PowerSwitch S3048-ON

Dell PowerSwitch S3048-ON Administrator Guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S3048-ON Administrator Guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S3048–ON
System
9.11(2.1)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 06
Rev. A00
Contents
1 About this Guide...........................................................................................................................................33
Audience............................................................................................................................................................................33
Conventions......................................................................................................................................................................33
Related Documents......................................................................................................................................................... 33
2 Conguration Fundamentals........................................................................................................................ 34
Accessing the Command Line........................................................................................................................................34
CLI Modes.........................................................................................................................................................................34
Navigating CLI Modes...............................................................................................................................................36
The do Command............................................................................................................................................................ 39
Undoing Commands........................................................................................................................................................ 39
Obtaining Help..................................................................................................................................................................40
Entering and Editing Commands................................................................................................................................... 40
Command History.............................................................................................................................................................41
Filtering show Command Outputs..................................................................................................................................41
Example of the grep Keyword................................................................................................................................... 41
Multiple Users in Conguration Mode...........................................................................................................................42
3 Getting Started............................................................................................................................................44
Console Access................................................................................................................................................................45
Serial Console.............................................................................................................................................................45
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................46
Entering CLI commands Using an SSH Connection..............................................................................................46
Executing Local CLI Scripts Using an SSH Connection........................................................................................46
Default Conguration.......................................................................................................................................................47
Conguring a Host Name................................................................................................................................................47
Accessing the System Remotely....................................................................................................................................47
Accessing the System Remotely..............................................................................................................................47
Congure the Management Port IP Address......................................................................................................... 47
Congure a Management Route..............................................................................................................................48
Conguring a Username and Password..................................................................................................................48
Conguring the Enable Password..................................................................................................................................48
Conguration File Management.....................................................................................................................................49
Copy Files to and from the System......................................................................................................................... 49
Mounting an NFS File System..................................................................................................................................50
Save the Running-Conguration.............................................................................................................................. 51
Congure the Overload Bit for a Startup Scenario............................................................................................... 52
Viewing Files...............................................................................................................................................................52
Compressing Conguration Files............................................................................................................................. 53
Managing the File System.............................................................................................................................................. 56
Enabling Software Features on Devices Using a Command Option......................................................................... 56
View Command History...................................................................................................................................................57
Contents
3
Upgrading Dell Networking OS.......................................................................................................................................57
Verify Software Images Before Installation...................................................................................................................57
Using HTTP for File Transfers........................................................................................................................................ 58
4 Management............................................................................................................................................... 60
Conguring Privilege Levels........................................................................................................................................... 60
Creating a Custom Privilege Level............................................................................................................................61
Removing a Command from EXEC Mode............................................................................................................... 61
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................ 61
Allowing Access to CONFIGURATION Mode Commands.....................................................................................61
Allowing Access to Dierent Modes........................................................................................................................ 61
Applying a Privilege Level to a Username............................................................................................................... 63
Applying a Privilege Level to a Terminal Line.......................................................................................................... 63
Conguring Logging........................................................................................................................................................ 63
Audit and Security Logs............................................................................................................................................ 64
Conguring Logging Format ...................................................................................................................................66
Display the Logging Buer and the Logging Conguration..................................................................................66
Setting Up a Secure Connection to a Syslog Server.............................................................................................67
Sending System Messages to a Syslog Server......................................................................................................68
Track Login Activity......................................................................................................................................................... 68
Restrictions for Tracking Login Activity...................................................................................................................68
Conguring Login Activity Tracking......................................................................................................................... 68
Display Login Statistics..............................................................................................................................................69
Limit Concurrent Login Sessions....................................................................................................................................70
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................70
Conguring Concurrent Session Limit......................................................................................................................71
Enabling the System to Clear Existing Sessions..................................................................................................... 71
Enabling Secured CLI Mode............................................................................................................................................72
Log Messages in the Internal Buer..............................................................................................................................72
Conguration Task List for System Log Management.......................................................................................... 72
Disabling System Logging............................................................................................................................................... 72
Sending System Messages to a Syslog Server............................................................................................................ 73
Conguring a UNIX System as a Syslog Server.....................................................................................................73
Changing System Logging Settings...............................................................................................................................73
Display the Logging Buer and the Logging Conguration........................................................................................ 74
Conguring a UNIX Logging Facility Level....................................................................................................................75
Synchronizing Log Messages......................................................................................................................................... 76
Enabling Timestamp on Syslog Messages.................................................................................................................... 76
File Transfer Services.......................................................................................................................................................77
Conguration Task List for File Transfer Services.................................................................................................. 77
Enabling the FTP Server........................................................................................................................................... 77
Conguring FTP Server Parameters........................................................................................................................77
Conguring FTP Client Parameters......................................................................................................................... 78
Terminal Lines................................................................................................................................................................... 78
Denying and Permitting Access to a Terminal Line................................................................................................79
Conguring Login Authentication for Terminal Lines.............................................................................................80
4
Contents
Setting Timeout for EXEC Privilege Mode....................................................................................................................81
Using Telnet to get to Another Network Device...........................................................................................................81
Lock CONFIGURATION Mode....................................................................................................................................... 82
Viewing the Conguration Lock Status...................................................................................................................82
LPC Bus Quality Degradation......................................................................................................................................... 82
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................83
Reloading the system...................................................................................................................................................... 83
5 802.1X......................................................................................................................................................... 85
Port-Authentication Process.......................................................................................................................................... 87
EAP over RADIUS...................................................................................................................................................... 87
Conguring 802.1X...........................................................................................................................................................88
Related Conguration Tasks..................................................................................................................................... 88
Important Points to Remember......................................................................................................................................88
Conguring dot1x Prole ................................................................................................................................................89
Conguring MAC addresses for a do1x Prole.............................................................................................................89
Conguring the Static MAB and MAB Prole .............................................................................................................89
Conguring Critical VLAN ..............................................................................................................................................90
Enabling 802.1X................................................................................................................................................................ 92
Conguring Request Identity Re-Transmissions...........................................................................................................93
Conguring a Quiet Period after a Failed Authentication..................................................................................... 94
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 95
Re-Authenticating a Port................................................................................................................................................95
Conguring Timeouts......................................................................................................................................................96
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................97
Guest and Authentication-Fail VLANs.......................................................................................................................... 98
Conguring a Guest VLAN....................................................................................................................................... 99
Conguring an Authentication-Fail VLAN...............................................................................................................99
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)................................... 101
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................................................................101
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 102
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................102
Conguring ACL VLAN Groups.............................................................................................................................. 102
Conguring FP Blocks for VLAN Parameters.......................................................................................................103
Viewing CAM Usage...................................................................................................................................................... 104
Allocating FP Blocks for VLAN Processes.................................................................................................................. 105
7 Access Control Lists (ACLs)....................................................................................................................... 107
IP Access Control Lists (ACLs).....................................................................................................................................108
CAM Usage...............................................................................................................................................................109
Implementing ACLs on Dell Networking OS..........................................................................................................109
Important Points to Remember......................................................................................................................................111
Conguration Task List for Route Maps..................................................................................................................111
Conguring Match Routes.......................................................................................................................................113
Conguring Set Conditions......................................................................................................................................114
Contents
5
Congure a Route Map for Route Redistribution..................................................................................................115
Congure a Route Map for Route Tagging............................................................................................................ 116
Continue Clause........................................................................................................................................................ 116
IP Fragment Handling..................................................................................................................................................... 117
IP Fragments ACL Examples....................................................................................................................................117
Layer 4 ACL Rules Examples....................................................................................................................................117
Congure a Standard IP ACL.........................................................................................................................................118
Conguring a Standard IP ACL Filter......................................................................................................................119
Congure an Extended IP ACL.....................................................................................................................................120
Conguring Filters with a Sequence Number.......................................................................................................120
Conguring Filters Without a Sequence Number................................................................................................. 121
Congure Layer 2 and Layer 3 ACLs............................................................................................................................122
Assign an IP ACL to an Interface..................................................................................................................................123
Applying an IP ACL.........................................................................................................................................................123
Counting ACL Hits....................................................................................................................................................124
Congure Ingress ACLs................................................................................................................................................. 124
Congure Egress ACLs.................................................................................................................................................. 124
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 125
IP Prex Lists.................................................................................................................................................................. 126
Implementation Information.................................................................................................................................... 126
Conguration Task List for Prex Lists.................................................................................................................. 126
ACL Resequencing......................................................................................................................................................... 130
Resequencing an ACL or Prex List.......................................................................................................................130
Route Maps.....................................................................................................................................................................132
Implementation Information.................................................................................................................................... 132
Logging of ACL Processes............................................................................................................................................ 132
Guidelines for Conguring ACL Logging................................................................................................................133
Conguring ACL Logging.........................................................................................................................................133
Flow-Based Monitoring Support for ACLs.................................................................................................................. 134
Behavior of Flow-Based Monitoring.......................................................................................................................134
Enabling Flow-Based Monitoring............................................................................................................................135
8 Bidirectional Forwarding Detection (BFD)...................................................................................................137
How BFD Works..............................................................................................................................................................137
BFD Packet Format..................................................................................................................................................138
BFD Sessions............................................................................................................................................................ 139
BFD Three-Way Handshake.................................................................................................................................... 140
Session State Changes............................................................................................................................................142
Important Points to Remember.................................................................................................................................... 142
Congure BFD................................................................................................................................................................ 142
Congure BFD for Physical Ports...........................................................................................................................143
Congure BFD for Static Routes............................................................................................................................144
Congure BFD for OSPF......................................................................................................................................... 147
Congure BFD for OSPFv3.....................................................................................................................................152
Congure BFD for IS-IS...........................................................................................................................................155
Congure BFD for BGP...........................................................................................................................................158
6
Contents
Congure BFD for VRRP.........................................................................................................................................164
Conguring Protocol Liveness................................................................................................................................ 167
Troubleshooting BFD................................................................................................................................................ 167
9 Border Gateway Protocol IPv4 (BGPv4).................................................................................................... 169
Autonomous Systems (AS)...........................................................................................................................................169
Sessions and Peers......................................................................................................................................................... 171
Establish a Session....................................................................................................................................................171
Route Reectors.............................................................................................................................................................172
BGP Attributes................................................................................................................................................................173
Best Path Selection Criteria.................................................................................................................................... 173
Weight........................................................................................................................................................................175
Local Preference....................................................................................................................................................... 175
Multi-Exit Discriminators (MEDs)...........................................................................................................................176
Origin.......................................................................................................................................................................... 177
AS Path...................................................................................................................................................................... 178
Next Hop................................................................................................................................................................... 178
Multiprotocol BGP.......................................................................................................................................................... 178
Implement BGP with Dell Networking OS...................................................................................................................179
Additional Path (Add-Path) Support......................................................................................................................179
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 179
Ignore Router-ID in Best-Path Calculation............................................................................................................ 180
Four-Byte AS Numbers........................................................................................................................................... 180
AS4 Number Representation.................................................................................................................................. 180
AS Number Migration.............................................................................................................................................. 182
BGP4 Management Information Base (MIB)........................................................................................................183
Important Points to Remember.............................................................................................................................. 183
Conguration Information..............................................................................................................................................184
BGP Conguration......................................................................................................................................................... 184
Enabling BGP............................................................................................................................................................ 185
Conguring AS4 Number Representations........................................................................................................... 188
Conguring Peer Groups.........................................................................................................................................190
Conguring BGP Fast Fall-Over.............................................................................................................................192
Conguring Passive Peering................................................................................................................................... 194
Maintaining Existing AS Numbers During an AS Migration.................................................................................194
Allowing an AS Number to Appear in its Own AS Path.......................................................................................195
Enabling Graceful Restart....................................................................................................................................... 196
Enabling Neighbor Graceful Restart.......................................................................................................................197
Filtering on an AS-Path Attribute............................................................................................................................197
Regular Expressions as Filters.................................................................................................................................199
Redistributing Routes..............................................................................................................................................200
Enabling Additional Paths........................................................................................................................................ 201
Conguring IP Community Lists............................................................................................................................. 201
Conguring an IP Extended Community List....................................................................................................... 202
Filtering Routes with Community Lists................................................................................................................. 203
Manipulating the COMMUNITY Attribute............................................................................................................204
Contents
7
Changing MED Attributes.......................................................................................................................................205
Changing the LOCAL_PREFERENCE Attribute..................................................................................................205
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............ 206
Changing the WEIGHT Attribute........................................................................................................................... 207
Enabling Multipath................................................................................................................................................... 207
Filtering BGP Routes............................................................................................................................................... 207
Filtering BGP Routes Using Route Maps..............................................................................................................209
Filtering BGP Routes Using AS-PATH Information............................................................................................. 209
Conguring BGP Route Reectors........................................................................................................................ 210
Aggregating Routes.................................................................................................................................................. 211
Conguring BGP Confederations............................................................................................................................211
Enabling Route Flap Dampening.............................................................................................................................212
Changing BGP Timers..............................................................................................................................................214
Enabling BGP Neighbor Soft-Reconguration......................................................................................................214
Enabling or disabling BGP neighbors..................................................................................................................... 215
Route Map Continue................................................................................................................................................ 217
Enabling MBGP Congurations.................................................................................................................................... 217
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor.......................................... 218
BGP Regular Expression Optimization.........................................................................................................................218
Debugging BGP.............................................................................................................................................................. 218
Storing Last and Bad PDUs.....................................................................................................................................219
Capturing PDUs....................................................................................................................................................... 220
PDU Counters...........................................................................................................................................................221
Sample Congurations...................................................................................................................................................221
10 Content Addressable Memory (CAM).......................................................................................................228
CAM Allocation...............................................................................................................................................................228
Test CAM Usage............................................................................................................................................................230
View CAM-ACL Settings.............................................................................................................................................. 230
View CAM Usage...........................................................................................................................................................232
CAM Optimization......................................................................................................................................................... 232
Troubleshoot CAM Proling..........................................................................................................................................232
QoS CAM Region Limitation...................................................................................................................................232
11 Control Plane Policing (CoPP).................................................................................................................. 233
Congure Control Plane Policing................................................................................................................................. 234
Conguring CoPP for Protocols............................................................................................................................ 235
Conguring CoPP for CPU Queues.......................................................................................................................237
CoPP for OSPFv3 Packets.....................................................................................................................................238
Conguring CoPP for OSPFv3............................................................................................................................... 241
Displaying CoPP Conguration ..............................................................................................................................241
12 Dynamic Host Conguration Protocol (DHCP)......................................................................................... 244
DHCP Packet Format and Options..............................................................................................................................244
Assign an IP Address using DHCP...............................................................................................................................246
Implementation Information..........................................................................................................................................247
8
Contents
Congure the System to be a DHCP Server..............................................................................................................247
Conguring the Server for Automatic Address Allocation..................................................................................248
Specifying a Default Gateway................................................................................................................................ 249
Congure a Method of Hostname Resolution......................................................................................................249
Using DNS for Address Resolution........................................................................................................................249
Using NetBIOS WINS for Address Resolution..................................................................................................... 250
Creating Manual Binding Entries............................................................................................................................250
Debugging the DHCP Server.................................................................................................................................250
Using DHCP Clear Commands............................................................................................................................... 251
Congure the System to be a Relay Agent................................................................................................................. 251
Congure the System to be a DHCP Client............................................................................................................... 253
Conguring the DHCP Client System...................................................................................................................253
DHCP Client on a Management Interface............................................................................................................254
DHCP Client Operation with Other Features.......................................................................................................255
Congure the System for User Port Stacking (Option 230)................................................................................... 256
Congure Secure DHCP...............................................................................................................................................256
Option 82..................................................................................................................................................................256
DHCP Snooping....................................................................................................................................................... 257
Drop DHCP Packets on Snooped VLANs Only....................................................................................................260
Dynamic ARP Inspection......................................................................................................................................... 261
Conguring Dynamic ARP Inspection................................................................................................................... 262
Source Address Validation............................................................................................................................................ 263
Enabling IP Source Address Validation.................................................................................................................. 263
DHCP MAC Source Address Validation................................................................................................................ 264
Enabling IP+MAC Source Address Validation.......................................................................................................264
Viewing the Number of SAV Dropped Packets................................................................................................... 265
Clearing the Number of SAV Dropped Packets...................................................................................................265
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 266
ECMP for Flow-Based Anity.....................................................................................................................................266
Conguring the Hash Algorithm............................................................................................................................ 266
Enabling Deterministic ECMP Next Hop.............................................................................................................. 266
Conguring the Hash Algorithm Seed...................................................................................................................267
Link Bundle Monitoring..................................................................................................................................................267
Managing ECMP Group Paths...............................................................................................................................268
Creating an ECMP Group Bundle..........................................................................................................................268
Modifying the ECMP Group Threshold.................................................................................................................268
14 FIPS Cryptography...................................................................................................................................270
Conguration Tasks....................................................................................................................................................... 270
Preparing the System....................................................................................................................................................270
Enabling FIPS Mode....................................................................................................................................................... 271
Generating Host-Keys....................................................................................................................................................271
Monitoring FIPS Mode Status.......................................................................................................................................271
Disabling FIPS Mode......................................................................................................................................................272
Contents
9
15 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 273
Protocol Overview......................................................................................................................................................... 273
Ring Status................................................................................................................................................................274
Multiple FRRP Rings................................................................................................................................................274
Important FRRP Points........................................................................................................................................... 275
Important FRRP Concepts..................................................................................................................................... 276
Implementing FRRP....................................................................................................................................................... 277
FRRP Conguration.......................................................................................................................................................277
Creating the FRRP Group....................................................................................................................................... 277
Conguring the Control VLAN............................................................................................................................... 278
Conguring and Adding the Member VLANs.......................................................................................................279
Setting the FRRP Timers........................................................................................................................................280
Clearing the FRRP Counters..................................................................................................................................280
Viewing the FRRP Conguration...........................................................................................................................280
Viewing the FRRP Information.............................................................................................................................. 280
Troubleshooting FRRP................................................................................................................................................... 281
Conguration Checks...............................................................................................................................................281
Sample Conguration and Topology.............................................................................................................................281
FRRP Support on VLT...................................................................................................................................................282
Example Scenario.................................................................................................................................................... 283
Important Points to Remember..............................................................................................................................284
16 GARP VLAN Registration Protocol (GVRP)..............................................................................................285
Important Points to Remember................................................................................................................................... 285
Congure GVRP............................................................................................................................................................ 286
Related Conguration Tasks...................................................................................................................................286
Enabling GVRP Globally.................................................................................................................................................287
Enabling GVRP on a Layer 2 Interface........................................................................................................................ 287
Congure GVRP Registration.......................................................................................................................................287
Congure a GARP Timer.............................................................................................................................................. 288
RPM Redundancy..........................................................................................................................................................288
17 High Availability (HA)............................................................................................................................... 290
Component Redundancy..............................................................................................................................................290
Automatic and Manual Stack Unit Failover.......................................................................................................... 290
Synchronization between Management and Standby Units...............................................................................291
Forcing a Stack Unit Failover.................................................................................................................................. 291
Specifying an Auto-Failover Limit.......................................................................................................................... 292
Disabling Auto-Reboot............................................................................................................................................ 292
Manually Synchronizing Management and Standby Units................................................................................. 292
Pre-Conguring a Stack Unit Slot............................................................................................................................... 292
Removing a Provisioned Logical Stack Unit............................................................................................................... 292
Hitless Behavior............................................................................................................................................................. 293
Graceful Restart.............................................................................................................................................................293
Software Resiliency....................................................................................................................................................... 293
10
Contents
Software Component Health Monitoring............................................................................................................. 293
System Health Monitoring......................................................................................................................................293
Failure and Event Logging.......................................................................................................................................294
Hot-Lock Behavior.........................................................................................................................................................294
18 Internet Group Management Protocol (IGMP)......................................................................................... 295
IGMP Implementation Information.............................................................................................................................. 295
IGMP Protocol Overview..............................................................................................................................................295
IGMP Version 2........................................................................................................................................................295
IGMP Version 3........................................................................................................................................................ 297
Congure IGMP.............................................................................................................................................................300
Related Conguration Tasks...................................................................................................................................300
Viewing IGMP Enabled Interfaces................................................................................................................................301
Selecting an IGMP Version............................................................................................................................................301
Viewing IGMP Groups....................................................................................................................................................301
Adjusting Timers............................................................................................................................................................ 302
Adjusting Query and Response Timers................................................................................................................. 302
Preventing a Host from Joining a Group.................................................................................................................... 303
Enabling IGMP Immediate-Leave................................................................................................................................ 306
IGMP Snooping..............................................................................................................................................................306
IGMP Snooping Implementation Information.......................................................................................................306
Conguring IGMP Snooping.................................................................................................................................. 306
Removing a Group-Port Association..................................................................................................................... 307
Disabling Multicast Flooding................................................................................................................................... 307
Specifying a Port as Connected to a Multicast Router...................................................................................... 308
Conguring the Switch as Querier........................................................................................................................ 308
Fast Convergence after MSTP Topology Changes...................................................................................................309
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................309
Protocol Separation.................................................................................................................................................309
Enabling and Disabling Management Egress Interface Selection.......................................................................310
Handling of Management Route Conguration.....................................................................................................311
Handling of Switch-Initiated Trac........................................................................................................................312
Handling of Switch-Destined Trac...................................................................................................................... 312
Handling of Transit Trac (Trac Separation)..................................................................................................... 313
Mapping of Management Applications and Trac Type......................................................................................313
Behavior of Various Applications for Switch-Initiated Trac .............................................................................314
Behavior of Various Applications for Switch-Destined Trac ........................................................................... 315
Interworking of EIS With Various Applications......................................................................................................316
Designating a Multicast Router Interface....................................................................................................................316
19 Interfaces..................................................................................................................................................318
Basic Interface Conguration........................................................................................................................................318
Advanced Interface Conguration................................................................................................................................318
Interface Types............................................................................................................................................................... 319
View Basic Interface Information..................................................................................................................................319
Resetting an Interface to its Factory Default State................................................................................................... 321
Contents
11
Enabling a Physical Interface.........................................................................................................................................321
Enabling Energy Ecient Ethernet..............................................................................................................................322
View EEE Information....................................................................................................................................................322
Clear EEE Counters....................................................................................................................................................... 327
Physical Interfaces.........................................................................................................................................................327
Conguration Task List for Physical Interfaces.................................................................................................... 327
Overview of Layer Modes.......................................................................................................................................328
Conguring Layer 2 (Data Link) Mode..................................................................................................................328
Conguring Layer 2 (Interface) Mode.................................................................................................................. 329
Conguring Layer 3 (Network) Mode...................................................................................................................329
Conguring Layer 3 (Interface) Mode.................................................................................................................. 329
Egress Interface Selection (EIS)..................................................................................................................................330
Important Points to Remember............................................................................................................................. 330
Conguring EIS........................................................................................................................................................ 330
Management Interfaces.................................................................................................................................................331
Conguring Management Interfaces..................................................................................................................... 331
Conguring a Management Interface on an Ethernet Port................................................................................332
VLAN Interfaces.............................................................................................................................................................333
Loopback Interfaces...................................................................................................................................................... 334
Null Interfaces................................................................................................................................................................ 334
Port Channel Interfaces................................................................................................................................................335
Port Channel Denition and Standards.................................................................................................................335
Port Channel Benets.............................................................................................................................................335
Port Channel Implementation.................................................................................................................................335
Interfaces in Port Channels.................................................................................................................................... 336
Conguration Tasks for Port Channel Interfaces.................................................................................................336
Creating a Port Channel..........................................................................................................................................336
Adding a Physical Interface to a Port Channel.....................................................................................................337
Reassigning an Interface to a New Port Channel................................................................................................338
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 339
Adding or Removing a Port Channel from a VLAN............................................................................................. 339
Assigning an IP Address to a Port Channel........................................................................................................... 341
Deleting or Disabling a Port Channel......................................................................................................................341
Load Balancing Through Port Channels................................................................................................................ 341
Changing the Hash Algorithm.................................................................................................................................341
Bulk Conguration......................................................................................................................................................... 343
Interface Range........................................................................................................................................................343
Bulk Conguration Examples..................................................................................................................................343
Dening Interface Range Macros................................................................................................................................ 345
Dene the Interface Range.................................................................................................................................... 345
Choosing an Interface-Range Macro.................................................................................................................... 345
Monitoring and Maintaining Interfaces....................................................................................................................... 345
Maintenance Using TDR......................................................................................................................................... 346
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................347
Link Dampening..............................................................................................................................................................347
12
Contents
Important Points to Remember............................................................................................................................. 348
Enabling Link Dampening........................................................................................................................................348
Link Bundle Monitoring................................................................................................................................................. 349
Using Ethernet Pause Frames for Flow Control........................................................................................................ 350
Enabling Pause Frames............................................................................................................................................351
Congure the MTU Size on an Interface.....................................................................................................................351
Port-Pipes.......................................................................................................................................................................352
Auto-Negotiation on Ethernet Interfaces...................................................................................................................352
Setting the Speed of Ethernet Interfaces............................................................................................................ 352
Set Auto-Negotiation Options............................................................................................................................... 354
View Advanced Interface Information.........................................................................................................................354
Conguring the Interface Sampling Size.............................................................................................................. 355
Conguring the Trac Sampling Size Globally.......................................................................................................... 356
Dynamic Counters......................................................................................................................................................... 358
Clearing Interface Counters................................................................................................................................... 358
20 Internet Protocol Security (IPSec).......................................................................................................... 360
Conguring IPSec .........................................................................................................................................................360
21 IPv4 Routing.............................................................................................................................................362
IP Addresses...................................................................................................................................................................363
Implementation Information....................................................................................................................................363
Conguration Tasks for IP Addresses..........................................................................................................................363
Assigning IP Addresses to an Interface.......................................................................................................................363
Conguring Static Routes.............................................................................................................................................364
Congure Static Routes for the Management Interface..........................................................................................365
IPv4 Path MTU Discovery Overview.......................................................................................................................... 366
Using the Congured Source IP Address in ICMP Messages..................................................................................366
Conguring the ICMP Source Interface............................................................................................................... 366
Conguring the Duration to Establish a TCP Connection.........................................................................................367
Enabling Directed Broadcast........................................................................................................................................ 367
Resolution of Host Names............................................................................................................................................367
Enabling Dynamic Resolution of Host Names............................................................................................................368
Specifying the Local System Domain and a List of Domains................................................................................... 368
Conguring DNS with Traceroute............................................................................................................................... 369
ARP................................................................................................................................................................................. 369
Conguration Tasks for ARP........................................................................................................................................ 370
Conguring Static ARP Entries....................................................................................................................................370
Enabling Proxy ARP.......................................................................................................................................................370
Clearing ARP Cache.......................................................................................................................................................371
ARP Learning via Gratuitous ARP.................................................................................................................................371
Enabling ARP Learning via Gratuitous ARP.................................................................................................................371
ARP Learning via ARP Request.................................................................................................................................... 371
Conguring ARP Retries............................................................................................................................................... 372
ICMP................................................................................................................................................................................373
Conguration Tasks for ICMP...................................................................................................................................... 373
Contents
13
Enabling ICMP Unreachable Messages.......................................................................................................................373
UDP Helper.....................................................................................................................................................................373
Congure UDP Helper.............................................................................................................................................373
Important Points to Remember..............................................................................................................................374
Enabling UDP Helper..................................................................................................................................................... 374
Conguring a Broadcast Address.................................................................................................................................374
Congurations Using UDP Helper................................................................................................................................375
UDP Helper with Broadcast-All Addresses.................................................................................................................375
UDP Helper with Subnet Broadcast Addresses.........................................................................................................376
UDP Helper with Congured Broadcast Addresses.................................................................................................. 376
UDP Helper with No Congured Broadcast Addresses............................................................................................ 377
Troubleshooting UDP Helper........................................................................................................................................ 377
22 IPv6 Routing............................................................................................................................................ 378
Protocol Overview......................................................................................................................................................... 378
Extended Address Space........................................................................................................................................379
Stateless Autoconguration....................................................................................................................................379
IPv6 Headers............................................................................................................................................................379
IPv6 Header Fields...................................................................................................................................................380
Extension Header Fields..........................................................................................................................................382
Addressing................................................................................................................................................................ 383
Implementing IPv6 with Dell Networking OS............................................................................................................. 384
ICMPv6...........................................................................................................................................................................385
Path MTU Discovery.....................................................................................................................................................386
IPv6 Neighbor Discovery..............................................................................................................................................386
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................387
Conguration Task List for IPv6 RDNSS.....................................................................................................................387
Conguring the IPv6 Recursive DNS Server........................................................................................................387
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................388
Displaying IPv6 RDNSS Information......................................................................................................................389
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 389
Conguration Tasks for IPv6........................................................................................................................................390
Adjusting Your CAM-Prole....................................................................................................................................390
Assigning an IPv6 Address to an Interface............................................................................................................391
Assigning a Static IPv6 Route.................................................................................................................................391
Conguring Telnet with IPv6..................................................................................................................................392
SNMP over IPv6......................................................................................................................................................392
Displaying IPv6 Information.................................................................................................................................... 392
Displaying an IPv6 Interface Information.............................................................................................................. 393
Showing IPv6 Routes..............................................................................................................................................393
Showing the Running-Conguration for an Interface.........................................................................................395
Clearing IPv6 Routes...............................................................................................................................................395
Disabling ND Entry Timeout................................................................................................................................... 395
Conguring IPv6 RA Guard.......................................................................................................................................... 396
Conguring IPv6 RA Guard on an Interface......................................................................................................... 397
Monitoring IPv6 RA Guard..................................................................................................................................... 398
14
Contents
23 Intermediate System to Intermediate System.......................................................................................... 399
IS-IS Protocol Overview............................................................................................................................................... 399
IS-IS Addressing.............................................................................................................................................................399
Multi-Topology IS-IS...................................................................................................................................................... 400
Transition Mode....................................................................................................................................................... 400
Interface Support..................................................................................................................................................... 401
Adjacencies............................................................................................................................................................... 401
Graceful Restart............................................................................................................................................................. 401
Timers........................................................................................................................................................................ 401
Implementation Information.......................................................................................................................................... 401
Conguration Information.............................................................................................................................................402
Conguration Tasks for IS-IS..................................................................................................................................403
Conguring the Distance of a Route......................................................................................................................410
Changing the IS-Type................................................................................................................................................411
Redistributing IPv4 Routes......................................................................................................................................413
Redistributing IPv6 Routes......................................................................................................................................414
Conguring Authentication Passwords..................................................................................................................415
Setting the Overload Bit..........................................................................................................................................415
Debugging IS-IS........................................................................................................................................................416
IS-IS Metric Styles..........................................................................................................................................................417
Congure Metric Values................................................................................................................................................ 417
Maximum Values in the Routing Table................................................................................................................... 417
Change the IS-IS Metric Style in One Level Only.................................................................................................417
Leaks from One Level to Another...........................................................................................................................419
Sample Congurations.................................................................................................................................................. 420
24 Link Aggregation Control Protocol (LACP)...............................................................................................422
Introduction to Dynamic LAGs and LACP...................................................................................................................422
Important Points to Remember..............................................................................................................................422
LACP Modes............................................................................................................................................................ 423
Conguring LACP Commands............................................................................................................................... 423
LACP Conguration Tasks............................................................................................................................................ 424
Creating a LAG.........................................................................................................................................................424
Conguring the LAG Interfaces as Dynamic........................................................................................................ 424
Setting the LACP Long Timeout............................................................................................................................425
Monitoring and Debugging LACP..........................................................................................................................425
Shared LAG State Tracking.......................................................................................................................................... 426
Conguring Shared LAG State Tracking............................................................................................................... 426
Important Points about Shared LAG State Tracking........................................................................................... 428
LACP Basic Conguration Example.............................................................................................................................428
Congure a LAG on ALPHA................................................................................................................................... 428
25 Layer 2.....................................................................................................................................................437
Manage the MAC Address Table..................................................................................................................................437
Clearing the MAC Address Table............................................................................................................................437
Contents
15
Setting the Aging Time for Dynamic Entries........................................................................................................ 437
Conguring a Static MAC Address........................................................................................................................438
Displaying the MAC Address Table........................................................................................................................ 438
MAC Learning Limit....................................................................................................................................................... 438
Setting the MAC Learning Limit............................................................................................................................ 439
mac learning-limit Dynamic.....................................................................................................................................439
mac learning-limit mac-address-sticky................................................................................................................. 439
mac learning-limit station-move............................................................................................................................ 440
mac learning-limit no-station-move...................................................................................................................... 440
Learning Limit Violation Actions.............................................................................................................................440
Setting Station Move Violation Actions................................................................................................................. 441
Recovering from Learning Limit and Station Move Violations............................................................................441
Disabling MAC Address Learning on the System.................................................................................................442
NIC Teaming................................................................................................................................................................... 442
Congure Redundant Pairs...........................................................................................................................................443
Important Points about Conguring Redundant Pairs........................................................................................ 445
Far-End Failure Detection.............................................................................................................................................446
FEFD State Changes...............................................................................................................................................447
Conguring FEFD.................................................................................................................................................... 448
Enabling FEFD on an Interface...............................................................................................................................448
Debugging FEFD......................................................................................................................................................449
26 Link Layer Discovery Protocol (LLDP)...................................................................................................... 451
802.1AB (LLDP) Overview.............................................................................................................................................451
Protocol Data Units.................................................................................................................................................. 451
Optional TLVs................................................................................................................................................................. 452
Management TLVs.................................................................................................................................................. 452
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 454
TIA Organizationally Specic TLVs........................................................................................................................ 454
Congure LLDP............................................................................................................................................................. 458
Related Conguration Tasks...................................................................................................................................458
Important Points to Remember............................................................................................................................. 458
LLDP Compatibility..................................................................................................................................................459
CONFIGURATION versus INTERFACE Congurations............................................................................................ 459
Enabling LLDP................................................................................................................................................................459
Disabling and Undoing LLDP..................................................................................................................................460
Enabling LLDP on Management Ports........................................................................................................................460
Disabling and Undoing LLDP on Management Ports..........................................................................................460
Advertising TLVs............................................................................................................................................................ 460
Viewing the LLDP Conguration................................................................................................................................. 462
Viewing Information Advertised by Adjacent LLDP Agents..................................................................................... 462
Conguring LLDPDU Intervals..................................................................................................................................... 463
Conguring Transmit and Receive Mode....................................................................................................................464
Conguring the Time to Live Value............................................................................................................................. 464
Debugging LLDP............................................................................................................................................................465
Relevant Management Objects................................................................................................................................... 466
16
Contents
27 Microsoft Network Load Balancing........................................................................................................... 471
NLB Unicast Mode Scenario.........................................................................................................................................471
NLB Multicast Mode Scenario......................................................................................................................................471
Limitations of the NLB Feature.................................................................................................................................... 472
Microsoft Clustering......................................................................................................................................................472
Enable and Disable VLAN Flooding .............................................................................................................................472
Conguring a Switch for NLB ..................................................................................................................................... 472
Enabling a Switch for Multicast NLB.....................................................................................................................473
28 Multicast Source Discovery Protocol (MSDP)......................................................................................... 474
Protocol Overview......................................................................................................................................................... 474
Anycast RP.....................................................................................................................................................................475
Implementation Information..........................................................................................................................................476
Congure Multicast Source Discovery Protocol........................................................................................................ 476
Related Conguration Tasks................................................................................................................................... 476
Enable MSDP................................................................................................................................................................. 480
Manage the Source-Active Cache............................................................................................................................... 481
Viewing the Source-Active Cache......................................................................................................................... 481
Limiting the Source-Active Cache..........................................................................................................................481
Clearing the Source-Active Cache........................................................................................................................ 482
Enabling the Rejected Source-Active Cache....................................................................................................... 482
Accept Source-Active Messages that Fail the RFP Check......................................................................................482
Specifying Source-Active Messages...........................................................................................................................485
Limiting the Source-Active Messages from a Peer...................................................................................................486
Preventing MSDP from Caching a Local Source.......................................................................................................486
Preventing MSDP from Caching a Remote Source...................................................................................................487
Preventing MSDP from Advertising a Local Source..................................................................................................487
Logging Changes in Peership States...........................................................................................................................488
Terminating a Peership..................................................................................................................................................488
Clearing Peer Statistics.................................................................................................................................................489
Debugging MSDP.......................................................................................................................................................... 489
MSDP with Anycast RP................................................................................................................................................490
Conguring Anycast RP................................................................................................................................................ 491
Reducing Source-Active Message Flooding.........................................................................................................492
Specifying the RP Address Used in SA Messages.............................................................................................. 492
MSDP Sample Congurations......................................................................................................................................494
29 Multiple Spanning Tree Protocol (MSTP).................................................................................................497
Protocol Overview......................................................................................................................................................... 497
Spanning Tree Variations...............................................................................................................................................498
Implementation Information....................................................................................................................................498
Congure Multiple Spanning Tree Protocol................................................................................................................498
Related Conguration Tasks...................................................................................................................................499
Enable Multiple Spanning Tree Globally...................................................................................................................... 499
Adding and Removing Interfaces.................................................................................................................................499
Contents
17
Creating Multiple Spanning Tree Instances................................................................................................................500
Inuencing MSTP Root Selection................................................................................................................................ 501
Interoperate with Non-Dell Bridges..............................................................................................................................501
Changing the Region Name or Revision..................................................................................................................... 502
Modifying Global Parameters.......................................................................................................................................502
Modifying the Interface Parameters........................................................................................................................... 503
Conguring an EdgePort.............................................................................................................................................. 504
Flush MAC Addresses after a Topology Change....................................................................................................... 505
MSTP Sample Congurations......................................................................................................................................505
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................506
Debugging and Verifying MSTP Congurations........................................................................................................ 509
30 Multicast Features.................................................................................................................................... 511
Enabling IP Multicast...................................................................................................................................................... 511
Implementation Information........................................................................................................................................... 511
Multicast Policies............................................................................................................................................................512
IPv4 Multicast Policies.............................................................................................................................................512
Understanding Multicast Traceroute (mtrace)........................................................................................................... 519
Important Points to Remember............................................................................................................................. 520
Printing Multicast Traceroute (mtrace) Paths........................................................................................................... 520
Supported Error Codes..................................................................................................................................................521
mtrace Scenarios...........................................................................................................................................................522
31 Object Tracking........................................................................................................................................ 528
Object Tracking Overview............................................................................................................................................ 528
Track Layer 2 Interfaces..........................................................................................................................................529
Track Layer 3 Interfaces..........................................................................................................................................529
Track IPv4 and IPv6 Routes...................................................................................................................................530
Set Tracking Delays.................................................................................................................................................. 531
VRRP Object Tracking............................................................................................................................................. 531
Object Tracking Conguration...................................................................................................................................... 531
Tracking a Layer 2 Interface.................................................................................................................................... 531
Tracking a Layer 3 Interface................................................................................................................................... 532
Track an IPv4/IPv6 Route...................................................................................................................................... 534
Displaying Tracked Objects........................................................................................................................................... 537
32 Open Shortest Path First (OSPFv2 and OSPFv3)....................................................................................539
Protocol Overview.........................................................................................................................................................539
Autonomous System (AS) Areas........................................................................................................................... 539
Area Types................................................................................................................................................................ 540
Networks and Neighbors.........................................................................................................................................541
Router Types............................................................................................................................................................. 541
Designated and Backup Designated Routers....................................................................................................... 543
Link-State Advertisements (LSAs)........................................................................................................................543
Router Priority and Cost.........................................................................................................................................544
18
Contents
OSPF with Dell Networking OS...................................................................................................................................545
Graceful Restart...................................................................................................................................................... 546
Fast Convergence (OSPFv2, IPv4 Only).............................................................................................................. 547
Multi-Process OSPFv2 with VRF.......................................................................................................................... 547
OSPF ACK Packing................................................................................................................................................. 547
Setting OSPF Adjacency with Cisco Routers...................................................................................................... 547
Conguration Information.............................................................................................................................................548
Conguration Task List for OSPFv2 (OSPF for IPv4)........................................................................................ 548
Conguration Task List for OSPFv3 (OSPF for IPv6).............................................................................................. 562
Enabling IPv6 Unicast Routing...............................................................................................................................563
Applying cost for OSPFv3......................................................................................................................................563
Assigning IPv6 Addresses on an Interface........................................................................................................... 564
Assigning Area ID on an Interface..........................................................................................................................564
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................564
Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................565
Conguring Stub Areas...........................................................................................................................................565
Conguring Passive-Interface................................................................................................................................566
Redistributing Routes..............................................................................................................................................566
Conguring a Default Route...................................................................................................................................566
Enabling OSPFv3 Graceful Restart....................................................................................................................... 567
OSPFv3 Authentication Using IPsec.....................................................................................................................569
Troubleshooting OSPFv3........................................................................................................................................ 575
33 Policy-based Routing (PBR).................................................................................................................... 577
Overview.........................................................................................................................................................................577
Implementing PBR......................................................................................................................................................... 578
Conguration Task List for Policy-based Routing...................................................................................................... 578
PBR Exceptions (Permit)........................................................................................................................................578
Create a Redirect List..............................................................................................................................................579
Create a Rule for a Redirect-list.............................................................................................................................579
Apply a Redirect-list to an Interface using a Redirect-group.............................................................................. 581
Sample Conguration....................................................................................................................................................583
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD..... 584
34 PIM Sparse-Mode (PIM-SM).................................................................................................................. 587
Implementation Information..........................................................................................................................................587
Protocol Overview......................................................................................................................................................... 587
Requesting Multicast Trac...................................................................................................................................587
Refuse Multicast Trac..........................................................................................................................................588
Send Multicast Trac............................................................................................................................................. 588
Conguring PIM-SM.....................................................................................................................................................588
Related Conguration Tasks...................................................................................................................................589
Enable PIM-SM..............................................................................................................................................................589
Conguring S,G Expiry Timers.....................................................................................................................................590
Conguring a Static Rendezvous Point.......................................................................................................................591
Overriding Bootstrap Router Updates...................................................................................................................591
Contents
19
Conguring a Designated Router................................................................................................................................. 591
Creating Multicast Boundaries and Domains............................................................................................................. 592
35 PIM Source-Specic Mode (PIM-SSM).................................................................................................. 593
Implementation Information..........................................................................................................................................593
Important Points to Remember............................................................................................................................. 593
Congure PIM-SSM......................................................................................................................................................594
Related Conguration Tasks...................................................................................................................................594
Enabling PIM-SSM........................................................................................................................................................ 594
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................594
Conguring PIM-SSM with IGMPv2.................................................................................................................... 595
Electing an RP using the BSR Mechanism.................................................................................................................596
Enabling RP to Server Specic Multicast Groups...............................................................................................596
36 Port Monitoring....................................................................................................................................... 598
Important Points to Remember................................................................................................................................... 598
Port Monitoring..............................................................................................................................................................599
Conguring Port Monitoring......................................................................................................................................... 601
Conguring Monitor Multicast Queue........................................................................................................................ 602
Enabling Flow-Based Monitoring.................................................................................................................................603
Remote Port Mirroring..................................................................................................................................................604
Remote Port Mirroring Example............................................................................................................................ 604
Conguring Remote Port Mirroring.......................................................................................................................605
Displaying Remote-Port Mirroring Congurations...............................................................................................607
Conguring the Sample Remote Port Mirroring.................................................................................................. 607
Encapsulated Remote Port Monitoring....................................................................................................................... 610
ERPM Behavior on a typical Dell Networking OS ..................................................................................................... 612
Decapsulation of ERPM packets at the Destination IP/ Analyzer......................................................................612
Port Monitoring on VLT................................................................................................................................................. 613
VLT Non-fail over Scenario..................................................................................................................................... 613
VLT Fail-over Scenario.............................................................................................................................................614
RPM over VLT Scenarios........................................................................................................................................ 614
37 Private VLANs (PVLAN)...........................................................................................................................616
Private VLAN Concepts................................................................................................................................................ 616
Using the Private VLAN Commands............................................................................................................................617
Conguration Task List.................................................................................................................................................. 618
Creating PVLAN ports............................................................................................................................................. 618
Creating a Primary VLAN........................................................................................................................................ 619
Creating a Community VLAN.................................................................................................................................620
Creating an Isolated VLAN..................................................................................................................................... 620
Private VLAN Conguration Example......................................................................................................................... 622
Inspecting the Private VLAN Conguration............................................................................................................... 623
38 Per-VLAN Spanning Tree Plus (PVST+)................................................................................................... 625
Protocol Overview.........................................................................................................................................................625
20
Contents
/