Dell PowerSwitch S4810P Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4810P Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S4810
System
9.6(0.0)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 09
Rev. A00
Contents
1 About this Guide..................................................................................................35
Audience..............................................................................................................................................35
Conventions........................................................................................................................................ 35
Related Documents.............................................................................................................................35
2 Configuration Fundamentals........................................................................... 36
Accessing the Command Line............................................................................................................36
CLI Modes............................................................................................................................................36
Navigating CLI Modes................................................................................................................... 37
The do Command............................................................................................................................... 41
Undoing Commands...........................................................................................................................41
Obtaining Help.................................................................................................................................... 42
Entering and Editing Commands....................................................................................................... 42
Command History...............................................................................................................................43
Filtering show Command Outputs.....................................................................................................44
Multiple Users in Configuration Mode............................................................................................... 45
3 Getting Started....................................................................................................46
Console Access...................................................................................................................................46
Serial Console................................................................................................................................46
Accessing the CLI Interface and Running Scripts Using SSH............................................................ 47
S4810 ............................................................................................................................................ 47
Entering CLI commands Using an SSH Connection................................................................... 48
Executing Local CLI Scripts Using an SSH Connection...............................................................48
Default Configuration......................................................................................................................... 49
Configuring a Host Name...................................................................................................................49
Accessing the System Remotely........................................................................................................ 49
Accessing the System Remotely...................................................................................................49
Configure the Management Port IP Address............................................................................... 49
Configure a Management Route..................................................................................................50
Configuring a Username and Password.......................................................................................50
Configuring the Enable Password......................................................................................................50
Configuration File Management......................................................................................................... 51
Copy Files to and from the System...............................................................................................51
Save the Running-Configuration..................................................................................................52
Configure the Overload Bit for a Startup Scenario...................................................................... 53
Viewing Files.................................................................................................................................. 53
Compressing Configuration Files................................................................................................. 54
Managing the File System................................................................................................................... 57
Enabling Software Features on Devices Using a Command Option................................................ 58
View Command History......................................................................................................................59
Upgrading Dell Networking OS.......................................................................................................... 59
Using Hashes to Validate Software Images........................................................................................59
Using HTTP for File Transfers.............................................................................................................60
4 Management........................................................................................................61
Configuring Privilege Levels................................................................................................................61
Creating a Custom Privilege Level................................................................................................61
Removing a Command from EXEC Mode....................................................................................61
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 62
Allowing Access to CONFIGURATION Mode Commands.......................................................... 62
Allowing Access to the Following Modes.................................................................................... 62
Applying a Privilege Level to a Username.................................................................................... 64
Applying a Privilege Level to a Terminal Line...............................................................................64
Configuring Logging...........................................................................................................................64
Audit and Security Logs.................................................................................................................65
Configuring Logging Format .......................................................................................................67
Display the Logging Buffer and the Logging Configuration........................................................67
Setting Up a Secure Connection to a Syslog Server....................................................................68
Sending System Messages to a Syslog Server..............................................................................69
Log Messages in the Internal Buffer...................................................................................................69
Configuration Task List for System Log Management................................................................ 69
Disabling System Logging.................................................................................................................. 69
Sending System Messages to a Syslog Server....................................................................................70
Configuring a UNIX System as a Syslog Server............................................................................70
Changing System Logging Settings....................................................................................................70
Display the Logging Buffer and the Logging Configuration..............................................................71
Configuring a UNIX Logging Facility Level.........................................................................................72
Synchronizing Log Messages..............................................................................................................73
Enabling Timestamp on Syslog Messages..........................................................................................74
File Transfer Services...........................................................................................................................74
Configuration Task List for File Transfer Services........................................................................ 74
Enabling the FTP Server.................................................................................................................75
Configuring FTP Server Parameters..............................................................................................75
Configuring FTP Client Parameters.............................................................................................. 75
Terminal Lines..................................................................................................................................... 76
Denying and Permitting Access to a Terminal Line..................................................................... 76
Configuring Login Authentication for Terminal Lines..................................................................77
Setting Time Out of EXEC Privilege Mode......................................................................................... 78
Using Telnet to get to Another Network Device............................................................................... 78
Lock CONFIGURATION Mode............................................................................................................79
Viewing the Configuration Lock Status........................................................................................ 79
Recovering from a Forgotten Password on the S4810 System........................................................80
Recovering from a Forgotten Enable Password on the S4810 ...................................................81
Recovering from a Failed Start on the S4810 System....................................................................... 82
Restoring the Factory Default Settings...............................................................................................83
S4810MXL Switch..........................................................................................................................83
Important Points to Remember....................................................................................................83
Restoring Factory Default Environment Variables....................................................................... 83
5 802.1ag................................................................................................................. 86
Ethernet CFM...................................................................................................................................... 86
Maintenance Domains........................................................................................................................ 87
Maintenance Points.............................................................................................................................87
Maintenance End Points.....................................................................................................................88
Implementation Information..............................................................................................................89
Configuring the CFM.......................................................................................................................... 89
Related Configuration Tasks.........................................................................................................89
Enabling Ethernet CFM.......................................................................................................................89
Creating a Maintenance Domain....................................................................................................... 89
Creating a Maintenance Association..................................................................................................90
Create Maintenance Points................................................................................................................ 90
Creating a Maintenance End Point...............................................................................................90
Creating a Maintenance Intermediate Point.................................................................................91
Displaying the MP Databases........................................................................................................92
Continuity Check Messages............................................................................................................... 93
Enabling CCM................................................................................................................................94
Enabling Cross-Checking.............................................................................................................94
Sending Loopback Messages and Responses................................................................................... 94
Sending Linktrace Messages and Responses.....................................................................................95
Caching Link Trace........................................................................................................................95
Enabling CFM SNMP Traps................................................................................................................. 96
Displaying Ethernet CFM Statistics.....................................................................................................98
6 802.1X...................................................................................................................99
The Port-Authentication Process.....................................................................................................100
EAP over RADIUS.........................................................................................................................102
Configuring 802.1X........................................................................................................................... 102
Related Configuration Tasks.......................................................................................................102
Important Points to Remember........................................................................................................103
Enabling 802.1X.................................................................................................................................103
Configuring Request Identity Re-Transmissions............................................................................. 105
Configuring a Quiet Period after a Failed Authentication......................................................... 105
Forcibly Authorizing or Unauthorizing a Port..................................................................................106
Re-Authenticating a Port.................................................................................................................. 107
Configuring Timeouts.......................................................................................................................108
Configuring Dynamic VLAN Assignment with Port Authentication................................................109
Guest and Authentication-Fail VLANs.............................................................................................. 110
Configuring a Guest VLAN...........................................................................................................111
Configuring an Authentication-Fail VLAN...................................................................................111
7 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)...................................................................................................... 113
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..........................................113
Guidelines for Configuring ACL VLAN groups................................................................................. 114
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.........................115
Configuring ACL VLAN Groups................................................................................................... 115
Configuring FP Blocks for VLAN Parameters..............................................................................116
Viewing CAM Usage...........................................................................................................................117
Allocating FP Blocks for VLAN Processes.........................................................................................118
8 Access Control Lists (ACLs)............................................................................ 120
IP Access Control Lists (ACLs)...........................................................................................................121
CAM Usage...................................................................................................................................121
Implementing ACLs on Dell Networking OS..............................................................................123
Important Points to Remember........................................................................................................124
Configuration Task List for Route Maps..................................................................................... 124
Configuring Match Routes.......................................................................................................... 127
Configuring Set Conditions........................................................................................................ 128
Configure a Route Map for Route Redistribution...................................................................... 129
Configure a Route Map for Route Tagging................................................................................130
Continue Clause..........................................................................................................................130
IP Fragment Handling........................................................................................................................131
IP Fragments ACL Examples........................................................................................................131
Layer 4 ACL Rules Examples....................................................................................................... 132
Configure a Standard IP ACL............................................................................................................ 133
Configuring a Standard IP ACL Filter.......................................................................................... 134
Configure an Extended IP ACL......................................................................................................... 135
Configuring Filters with a Sequence Number............................................................................ 135
Configuring Filters Without a Sequence Number......................................................................136
Configure Layer 2 and Layer 3 ACLs.................................................................................................137
Assign an IP ACL to an Interface.......................................................................................................138
Applying an IP ACL............................................................................................................................138
Counting ACL Hits.......................................................................................................................139
Configure Ingress ACLs.....................................................................................................................139
Configure Egress ACLs..................................................................................................................... 140
Applying Egress Layer 3 ACLs (Control-Plane)...........................................................................141
IP Prefix Lists...................................................................................................................................... 141
Implementation Information...................................................................................................... 142
Configuration Task List for Prefix Lists....................................................................................... 142
ACL Resequencing............................................................................................................................146
Resequencing an ACL or Prefix List............................................................................................146
Route Maps........................................................................................................................................148
Implementation Information...................................................................................................... 148
Logging of ACL Processes................................................................................................................148
Guidelines for Configuring ACL Logging................................................................................... 149
Configuring ACL Logging........................................................................................................... 150
Flow-Based Monitoring Support for ACLs........................................................................................151
Behavior of Flow-Based Monitoring........................................................................................... 151
Enabling Flow-Based Monitoring............................................................................................... 153
9 Bidirectional Forwarding Detection (BFD)...................................................155
How BFD Works................................................................................................................................ 155
BFD Packet Format......................................................................................................................156
BFD Sessions................................................................................................................................158
BFD Three-Way Handshake........................................................................................................158
Session State Changes................................................................................................................ 159
Important Points to Remember....................................................................................................... 160
Configure BFD...................................................................................................................................160
Configure BFD for Physical Ports................................................................................................161
Configure BFD for Static Routes.................................................................................................164
Configure BFD for OSPF............................................................................................................. 166
Configure BFD for OSPFv3......................................................................................................... 169
Configure BFD for IS-IS...............................................................................................................170
Configure BFD for BGP............................................................................................................... 173
Configure BFD for VRRP............................................................................................................. 180
Configuring Protocol Liveness................................................................................................... 183
Troubleshooting BFD.................................................................................................................. 183
10 Border Gateway Protocol IPv4 (BGPv4).....................................................185
Autonomous Systems (AS)................................................................................................................185
Sessions and Peers............................................................................................................................ 187
Establish a Session.......................................................................................................................188
Route Reflectors................................................................................................................................188
BGP Attributes................................................................................................................................... 189
Best Path Selection Criteria........................................................................................................ 190
Weight..........................................................................................................................................192
Local Preference......................................................................................................................... 192
Multi-Exit Discriminators (MEDs)................................................................................................ 193
Origin........................................................................................................................................... 194
AS Path.........................................................................................................................................195
Next Hop......................................................................................................................................195
Multiprotocol BGP............................................................................................................................ 196
Implement BGP with Dell Networking OS.......................................................................................196
Additional Path (Add-Path) Support........................................................................................... 196
Advertise IGP Cost as MED for Redistributed Routes................................................................ 196
Ignore Router-ID for Some Best-Path Calculations.................................................................. 197
Four-Byte AS Numbers................................................................................................................197
AS4 Number Representation...................................................................................................... 198
AS Number Migration..................................................................................................................199
BGP4 Management Information Base (MIB).............................................................................. 201
Important Points to Remember..................................................................................................201
Configuration Information............................................................................................................... 202
BGP Configuration............................................................................................................................202
Enabling BGP...............................................................................................................................203
Configuring AS4 Number Representations................................................................................207
Configuring Peer Groups........................................................................................................... 209
Configuring BGP Fast Fall-Over.................................................................................................. 211
Configuring Passive Peering....................................................................................................... 213
Maintaining Existing AS Numbers During an AS Migration........................................................214
Allowing an AS Number to Appear in its Own AS Path..............................................................215
Enabling Graceful Restart............................................................................................................216
Enabling Neighbor Graceful Restart........................................................................................... 217
Filtering on an AS-Path Attribute................................................................................................ 217
Regular Expressions as Filters..................................................................................................... 219
Redistributing Routes..................................................................................................................220
Enabling Additional Paths............................................................................................................221
Configuring IP Community Lists.................................................................................................221
Configuring an IP Extended Community List............................................................................ 223
Filtering Routes with Community Lists...................................................................................... 224
Manipulating the COMMUNITY Attribute...................................................................................224
Changing MED Attributes........................................................................................................... 226
Changing the LOCAL_PREFERENCE Attribute.......................................................................... 226
Changing the NEXT_HOP Attribute........................................................................................... 227
Changing the WEIGHT Attribute................................................................................................ 228
Enabling Multipath...................................................................................................................... 228
Filtering BGP Routes................................................................................................................... 228
Filtering BGP Routes Using Route Maps....................................................................................230
Filtering BGP Routes Using AS-PATH Information.................................................................... 231
Configuring BGP Route Reflectors.............................................................................................231
Aggregating Routes.....................................................................................................................232
Configuring BGP Confederations...............................................................................................233
Enabling Route Flap Dampening................................................................................................233
Changing BGP Timers.................................................................................................................236
Enabling BGP Neighbor Soft-Reconfiguration..........................................................................236
Route Map Continue...................................................................................................................238
Enabling MBGP Configurations........................................................................................................238
BGP Regular Expression Optimization.............................................................................................239
Debugging BGP................................................................................................................................ 239
Storing Last and Bad PDUs.........................................................................................................240
Capturing PDUs...........................................................................................................................241
PDU Counters............................................................................................................................. 242
Sample Configurations..................................................................................................................... 243
11 Content Addressable Memory (CAM)......................................................... 249
CAM Allocation................................................................................................................................. 249
Test CAM Usage................................................................................................................................ 251
View CAM-ACL Settings....................................................................................................................251
View CAM Usage...............................................................................................................................253
CAM Optimization............................................................................................................................ 254
Troubleshoot CAM Profiling.............................................................................................................254
CAM Profile Mismatches.............................................................................................................254
QoS CAM Region Limitation.......................................................................................................254
12 Control Plane Policing (CoPP)..................................................................... 256
Configure Control Plane Policing.................................................................................................... 257
Configuring CoPP for Protocols................................................................................................ 258
Configuring CoPP for CPU Queues...........................................................................................260
CoPP for OSPFv3 Packets...........................................................................................................261
Configuring CoPP for OSPFv3................................................................................................... 264
Show Commands....................................................................................................................... 265
13 Data Center Bridging (DCB)..........................................................................267
Ethernet Enhancements in Data Center Bridging........................................................................... 267
Priority-Based Flow Control.......................................................................................................268
Enhanced Transmission Selection............................................................................................. 269
Data Center Bridging Exchange Protocol (DCBx)......................................................................271
Data Center Bridging in a Traffic Flow....................................................................................... 272
Enabling Data Center Bridging......................................................................................................... 272
QoS dot1p Traffic Classification and Queue Assignment............................................................... 273
DCB Maps and its Attributes.............................................................................................................274
DCB Map: Configuration Procedure.......................................................................................... 274
Important Points to Remember..................................................................................................274
Applying a DCB Map on a Port................................................................................................... 275
Configuring PFC without a DCB Map.........................................................................................275
Configuring Lossless Queues..................................................................................................... 276
Data Center Bridging: Default Configuration...................................................................................277
Configuring PFC and ETS in a DCB Map..........................................................................................277
PFC Configuration Notes............................................................................................................ 277
PFC Prerequisites and Restrictions.............................................................................................279
ETS Configuration Notes............................................................................................................ 279
ETS Prerequisites and Restrictions.............................................................................................280
Configuring Priority-Based Flow Control........................................................................................280
Configuring Lossless Queues.....................................................................................................282
Configure Enhanced Transmission Selection..................................................................................282
ETS Prerequisites and Restrictions............................................................................................. 283
Creating an ETS Priority Group.................................................................................................. 283
ETS Operation with DCBx...........................................................................................................283
Configuring Bandwidth Allocation for DCBx CIN..................................................................... 284
Applying DCB Policies in a Switch Stack..........................................................................................285
Configure a DCBx Operation........................................................................................................... 285
DCBx Operation..........................................................................................................................285
DCBx Port Roles..........................................................................................................................286
DCB Configuration Exchange.................................................................................................... 288
Configuration Source Election...................................................................................................288
Propagation of DCB Information............................................................................................... 288
Auto-Detection and Manual Configuration of the DCBx Version............................................289
Behavior of Tagged Packets.......................................................................................................289
Configuration Example for DSCP and PFC Priorities................................................................ 290
DCBx Example.............................................................................................................................291
DCBx Prerequisites and Restrictions.......................................................................................... 291
Configuring DCBx.......................................................................................................................292
Verifying the DCB Configuration..................................................................................................... 296
Using PFC and ETS to Manage Data Center Traffic........................................................................ 307
PFC and ETS Configuration Command Examples.................................................................... 309
Using PFC and ETS to Manage Converged Ethernet Traffic.....................................................309
Hierarchical Scheduling in ETS Output Policies........................................................................309
Priority-Based Flow Control Using Dynamic Buffer Method..........................................................310
Pause and Resume of Traffic...................................................................................................... 310
Buffer Sizes for Lossless or PFC Packets.....................................................................................311
Configuring the Dynamic Buffer Method......................................................................................... 311
14 Dynamic Host Configuration Protocol (DHCP)........................................ 313
DHCP Packet Format and Options...................................................................................................313
Assign an IP Address using DHCP.....................................................................................................315
Implementation Information............................................................................................................ 316
Configure the System to be a DHCP Server.....................................................................................317
Configuring the Server for Automatic Address Allocation.........................................................317
Specifying a Default Gateway..................................................................................................... 319
Configure a Method of Hostname Resolution...........................................................................319
Using DNS for Address Resolution............................................................................................. 319
Using NetBIOS WINS for Address Resolution............................................................................ 319
Creating Manual Binding Entries................................................................................................320
Debugging the DHCP Server......................................................................................................320
Using DHCP Clear Commands.................................................................................................. 320
Configure the System to be a Relay Agent...................................................................................... 321
Configure the System to be a DHCP Client.....................................................................................323
Configuring the DHCP Client System........................................................................................ 323
DHCP Client on a Management Interface................................................................................. 325
DHCP Client Operation with Other Features.............................................................................325
Configure the System for User Port Stacking (Option 230)............................................................326
Configure Secure DHCP...................................................................................................................327
Option 82.....................................................................................................................................327
DHCP Snooping..........................................................................................................................328
Drop DHCP Packets on Snooped VLANs Only..........................................................................330
Dynamic ARP Inspection............................................................................................................ 330
Configuring Dynamic ARP Inspection........................................................................................ 331
Source Address Validation................................................................................................................332
Enabling IP Source Address Validation.......................................................................................332
DHCP MAC Source Address Validation......................................................................................333
Enabling IP+MAC Source Address Validation............................................................................ 333
Viewing the Number of SAV Dropped Packets..........................................................................334
Clearing the Number of SAV Dropped Packets......................................................................... 335
15 Equal Cost Multi-Path (ECMP)..................................................................... 336
ECMP for Flow-Based Affinity.......................................................................................................... 336
Configuring the Hash Algorithm................................................................................................ 336
Enabling Deterministic ECMP Next Hop....................................................................................336
Configuring the Hash Algorithm Seed....................................................................................... 337
Link Bundle Monitoring.....................................................................................................................337
Managing ECMP Group Paths.................................................................................................... 338
Creating an ECMP Group Bundle...............................................................................................339
Modifying the ECMP Group Threshold......................................................................................339
16 FCoE Transit.................................................................................................... 341
Fibre Channel over Ethernet.............................................................................................................341
Ensure Robustness in a Converged Ethernet Network................................................................... 341
FIP Snooping on Ethernet Bridges................................................................................................... 343
FIP Snooping in a Switch Stack........................................................................................................ 345
Using FIP Snooping...........................................................................................................................345
FIP Snooping Prerequisites.........................................................................................................345
Important Points to Remember................................................................................................. 346
Enabling the FCoE Transit Feature.............................................................................................346
Enable FIP Snooping on VLANs.................................................................................................. 347
Configure the FC-MAP Value..................................................................................................... 347
Configure a Port for a Bridge-to-Bridge Link............................................................................ 347
Configure a Port for a Bridge-to-FCF Link................................................................................ 347
Impact on Other Software Features...........................................................................................347
FIP Snooping Restrictions...........................................................................................................348
Configuring FIP Snooping.......................................................................................................... 348
Displaying FIP Snooping Information.............................................................................................. 349
FCoE Transit Configuration Example...............................................................................................355
17 Enabling FIPS Cryptography.........................................................................357
Configuration Tasks.......................................................................................................................... 357
Preparing the System........................................................................................................................357
Enabling FIPS Mode.......................................................................................................................... 358
Generating Host-Keys...................................................................................................................... 358
Monitoring FIPS Mode Status........................................................................................................... 359
Disabling FIPS Mode......................................................................................................................... 359
18 Force10 Resilient Ring Protocol (FRRP)..................................................... 361
Protocol Overview............................................................................................................................ 361
Ring Status...................................................................................................................................362
Multiple FRRP Rings.................................................................................................................... 363
Important FRRP Points................................................................................................................363
Important FRRP Concepts..........................................................................................................363
Implementing FRRP.......................................................................................................................... 365
FRRP Configuration.......................................................................................................................... 365
Creating the FRRP Group........................................................................................................... 365
Configuring the Control VLAN...................................................................................................366
Configuring and Adding the Member VLANs.............................................................................367
Setting the FRRP Timers............................................................................................................. 368
Clearing the FRRP Counters.......................................................................................................369
Viewing the FRRP Configuration................................................................................................369
Viewing the FRRP Information................................................................................................... 369
Troubleshooting FRRP......................................................................................................................370
Configuration Checks.................................................................................................................370
Sample Configuration and Topology...............................................................................................370
19 GARP VLAN Registration Protocol (GVRP)................................................ 372
Important Points to Remember........................................................................................................372
Configure GVRP................................................................................................................................ 373
Related Configuration Tasks.......................................................................................................373
Enabling GVRP Globally....................................................................................................................374
Enabling GVRP on a Layer 2 Interface............................................................................................. 374
Configure GVRP Registration........................................................................................................... 374
Configure a GARP Timer...................................................................................................................375
RPM Redundancy..............................................................................................................................376
20 High Availability (HA).....................................................................................377
Component Redundancy................................................................................................................. 377
Automatic and Manual Stack Unit Failover.................................................................................377
Synchronization between Management and Standby Units.....................................................378
Forcing an Stack Unit Failover.................................................................................................... 378
Specifying an Auto-Failover Limit...............................................................................................379
Disabling Auto-Reboot............................................................................................................... 379
Manually Synchronizing Management and Standby Units........................................................379
Pre-Configuring a Stack Unit Slot.................................................................................................... 379
Removing a Provisioned Logical Stack Unit....................................................................................380
Hitless Behavior................................................................................................................................ 380
Graceful Restart.................................................................................................................................381
Software Resiliency........................................................................................................................... 381
Software Component Health Monitoring.................................................................................. 381
System Health Monitoring.......................................................................................................... 381
Failure and Event Logging...........................................................................................................381
Hot-Lock Behavior........................................................................................................................... 382
21 Internet Group Management Protocol (IGMP).........................................383
IGMP Implementation Information..................................................................................................383
IGMP Protocol Overview..................................................................................................................383
IGMP Version 2............................................................................................................................383
IGMP Version 3............................................................................................................................385
Configure IGMP................................................................................................................................ 388
Related Configuration Tasks...................................................................................................... 388
Viewing IGMP Enabled Interfaces....................................................................................................389
Selecting an IGMP Version............................................................................................................... 389
Viewing IGMP Groups...................................................................................................................... 390
Adjusting Timers............................................................................................................................... 390
Adjusting Query and Response Timers......................................................................................390
Adjusting the IGMP Querier Timeout Value...............................................................................391
Configuring a Static IGMP Group.....................................................................................................391
Enabling IGMP Immediate-Leave.................................................................................................... 392
IGMP Snooping.................................................................................................................................392
IGMP Snooping Implementation Information........................................................................... 392
Configuring IGMP Snooping...................................................................................................... 392
Removing a Group-Port Association......................................................................................... 393
Disabling Multicast Flooding...................................................................................................... 393
Specifying a Port as Connected to a Multicast Router..............................................................394
Configuring the Switch as Querier.............................................................................................394
Fast Convergence after MSTP Topology Changes..........................................................................395
Egress Interface Selection (EIS) for HTTP and IGMP Applications..................................................395
Protocol Separation....................................................................................................................396
Enabling and Disabling Management Egress Interface Selection.............................................397
Handling of Management Route Configuration........................................................................398
Handling of Switch-Initiated Traffic...........................................................................................398
Handling of Switch-Destined Traffic..........................................................................................399
Handling of Transit Traffic (Traffic Separation)......................................................................... 400
Mapping of Management Applications and Traffic Type..........................................................400
Behavior of Various Applications for Switch-Initiated Traffic .................................................. 401
Behavior of Various Applications for Switch-Destined Traffic .................................................402
Interworking of EIS With Various Applications.......................................................................... 403
Designating a Multicast Router Interface........................................................................................ 404
22 Interfaces.........................................................................................................405
Basic Interface Configuration.......................................................................................................... 405
Advanced Interface Configuration...................................................................................................405
Interface Types................................................................................................................................. 406
View Basic Interface Information.....................................................................................................406
Enabling a Physical Interface........................................................................................................... 408
Physical Interfaces............................................................................................................................408
Configuration Task List for Physical Interfaces......................................................................... 409
Overview of Layer Modes...........................................................................................................409
Configuring Layer 2 (Data Link) Mode.......................................................................................409
Configuring Layer 2 (Interface) Mode........................................................................................ 410
Configuring Layer 3 (Network) Mode.........................................................................................410
Configuring Layer 3 (Interface) Mode.........................................................................................411
Egress Interface Selection (EIS).........................................................................................................411
Important Points to Remember..................................................................................................412
Configuring EIS............................................................................................................................412
Management Interfaces.................................................................................................................... 412
Configuring Management Interfaces......................................................................................... 412
Configuring Management Interfaces on the S-Series............................................................... 413
VLAN Interfaces.................................................................................................................................414
Loopback Interfaces..........................................................................................................................415
Null Interfaces................................................................................................................................... 415
Port Channel Interfaces.................................................................................................................... 415
Port Channel Definition and Standards......................................................................................416
Port Channel Benefits................................................................................................................. 416
Port Channel Implementation....................................................................................................416
10/100/1000 Mbps Interfaces in Port Channels........................................................................ 417
Configuration Tasks for Port Channel Interfaces.......................................................................417
Creating a Port Channel..............................................................................................................417
Adding a Physical Interface to a Port Channel...........................................................................418
Reassigning an Interface to a New Port Channel......................................................................420
Configuring the Minimum Oper Up Links in a Port Channel.................................................... 421
......................................................................................................................................................421
Assigning an IP Address to a Port Channel................................................................................422
Deleting or Disabling a Port Channel.........................................................................................422
Load Balancing Through Port Channels....................................................................................422
Load-Balancing Method.............................................................................................................422
Changing the Hash Algorithm....................................................................................................423
Bulk Configuration............................................................................................................................424
Interface Range...........................................................................................................................424
Bulk Configuration Examples..................................................................................................... 425
Defining Interface Range Macros.................................................................................................... 426
Define the Interface Range.........................................................................................................427
Choosing an Interface-Range Macro.........................................................................................427
Monitoring and Maintaining Interfaces............................................................................................ 427
Maintenance Using TDR.............................................................................................................428
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 429
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................430
Important Points to Remember................................................................................................. 430
Support for LM4 Optics...............................................................................................................431
Example Scenarios...................................................................................................................... 431
Link Dampening................................................................................................................................435
Important Points to Remember................................................................................................. 435
Enabling Link Dampening...........................................................................................................435
Link Bundle Monitoring.....................................................................................................................437
Using Ethernet Pause Frames for Flow Control.............................................................................. 437
Enabling Pause Frames...............................................................................................................438
Configure the MTU Size on an Interface......................................................................................... 439
Port-Pipes.........................................................................................................................................440
Auto-Negotiation on Ethernet Interfaces....................................................................................... 440
Setting the Speed and Duplex Mode of Ethernet Interfaces.................................................... 440
Set Auto-Negotiation Options................................................................................................... 442
View Advanced Interface Information............................................................................................. 443
Configuring the Interface Sampling Size................................................................................... 443
Dynamic Counters............................................................................................................................445
Clearing Interface Counters....................................................................................................... 445
Enhanced Validation of Interface Ranges....................................................................................... 446
23 Internet Protocol Security (IPSec).............................................................. 447
Configuring IPSec ............................................................................................................................448
24 IPv4 Routing................................................................................................... 449
IP Addresses......................................................................................................................................449
Implementation Information......................................................................................................449
Configuration Tasks for IP Addresses.............................................................................................. 449
Assigning IP Addresses to an Interface............................................................................................450
Configuring Static Routes.................................................................................................................451
Configure Static Routes for the Management Interface.................................................................452
IPv4 Path MTU Discovery Overview.................................................................................................453
Using the Configured Source IP Address in ICMP Messages..........................................................454
Configuring the ICMP Source Interface.....................................................................................454
Configuring the Duration to Establish a TCP Connection..............................................................454
Enabling Directed Broadcast............................................................................................................455
Resolution of Host Names............................................................................................................... 455
Enabling Dynamic Resolution of Host Names................................................................................ 455
Specifying the Local System Domain and a List of Domains..........................................................456
Configuring DNS with Traceroute................................................................................................... 456
ARP.................................................................................................................................................... 457
Configuration Tasks for ARP............................................................................................................ 458
Configuring Static ARP Entries.........................................................................................................458
Enabling Proxy ARP...........................................................................................................................459
Clearing ARP Cache..........................................................................................................................459
ARP Learning via Gratuitous ARP..................................................................................................... 459
Enabling ARP Learning via Gratuitous ARP......................................................................................460
ARP Learning via ARP Request.........................................................................................................460
Configuring ARP Retries....................................................................................................................461
ICMP..................................................................................................................................................462
Configuration Tasks for ICMP.......................................................................................................... 462
Enabling ICMP Unreachable Messages............................................................................................462
UDP Helper....................................................................................................................................... 462
Configure UDP Helper................................................................................................................462
Important Points to Remember................................................................................................. 463
Enabling UDP Helper........................................................................................................................463
Configuring a Broadcast Address.....................................................................................................463
Configurations Using UDP Helper................................................................................................... 464
UDP Helper with Broadcast-All Addresses......................................................................................464
UDP Helper with Subnet Broadcast Addresses............................................................................... 465
UDP Helper with Configured Broadcast Addresses........................................................................466
UDP Helper with No Configured Broadcast Addresses..................................................................466
Troubleshooting UDP Helper...........................................................................................................466
25 IPv6 Routing................................................................................................... 468
Protocol Overview............................................................................................................................468
Extended Address Space............................................................................................................ 468
Stateless Autoconfiguration....................................................................................................... 468
IPv6 Headers............................................................................................................................... 469
IPv6 Header Fields.......................................................................................................................470
Extension Header Fields.............................................................................................................. 471
Addressing................................................................................................................................... 472
Implementing IPv6 with Dell Networking OS..................................................................................474
ICMPv6.............................................................................................................................................. 476
Path MTU Discovery......................................................................................................................... 476
IPv6 Neighbor Discovery.................................................................................................................. 477
IPv6 Neighbor Discovery of MTU Packets................................................................................. 478
Configuration Task List for IPv6 RDNSS...........................................................................................478
Configuring the IPv6 Recursive DNS Server.............................................................................. 478
Debugging IPv6 RDNSS Information Sent to the Host .............................................................479
Displaying IPv6 RDNSS Information.......................................................................................... 480
Secure Shell (SSH) Over an IPv6 Transport......................................................................................481
Configuration Tasks for IPv6............................................................................................................ 481
Adjusting Your CAM-Profile........................................................................................................481
Assigning an IPv6 Address to an Interface.................................................................................482
Assigning a Static IPv6 Route..................................................................................................... 482
Configuring Telnet with IPv6......................................................................................................483
SNMP over IPv6...........................................................................................................................483
Showing IPv6 Information..........................................................................................................484
Showing an IPv6 Interface..........................................................................................................484
Showing IPv6 Routes..................................................................................................................485
Showing the Running-Configuration for an Interface..............................................................486
Clearing IPv6 Routes...................................................................................................................487
26 iSCSI Optimization........................................................................................ 488
iSCSI Optimization Overview...........................................................................................................488
Monitoring iSCSI Traffic Flows...................................................................................................490
Application of Quality of Service to iSCSI Traffic Flows............................................................490
Information Monitored in iSCSI Traffic Flows........................................................................... 490
Detection and Auto-Configuration for Dell EqualLogic Arrays.................................................491
Configuring Detection and Ports for Dell Compellent Arrays.................................................. 492
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................492
Enable and Disable iSCSI Optimization......................................................................................492
Default iSCSI Optimization Values...................................................................................................493
iSCSI Optimization Prerequisites..................................................................................................... 494
Configuring iSCSI Optimization.......................................................................................................494
Displaying iSCSI Optimization Information..................................................................................... 496
27 Intermediate System to Intermediate System..........................................498
IS-IS Protocol Overview...................................................................................................................498
IS-IS Addressing................................................................................................................................498
Multi-Topology IS-IS........................................................................................................................ 499
Transition Mode..........................................................................................................................500
Interface Support........................................................................................................................500
Adjacencies.................................................................................................................................500
Graceful Restart................................................................................................................................500
Timers.......................................................................................................................................... 501
Implementation Information............................................................................................................ 501
Configuration Information............................................................................................................... 502
Configuration Tasks for IS-IS......................................................................................................502
Configuring the Distance of a Route.......................................................................................... 511
Changing the IS-Type..................................................................................................................511
Redistributing IPv4 Routes..........................................................................................................514
Redistributing IPv6 Routes.......................................................................................................... 515
Configuring Authentication Passwords......................................................................................516
Setting the Overload Bit.............................................................................................................. 516
Debugging IS-IS...........................................................................................................................517
IS-IS Metric Styles..............................................................................................................................518
Configure Metric Values................................................................................................................... 518
Maximum Values in the Routing Table.......................................................................................519
Change the IS-IS Metric Style in One Level Only.......................................................................519
Leaks from One Level to Another...............................................................................................521
Sample Configurations......................................................................................................................521
28 Link Aggregation Control Protocol (LACP)...............................................524
Introduction to Dynamic LAGs and LACP....................................................................................... 524
Important Points to Remember................................................................................................. 524
LACP Modes................................................................................................................................ 525
Configuring LACP Commands................................................................................................... 525
LACP Configuration Tasks................................................................................................................526
Creating a LAG............................................................................................................................ 526
Configuring the LAG Interfaces as Dynamic..............................................................................527
Setting the LACP Long Timeout................................................................................................. 527
Monitoring and Debugging LACP.............................................................................................. 528
Shared LAG State Tracking............................................................................................................... 528
Configuring Shared LAG State Tracking.....................................................................................529
Important Points about Shared LAG State Tracking..................................................................530
LACP Basic Configuration Example..................................................................................................531
Configure a LAG on ALPHA.........................................................................................................531
29 Layer 2..............................................................................................................539
Manage the MAC Address Table...................................................................................................... 539
Clearing the MAC Address Table................................................................................................539
Setting the Aging Time for Dynamic Entries..............................................................................539
Configuring a Static MAC Address............................................................................................. 540
Displaying the MAC Address Table............................................................................................ 540
MAC Learning Limit.......................................................................................................................... 540
Setting the MAC Learning Limit.................................................................................................. 541
mac learning-limit Dynamic....................................................................................................... 541
mac learning-limit mac-address-sticky.....................................................................................542
mac learning-limit station-move............................................................................................... 542
mac learning-limit no-station-move.........................................................................................542
Learning Limit Violation Actions.................................................................................................543
Setting Station Move Violation Actions......................................................................................543
Recovering from Learning Limit and Station Move Violations..................................................544
NIC Teaming.....................................................................................................................................544
Configure Redundant Pairs.............................................................................................................. 546
Important Points about Configuring Redundant Pairs..............................................................548
Far-End Failure Detection................................................................................................................ 549
FEFD State Changes....................................................................................................................550
Configuring FEFD........................................................................................................................ 551
Enabling FEFD on an Interface................................................................................................... 552
Debugging FEFD......................................................................................................................... 553
30 Link Layer Discovery Protocol (LLDP)........................................................ 555
802.1AB (LLDP) Overview................................................................................................................. 555
Protocol Data Units.....................................................................................................................555
Optional TLVs....................................................................................................................................556
Management TLVs...................................................................................................................... 556
TIA-1057 (LLDP-MED) Overview......................................................................................................558
TIA Organizationally Specific TLVs.............................................................................................559
Configure LLDP.................................................................................................................................563
Related Configuration Tasks.......................................................................................................563
Important Points to Remember................................................................................................. 564
LLDP Compatibility..................................................................................................................... 564
CONFIGURATION versus INTERFACE Configurations....................................................................564
Enabling LLDP................................................................................................................................... 565
Disabling and Undoing LLDP......................................................................................................565
Enabling LLDP on Management Ports............................................................................................. 565
Disabling and Undoing LLDP on Management Ports................................................................565
Advertising TLVs................................................................................................................................566
Viewing the LLDP Configuration......................................................................................................567
Viewing Information Advertised by Adjacent LLDP Agents............................................................ 568
Configuring LLDPDU Intervals......................................................................................................... 569
Configuring Transmit and Receive Mode........................................................................................569
Configuring a Time to Live............................................................................................................... 570
Debugging LLDP................................................................................................................................571
Relevant Management Objects........................................................................................................ 572
31 Microsoft Network Load Balancing............................................................ 578
NLB Unicast Mode Scenario.............................................................................................................578
NLB Multicast Mode Scenario.......................................................................................................... 579
Limitations With Enabling NLB on Switches.................................................................................... 579
Benefits and Working of Microsoft Clustering.................................................................................579
Enable and Disable VLAN Flooding .................................................................................................580
Configuring a Switch for NLB ......................................................................................................... 580
.....................................................................................................................................................580
32 Multicast Source Discovery Protocol (MSDP)...........................................581
Protocol Overview............................................................................................................................ 581
Anycast RP.........................................................................................................................................583
Implementation Information............................................................................................................583
Configure Multicast Source Discovery Protocol............................................................................. 583
Related Configuration Tasks.......................................................................................................583
Enable MSDP.....................................................................................................................................587
Manage the Source-Active Cache...................................................................................................588
Viewing the Source-Active Cache............................................................................................. 588
Limiting the Source-Active Cache............................................................................................. 589
Clearing the Source-Active Cache.............................................................................................589
/