................................................................................ 568
Limiting the Source-Active Cache.........................................................................................................................568
Clearing the Source-Active Cache........................................................................................................................569
Enabling the Rejected Source-Active Cache.......................................................................................................569
Accept Source-Active Messages that Fail the RFP Check..................................................................................... 569
Specifying Source-Active Messages...........................................................................................................................572
Limiting the Source-Active Messages from a Peer................................................................................................... 573
Preventing MSDP from Caching a Local Source....................................................................................................... 573
18
Contents
Preventing MSDP from Caching a Remote Source...................................................................................................574
Preventing MSDP from Advertising a Local Source.................................................................................................. 574
Logging Changes in Peership States...........................................................................................................................575
Terminating a Peership..................................................................................................................................................575
Clearing Peer Statistics.................................................................................................................................................576
Debugging MSDP.......................................................................................................................................................... 576
MSDP with Anycast RP................................................................................................................................................ 577
Conguring Anycast RP................................................................................................................................................578
Reducing Source-Active Message Flooding.........................................................................................................579
Specifying the RP Address Used in SA Messages.............................................................................................. 579
MSDP Sample Congurations...................................................................................................................................... 581
30 Multicast Listener Discovery Protocol..................................................................................................... 584
MLD Version 1................................................................................................................................................................ 584
MLD Querier Router......................................................................................................................................................584
Joining a Multicast Group.............................................................................................................................................585
Leaving a Multicast Group............................................................................................................................................585
MLD version 2................................................................................................................................................................585
MLD timers.....................................................................................................................................................................587
Reducing Host Response Burstiness.................................................................................................................... 588
Conguring MLD Version..............................................................................................................................................588
Clearing MLD groups.................................................................................................................................................... 588
Debugging MLD.............................................................................................................................................................588
Explicit Tracking............................................................................................................................................................. 588
Reducing Leave Latency...............................................................................................................................................589
Displaying MLD groups table........................................................................................................................................589
Displaying MLD Interfaces............................................................................................................................................589
MLD Snooping............................................................................................................................................................... 589
Enable MLD Snooping............................................................................................................................................ 590
Disable MLD Snooping............................................................................................................................................590
Congure the switch as a querier..........................................................................................................................590
Specify port as connected to multicast router.................................................................................................... 590
Enable Snooping Explicit Tracking..........................................................................................................................591
Display the MLD Snooping Table............................................................................................................................591
31 Multiple Spanning Tree Protocol (MSTP)................................................................................................. 592
Protocol Overview.........................................................................................................................................................592
Spanning Tree Variations...............................................................................................................................................593
Implementation Information....................................................................................................................................593
Congure Multiple Spanning Tree Protocol................................................................................................................593
Related Conguration Tasks...................................................................................................................................594
Enable Multiple Spanning Tree Globally...................................................................................................................... 594
Adding and Removing Interfaces.................................................................................................................................594
Creating Multiple Spanning Tree Instances................................................................................................................595
Inuencing MSTP Root Selection................................................................................................................................596
Interoperate with Non-Dell Bridges............................................................................................................................. 597
Contents
19
Changing the Region Name or Revision..................................................................................................................... 597
Modifying Global Parameters....................................................................................................................................... 597
Modifying the Interface Parameters........................................................................................................................... 599
Setting STP path cost as constant.............................................................................................................................600
Conguring an EdgePort.............................................................................................................................................. 600
Flush MAC Addresses after a Topology Change........................................................................................................ 601
MSTP Sample Congurations.......................................................................................................................................601
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration........................................................................................601
Debugging and Verifying MSTP Congurations........................................................................................................ 605
32 Multicast Features................................................................................................................................... 607
Enabling IP Multicast.....................................................................................................................................................607
Implementation Information..........................................................................................................................................607
Multicast Policies...........................................................................................................................................................608
IPv4 Multicast Policies............................................................................................................................................608
Understanding Multicast Traceroute (mtrace)........................................................................................................... 615
Important Points to Remember.............................................................................................................................. 616
Printing Multicast Traceroute (mtrace) Paths............................................................................................................ 616
Supported Error Codes..................................................................................................................................................617
mtrace Scenarios............................................................................................................................................................618
33 Object Tracking........................................................................................................................................624
Object Tracking Overview............................................................................................................................................ 624
Track Layer 2 Interfaces..........................................................................................................................................625
Track Layer 3 Interfaces..........................................................................................................................................625
Track IPv4 and IPv6 Routes................................................................................................................................... 626
Set Tracking Delays..................................................................................................................................................627
VRRP Object Tracking.............................................................................................................................................627
Object Tracking Conguration......................................................................................................................................627
Tracking a Layer 2 Interface....................................................................................................................................627
Tracking a Layer 3 Interface................................................................................................................................... 628
Track an IPv4/IPv6 Route...................................................................................................................................... 630
Displaying Tracked Objects...........................................................................................................................................634
34 Open Shortest Path First (OSPFv2 and OSPFv3)....................................................................................636
Protocol Overview.........................................................................................................................................................636
Autonomous System (AS) Areas........................................................................................................................... 636
Area Types.................................................................................................................................................................637
Networks and Neighbors........................................................................................................................................638
Router Types............................................................................................................................................................ 638
Designated and Backup Designated Routers.......................................................................................................640
Link-State Advertisements (LSAs)........................................................................................................................640
Router Priority and Cost..........................................................................................................................................641
OSPF with Dell EMC Networking OS.........................................................................................................................642
Graceful Restart.......................................................................................................................................................643
20
Contents
/