Dell PowerSwitch S6010-ON User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6010-ON User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S6010–ON
System
9.11(2.0P1)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 05
Rev. A00
Contents
1 About this Guide...........................................................................................................................................34
Audience............................................................................................................................................................................34
Conventions......................................................................................................................................................................34
Related Documents......................................................................................................................................................... 34
2 Conguration Fundamentals........................................................................................................................ 35
Accessing the Command Line........................................................................................................................................35
CLI Modes.........................................................................................................................................................................35
Navigating CLI Modes............................................................................................................................................... 37
The do Command............................................................................................................................................................ 39
Undoing Commands........................................................................................................................................................ 40
Obtaining Help..................................................................................................................................................................40
Entering and Editing Commands.................................................................................................................................... 41
Command History............................................................................................................................................................ 42
Filtering show Command Outputs.................................................................................................................................42
Example of the grep Keyword.................................................................................................................................. 42
Multiple Users in Conguration Mode...........................................................................................................................43
3 Getting Started............................................................................................................................................44
Console Access................................................................................................................................................................45
Serial Console.............................................................................................................................................................45
Default Conguration...................................................................................................................................................... 46
Conguring a Host Name............................................................................................................................................... 46
Accessing the System Remotely....................................................................................................................................46
Accessing the System Remotely..............................................................................................................................47
Congure the Management Port IP Address......................................................................................................... 47
Congure a Management Route..............................................................................................................................47
Conguring a Username and Password.................................................................................................................. 47
Conguring the Enable Password..................................................................................................................................48
Conguration File Management.....................................................................................................................................48
Copy Files to and from the System......................................................................................................................... 48
Mounting an NFS File System..................................................................................................................................49
Save the Running-Conguration.............................................................................................................................. 51
Congure the Overload Bit for a Startup Scenario................................................................................................ 51
Viewing Files................................................................................................................................................................51
Managing the File System.............................................................................................................................................. 52
View Command History.................................................................................................................................................. 53
Upgrading Dell Networking OS...................................................................................................................................... 53
Using HTTP for File Transfers........................................................................................................................................ 53
Verify Software Images Before Installation...................................................................................................................54
4 Management............................................................................................................................................... 56
Contents
3
Conguring Privilege Levels........................................................................................................................................... 56
Creating a Custom Privilege Level...........................................................................................................................56
Removing a Command from EXEC Mode.............................................................................................................. 57
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................57
Allowing Access to CONFIGURATION Mode Commands.................................................................................... 57
Allowing Access to Dierent Modes........................................................................................................................57
Applying a Privilege Level to a Username............................................................................................................... 59
Applying a Privilege Level to a Terminal Line.......................................................................................................... 59
Conguring Logging........................................................................................................................................................ 59
Audit and Security Logs............................................................................................................................................60
Conguring Logging Format ................................................................................................................................... 61
Setting Up a Secure Connection to a Syslog Server............................................................................................. 61
Log Messages in the Internal Buer..............................................................................................................................63
Conguration Task List for System Log Management.......................................................................................... 63
Disabling System Logging............................................................................................................................................... 63
Sending System Messages to a Syslog Server............................................................................................................63
Conguring a UNIX System as a Syslog Server.....................................................................................................63
Track Login Activity......................................................................................................................................................... 64
Restrictions for Tracking Login Activity...................................................................................................................64
Conguring Login Activity Tracking......................................................................................................................... 64
Display Login Statistics..............................................................................................................................................65
Limit Concurrent Login Sessions....................................................................................................................................66
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 66
Conguring Concurrent Session Limit.....................................................................................................................66
Enabling the System to Clear Existing Sessions.................................................................................................... 67
Enabling Secured CLI Mode........................................................................................................................................... 68
Changing System Logging Settings...............................................................................................................................68
Display the Logging Buer and the Logging Conguration........................................................................................69
Conguring a UNIX Logging Facility Level....................................................................................................................69
Synchronizing Log Messages......................................................................................................................................... 70
Enabling Timestamp on Syslog Messages.....................................................................................................................71
File Transfer Services....................................................................................................................................................... 71
Conguration Task List for File Transfer Services..................................................................................................72
Enabling the FTP Server........................................................................................................................................... 72
Conguring FTP Server Parameters........................................................................................................................72
Conguring FTP Client Parameters......................................................................................................................... 73
Terminal Lines................................................................................................................................................................... 73
Denying and Permitting Access to a Terminal Line................................................................................................ 73
Conguring Login Authentication for Terminal Lines............................................................................................. 74
Setting Timeout for EXEC Privilege Mode................................................................................................................... 75
Using Telnet to get to Another Network Device..........................................................................................................76
Lock CONFIGURATION Mode....................................................................................................................................... 76
Viewing the Conguration Lock Status...................................................................................................................76
Restoring the Factory Default Settings.........................................................................................................................77
Important Points to Remember................................................................................................................................77
4
Contents
Restoring Factory Default Environment Variables................................................................................................. 78
5 802.1X......................................................................................................................................................... 80
Port-Authentication Process.......................................................................................................................................... 82
EAP over RADIUS......................................................................................................................................................82
Conguring 802.1X...........................................................................................................................................................83
Related Conguration Tasks..................................................................................................................................... 83
Important Points to Remember......................................................................................................................................83
Enabling 802.1X................................................................................................................................................................ 84
Conguring Request Identity Re-Transmissions...........................................................................................................85
Conguring a Quiet Period after a Failed Authentication..................................................................................... 86
Forcibly Authorizing or Unauthorizing a Port................................................................................................................87
Re-Authenticating a Port................................................................................................................................................ 87
Conguring Timeouts......................................................................................................................................................88
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................89
Guest and Authentication-Fail VLANs.......................................................................................................................... 90
Conguring a Guest VLAN........................................................................................................................................91
Conguring an Authentication-Fail VLAN............................................................................................................... 91
6 Access Control Lists (ACLs)........................................................................................................................ 93
IP Access Control Lists (ACLs)...................................................................................................................................... 94
CAM Usage................................................................................................................................................................ 95
Implementing ACLs on Dell Networking OS...........................................................................................................95
Important Points to Remember......................................................................................................................................97
Conguration Task List for Route Maps..................................................................................................................97
Conguring Match Routes........................................................................................................................................99
Conguring Set Conditions.....................................................................................................................................100
Congure a Route Map for Route Redistribution..................................................................................................101
Congure a Route Map for Route Tagging........................................................................................................... 102
Continue Clause........................................................................................................................................................102
IP Fragment Handling.................................................................................................................................................... 103
IP Fragments ACL Examples...................................................................................................................................103
Layer 4 ACL Rules Examples...................................................................................................................................103
Congure a Standard IP ACL........................................................................................................................................104
Conguring a Standard IP ACL Filter.....................................................................................................................105
Congure an Extended IP ACL.....................................................................................................................................106
Conguring Filters with a Sequence Number.......................................................................................................106
Conguring Filters Without a Sequence Number................................................................................................ 108
Congure Layer 2 and Layer 3 ACLs............................................................................................................................108
Assign an IP ACL to an Interface..................................................................................................................................109
Applying an IP ACL.........................................................................................................................................................109
Counting ACL Hits.................................................................................................................................................... 110
Congure Ingress ACLs.................................................................................................................................................. 110
Congure Egress ACLs....................................................................................................................................................111
Applying Egress Layer 3 ACLs (Control-Plane)..................................................................................................... 112
IP Prex Lists...................................................................................................................................................................112
Contents
5
Implementation Information..................................................................................................................................... 113
Conguration Task List for Prex Lists...................................................................................................................113
ACL Resequencing..........................................................................................................................................................116
Resequencing an ACL or Prex List........................................................................................................................117
Route Maps......................................................................................................................................................................118
Implementation Information..................................................................................................................................... 118
Flow-Based Monitoring Support for ACLs...................................................................................................................118
Behavior of Flow-Based Monitoring....................................................................................................................... 119
Enabling Flow-Based Monitoring............................................................................................................................120
Conguring IP Mirror Access Group.............................................................................................................................121
Sample Conguration...............................................................................................................................................122
Example of viewing IP mirror–access–group applied to an Interface................................................................122
7 Bidirectional Forwarding Detection (BFD)...................................................................................................123
How BFD Works............................................................................................................................................................. 123
BFD Packet Format..................................................................................................................................................124
BFD Sessions............................................................................................................................................................ 125
BFD Three-Way Handshake.................................................................................................................................... 126
Session State Changes............................................................................................................................................128
Important Points to Remember.................................................................................................................................... 128
Congure BFD................................................................................................................................................................ 128
Congure BFD for Physical Ports...........................................................................................................................129
Congure BFD for Static Routes............................................................................................................................130
Congure BFD for OSPF.........................................................................................................................................133
Congure BFD for OSPFv3.....................................................................................................................................136
Congure BFD for IS-IS........................................................................................................................................... 137
Congure BFD for BGP........................................................................................................................................... 139
Congure BFD for VRRP.........................................................................................................................................146
Conguring Protocol Liveness................................................................................................................................ 149
Troubleshooting BFD................................................................................................................................................149
8 Border Gateway Protocol IPv4 (BGPv4)..................................................................................................... 151
Autonomous Systems (AS)............................................................................................................................................151
Sessions and Peers........................................................................................................................................................ 153
Establish a Session...................................................................................................................................................153
Route Reectors.............................................................................................................................................................154
BGP Attributes............................................................................................................................................................... 155
Best Path Selection Criteria....................................................................................................................................155
Weight........................................................................................................................................................................157
Local Preference....................................................................................................................................................... 157
Multi-Exit Discriminators (MEDs)...........................................................................................................................158
Origin..........................................................................................................................................................................159
AS Path......................................................................................................................................................................160
Next Hop................................................................................................................................................................... 160
Multiprotocol BGP..........................................................................................................................................................160
Implement BGP with Dell Networking OS................................................................................................................... 161
6
Contents
Additional Path (Add-Path) Support.......................................................................................................................161
Advertise IGP Cost as MED for Redistributed Routes......................................................................................... 161
Ignore Router-ID in Best-Path Calculation............................................................................................................ 162
Four-Byte AS Numbers............................................................................................................................................162
AS4 Number Representation.................................................................................................................................. 162
AS Number Migration.............................................................................................................................................. 164
BGP4 Management Information Base (MIB)........................................................................................................165
Important Points to Remember..............................................................................................................................165
Conguration Information..............................................................................................................................................166
BGP Conguration......................................................................................................................................................... 166
Enabling BGP............................................................................................................................................................ 167
Conguring AS4 Number Representations........................................................................................................... 170
Conguring Peer Groups......................................................................................................................................... 172
Conguring BGP Fast Fall-Over............................................................................................................................. 174
Conguring Passive Peering....................................................................................................................................176
Maintaining Existing AS Numbers During an AS Migration................................................................................. 176
Allowing an AS Number to Appear in its Own AS Path........................................................................................177
Enabling Graceful Restart........................................................................................................................................178
Enabling Neighbor Graceful Restart.......................................................................................................................179
Filtering on an AS-Path Attribute........................................................................................................................... 179
Regular Expressions as Filters..................................................................................................................................181
Redistributing Routes...............................................................................................................................................182
Enabling Additional Paths........................................................................................................................................ 183
Conguring IP Community Lists............................................................................................................................. 183
Conguring an IP Extended Community List........................................................................................................184
Filtering Routes with Community Lists..................................................................................................................185
Manipulating the COMMUNITY Attribute.............................................................................................................186
Changing MED Attributes........................................................................................................................................187
Changing the LOCAL_PREFERENCE Attribute...................................................................................................187
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............. 188
Changing the WEIGHT Attribute............................................................................................................................189
Enabling Multipath....................................................................................................................................................189
Filtering BGP Routes................................................................................................................................................189
Filtering BGP Routes Using Route Maps............................................................................................................... 191
Filtering BGP Routes Using AS-PATH Information............................................................................................... 191
Conguring BGP Route Reectors........................................................................................................................ 192
Aggregating Routes..................................................................................................................................................193
Conguring BGP Confederations........................................................................................................................... 193
Enabling Route Flap Dampening.............................................................................................................................194
Changing BGP Timers............................................................................................................................................. 196
Enabling BGP Neighbor Soft-Reconguration..................................................................................................... 196
Enabling or disabling BGP neighbors......................................................................................................................197
Route Map Continue................................................................................................................................................199
Enabling MBGP Congurations.................................................................................................................................... 199
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor......................................... 200
Contents
7
BGP Regular Expression Optimization........................................................................................................................200
Debugging BGP............................................................................................................................................................. 200
Storing Last and Bad PDUs.....................................................................................................................................201
Capturing PDUs....................................................................................................................................................... 202
PDU Counters.......................................................................................................................................................... 203
Sample Congurations.................................................................................................................................................. 203
9 Content Addressable Memory (CAM)........................................................................................................ 210
CAM Allocation............................................................................................................................................................... 210
Test CAM Usage.............................................................................................................................................................212
View CAM Proles..........................................................................................................................................................212
View CAM-ACL Settings............................................................................................................................................... 213
View CAM Usage............................................................................................................................................................214
CAM Optimization..........................................................................................................................................................215
Troubleshoot CAM Proling.......................................................................................................................................... 215
QoS CAM Region Limitation................................................................................................................................... 215
Syslog Error When the Table is Full........................................................................................................................215
Syslog Warning Upon 90 Percent Utilization of CAM..........................................................................................216
Syslog Warning for Discrepancies Between Congured Extended Prexes.....................................................216
Unied Forwarding Table (UFT) Modes...................................................................................................................... 216
Conguring UFT Modes.......................................................................................................................................... 216
10 Control Plane Policing (CoPP).................................................................................................................. 218
Congure Control Plane Policing.................................................................................................................................. 219
Conguring CoPP for Protocols............................................................................................................................ 220
Conguring CoPP for CPU Queues...................................................................................................................... 222
Displaying CoPP Conguration ............................................................................................................................. 223
11 Data Center Bridging (DCB)......................................................................................................................225
Ethernet Enhancements in Data Center Bridging..................................................................................................... 225
Priority-Based Flow Control................................................................................................................................... 226
Enhanced Transmission Selection..........................................................................................................................227
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................228
Data Center Bridging in a Trac Flow.................................................................................................................. 229
Enabling Data Center Bridging.....................................................................................................................................229
DCB Maps and its Attributes..................................................................................................................................230
Data Center Bridging: Default Conguration...............................................................................................................231
Conguring Priority-Based Flow Control.....................................................................................................................231
Conguring Lossless Queues................................................................................................................................. 232
Conguring PFC in a DCB Map................................................................................................................................... 234
PFC Conguration Notes........................................................................................................................................234
PFC Prerequisites and Restrictions.......................................................................................................................235
Applying a DCB Map on a Port.................................................................................................................................... 235
Conguring PFC without a DCB Map.........................................................................................................................236
Conguring Lossless QueuesExample:..................................................................................................................236
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................238
8
Contents
Pause and Resume of Trac..................................................................................................................................238
Buer Sizes for Lossless or PFC Packets.............................................................................................................238
Behavior of Tagged Packets.........................................................................................................................................239
Conguration Example for DSCP and PFC Priorities................................................................................................239
SNMP Support for PFC and Buer Statistics Tracking............................................................................................240
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................240
PFC and ETS Conguration Examples.........................................................................................................................241
Using PFC to Manage Converged Ethernet Trac................................................................................................... 241
Operations on Untagged Packets.................................................................................................................................241
Generation of PFC for a Priority for Untagged Packets...........................................................................................242
Congure Enhanced Transmission Selection..............................................................................................................242
ETS Prerequisites and Restrictions........................................................................................................................242
Creating an ETS Priority Group..............................................................................................................................242
ETS Operation with DCBx...................................................................................................................................... 243
Conguring Bandwidth Allocation for DCBx CIN.................................................................................................244
Conguring ETS in a DCB Map..............................................................................................................................245
Hierarchical Scheduling in ETS Output Policies......................................................................................................... 246
Using ETS to Manage Converged Ethernet Trac...................................................................................................246
Applying DCB Policies in a Switch Stack.................................................................................................................... 247
Congure a DCBx Operation........................................................................................................................................ 247
DCBx Operation....................................................................................................................................................... 247
DCBx Port Roles...................................................................................................................................................... 247
DCB Conguration Exchange.................................................................................................................................249
Conguration Source Election................................................................................................................................249
Propagation of DCB Information........................................................................................................................... 250
Auto-Detection and Manual Conguration of the DCBx Version...................................................................... 250
DCBx Example......................................................................................................................................................... 250
DCBx Prerequisites and Restrictions......................................................................................................................251
Conguring DCBx.....................................................................................................................................................251
Verifying the DCB Conguration................................................................................................................................. 255
QoS dot1p Trac Classication and Queue Assignment..........................................................................................263
Conguring the Dynamic Buer Method................................................................................................................... 264
Sample DCB Conguration...........................................................................................................................................265
PFC and ETS Conguration Command Examples...............................................................................................266
12 Dynamic Host Conguration Protocol (DHCP)......................................................................................... 267
DHCP Packet Format and Options..............................................................................................................................267
Assign an IP Address using DHCP...............................................................................................................................269
Implementation Information..........................................................................................................................................270
Congure the System to be a DHCP Server..............................................................................................................270
Conguring the Server for Automatic Address Allocation...................................................................................271
Specifying a Default Gateway................................................................................................................................ 272
Congure a Method of Hostname Resolution......................................................................................................272
Using DNS for Address Resolution........................................................................................................................ 272
Using NetBIOS WINS for Address Resolution......................................................................................................273
Creating Manual Binding Entries............................................................................................................................273
Contents
9
Debugging the DHCP Server................................................................................................................................. 273
Using DHCP Clear Commands...............................................................................................................................274
Congure the System to be a DHCP Client................................................................................................................274
Conguring the DHCP Client System....................................................................................................................274
DHCP Client on a Management Interface............................................................................................................ 276
DHCP Client Operation with Other Features....................................................................................................... 276
Congure the System for User Port Stacking (Option 230)....................................................................................277
Congure Secure DHCP................................................................................................................................................277
Option 82.................................................................................................................................................................. 278
DHCP Snooping....................................................................................................................................................... 278
Drop DHCP Packets on Snooped VLANs Only.....................................................................................................281
Dynamic ARP Inspection.........................................................................................................................................282
Conguring Dynamic ARP Inspection................................................................................................................... 283
Source Address Validation............................................................................................................................................ 284
Enabling IP Source Address Validation.................................................................................................................. 284
DHCP MAC Source Address Validation................................................................................................................ 285
Enabling IP+MAC Source Address Validation.......................................................................................................285
Viewing the Number of SAV Dropped Packets....................................................................................................286
Clearing the Number of SAV Dropped Packets................................................................................................... 286
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 287
ECMP for Flow-Based Anity..................................................................................................................................... 287
Conguring the Hash Algorithm.............................................................................................................................287
Enabling Deterministic ECMP Next Hop...............................................................................................................287
Conguring the Hash Algorithm Seed.................................................................................................................. 288
Link Bundle Monitoring................................................................................................................................................. 288
Managing ECMP Group Paths...............................................................................................................................289
Creating an ECMP Group Bundle..........................................................................................................................289
Modifying the ECMP Group Threshold.................................................................................................................289
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................290
Support for ECMP in host table............................................................................................................................. 291
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes .........................................................................291
14 FIP Snooping............................................................................................................................................292
Fibre Channel over Ethernet........................................................................................................................................ 292
Ensure Robustness in a Converged Ethernet Network............................................................................................ 292
FIP Snooping on Ethernet Bridges.............................................................................................................................. 294
FIP Snooping in a Switch Stack...................................................................................................................................296
Using FIP Snooping....................................................................................................................................................... 296
FIP Snooping Prerequisites.....................................................................................................................................296
Important Points to Remember............................................................................................................................. 296
Enabling the FCoE Transit Feature........................................................................................................................ 297
Enable FIP Snooping on VLANs.............................................................................................................................298
Congure the FC-MAP Value................................................................................................................................ 298
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................298
Congure a Port for a Bridge-to-FCF Link...........................................................................................................298
10
Contents
Impact on Other Software Features..................................................................................................................... 298
FIP Snooping Restrictions...................................................................................................................................... 299
Conguring FIP Snooping.......................................................................................................................................299
Displaying FIP Snooping Information...........................................................................................................................300
FCoE Transit Conguration Example.......................................................................................................................... 305
15 Flex Hash and Optimized Boot-Up............................................................................................................307
Flex Hash Capability Overview.....................................................................................................................................307
Conguring the Flex Hash Mechanism....................................................................................................................... 307
Conguring Fast Boot and LACP Fast Switchover...................................................................................................308
Optimizing the Boot Time.............................................................................................................................................308
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................308
Guidelines for Conguring Optimized Booting Mechanism................................................................................309
Interoperation of Applications with Fast Boot and System States...........................................................................310
LACP and IPv4 Routing...........................................................................................................................................310
LACP and IPv6 Routing...........................................................................................................................................310
BGP Graceful Restart...............................................................................................................................................311
Cold Boot Caused by Power Cycling the System................................................................................................. 311
Unexpected Reload of the System......................................................................................................................... 311
Software Upgrade.....................................................................................................................................................311
LACP Fast Switchover............................................................................................................................................. 311
Changes to BGP Multipath..................................................................................................................................... 312
Delayed Installation of ECMP Routes Into BGP....................................................................................................312
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................ 312
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.......................................................................................313
16 Force10 Resilient Ring Protocol (FRRP)....................................................................................................314
Protocol Overview..........................................................................................................................................................314
Ring Status................................................................................................................................................................315
Multiple FRRP Rings................................................................................................................................................ 315
Important FRRP Points............................................................................................................................................316
Important FRRP Concepts...................................................................................................................................... 317
Implementing FRRP....................................................................................................................................................... 318
FRRP Conguration....................................................................................................................................................... 318
Creating the FRRP Group....................................................................................................................................... 318
Conguring the Control VLAN................................................................................................................................319
Conguring and Adding the Member VLANs.......................................................................................................320
Setting the FRRP Timers.........................................................................................................................................321
Clearing the FRRP Counters...................................................................................................................................321
Viewing the FRRP Conguration............................................................................................................................321
Viewing the FRRP Information............................................................................................................................... 321
Troubleshooting FRRP.................................................................................................................................................. 322
Conguration Checks..............................................................................................................................................322
Sample Conguration and Topology............................................................................................................................322
FRRP Support on VLT...................................................................................................................................................323
Example Scenario.....................................................................................................................................................324
Contents
11
Important Points to Remember............................................................................................................................. 325
17 GARP VLAN Registration Protocol (GVRP)..............................................................................................326
Important Points to Remember................................................................................................................................... 326
Congure GVRP.............................................................................................................................................................327
Related Conguration Tasks................................................................................................................................... 327
Enabling GVRP Globally................................................................................................................................................ 328
Enabling GVRP on a Layer 2 Interface........................................................................................................................328
Congure GVRP Registration.......................................................................................................................................328
Congure a GARP Timer.............................................................................................................................................. 329
18 Internet Group Management Protocol (IGMP)......................................................................................... 330
IGMP Implementation Information.............................................................................................................................. 330
IGMP Protocol Overview..............................................................................................................................................330
IGMP Version 2........................................................................................................................................................ 330
IGMP Version 3........................................................................................................................................................ 332
Congure IGMP............................................................................................................................................................. 335
Related Conguration Tasks...................................................................................................................................335
Viewing IGMP Enabled Interfaces............................................................................................................................... 336
Selecting an IGMP Version...........................................................................................................................................336
Viewing IGMP Groups...................................................................................................................................................336
Adjusting Timers.............................................................................................................................................................337
Adjusting Query and Response Timers..................................................................................................................337
Enabling IGMP Immediate-Leave.................................................................................................................................338
IGMP Snooping..............................................................................................................................................................338
IGMP Snooping Implementation Information....................................................................................................... 338
Conguring IGMP Snooping...................................................................................................................................338
Removing a Group-Port Association.....................................................................................................................339
Disabling Multicast Flooding...................................................................................................................................339
Specifying a Port as Connected to a Multicast Router...................................................................................... 339
Conguring the Switch as Querier........................................................................................................................ 340
Fast Convergence after MSTP Topology Changes...................................................................................................340
Egress Interface Selection (EIS) for HTTP and IGMP Applications.........................................................................341
Protocol Separation..................................................................................................................................................341
Enabling and Disabling Management Egress Interface Selection...................................................................... 342
Handling of Management Route Conguration................................................................................................... 343
Handling of Switch-Initiated Trac....................................................................................................................... 343
Handling of Switch-Destined Trac......................................................................................................................344
Handling of Transit Trac (Trac Separation).................................................................................................... 345
Mapping of Management Applications and Trac Type.....................................................................................345
Behavior of Various Applications for Switch-Initiated Trac ............................................................................ 346
Behavior of Various Applications for Switch-Destined Trac ...........................................................................347
Interworking of EIS With Various Applications.....................................................................................................348
Designating a Multicast Router Interface................................................................................................................... 348
19 Interfaces.................................................................................................................................................349
12
Contents
Basic Interface Conguration.......................................................................................................................................349
Advanced Interface Conguration...............................................................................................................................349
Interface Types...............................................................................................................................................................350
View Basic Interface Information.................................................................................................................................350
Resetting an Interface to its Factory Default State...................................................................................................352
Enabling a Physical Interface........................................................................................................................................353
Physical Interfaces.........................................................................................................................................................353
Conguration Task List for Physical Interfaces....................................................................................................353
40G to 1G Breakout Cable Adaptor....................................................................................................................... 353
Overview of Layer Modes...................................................................................................................................... 354
Conguring Layer 2 (Data Link) Mode..................................................................................................................354
Conguring Layer 2 (Interface) Mode.................................................................................................................. 355
Conguring Layer 3 (Network) Mode...................................................................................................................355
Conguring Layer 3 (Interface) Mode.................................................................................................................. 356
Egress Interface Selection (EIS)..................................................................................................................................356
Important Points to Remember..............................................................................................................................357
Conguring EIS........................................................................................................................................................ 357
Management Interfaces................................................................................................................................................357
Conguring Management Interfaces.....................................................................................................................357
Conguring a Management Interface on an Ethernet Port............................................................................... 359
VLAN Interfaces............................................................................................................................................................ 360
Loopback Interfaces......................................................................................................................................................360
Null Interfaces.................................................................................................................................................................361
Port Channel Interfaces.................................................................................................................................................361
Port Channel Denition and Standards..................................................................................................................361
Port Channel Benets..............................................................................................................................................361
Port Channel Implementation.................................................................................................................................362
Interfaces in Port Channels.................................................................................................................................... 362
Conguration Tasks for Port Channel Interfaces.................................................................................................363
Creating a Port Channel..........................................................................................................................................363
Adding a Physical Interface to a Port Channel.....................................................................................................363
Reassigning an Interface to a New Port Channel................................................................................................365
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 366
Adding or Removing a Port Channel from a VLAN............................................................................................. 366
Assigning an IP Address to a Port Channel...........................................................................................................367
Deleting or Disabling a Port Channel..................................................................................................................... 367
Load Balancing Through Port Channels................................................................................................................368
Changing the Hash Algorithm................................................................................................................................368
Bulk Conguration......................................................................................................................................................... 369
Interface Range....................................................................................................................................................... 369
Bulk Conguration Examples..................................................................................................................................370
Dening Interface Range Macros................................................................................................................................. 371
Dene the Interface Range..................................................................................................................................... 371
Choosing an Interface-Range Macro..................................................................................................................... 371
Monitoring and Maintaining Interfaces........................................................................................................................372
Contents
13
Maintenance Using TDR......................................................................................................................................... 373
Splitting 40G Ports without Reload.............................................................................................................................373
Splitting QSFP Ports to SFP+ Ports........................................................................................................................... 375
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port.................................................................................. 376
Important Points to Remember..............................................................................................................................376
Example Scenarios...................................................................................................................................................377
Link Dampening..............................................................................................................................................................378
Important Points to Remember..............................................................................................................................378
Enabling Link Dampening........................................................................................................................................ 378
Link Bundle Monitoring................................................................................................................................................. 380
Using Ethernet Pause Frames for Flow Control........................................................................................................ 380
Enabling Pause Frames............................................................................................................................................381
Congure the MTU Size on an Interface....................................................................................................................382
Port-Pipes.......................................................................................................................................................................382
Auto-Negotiation on Ethernet Interfaces................................................................................................................... 383
Setting the Speed of Ethernet Interfaces............................................................................................................ 383
Set Auto-Negotiation Options................................................................................................................................384
View Advanced Interface Information.........................................................................................................................385
Conguring the Interface Sampling Size.............................................................................................................. 386
Conguring the Trac Sampling Size Globally...........................................................................................................387
Dynamic Counters......................................................................................................................................................... 388
Clearing Interface Counters................................................................................................................................... 389
Compressing Conguration Files................................................................................................................................. 389
20 IPv4 Routing............................................................................................................................................393
IP Addresses...................................................................................................................................................................394
Implementation Information....................................................................................................................................394
Conguration Tasks for IP Addresses..........................................................................................................................394
Assigning IP Addresses to an Interface.......................................................................................................................394
Conguring Static Routes............................................................................................................................................ 395
Congure Static Routes for the Management Interface..........................................................................................396
Using the Congured Source IP Address in ICMP Messages.................................................................................. 397
Conguring the ICMP Source Interface................................................................................................................397
Conguring the Duration to Establish a TCP Connection.........................................................................................397
Enabling Directed Broadcast........................................................................................................................................ 398
Resolution of Host Names............................................................................................................................................398
Enabling Dynamic Resolution of Host Names............................................................................................................398
Specifying the Local System Domain and a List of Domains................................................................................... 399
Conguring DNS with Traceroute............................................................................................................................... 399
ARP................................................................................................................................................................................. 400
Conguration Tasks for ARP........................................................................................................................................ 400
Conguring Static ARP Entries....................................................................................................................................400
Enabling Proxy ARP....................................................................................................................................................... 401
Clearing ARP Cache.......................................................................................................................................................401
ARP Learning via Gratuitous ARP................................................................................................................................ 401
Enabling ARP Learning via Gratuitous ARP................................................................................................................402
14
Contents
ARP Learning via ARP Request................................................................................................................................... 402
Conguring ARP Retries...............................................................................................................................................403
ICMP............................................................................................................................................................................... 403
Conguration Tasks for ICMP...................................................................................................................................... 403
Enabling ICMP Unreachable Messages...................................................................................................................... 403
UDP Helper.....................................................................................................................................................................404
Congure UDP Helper............................................................................................................................................ 404
Important Points to Remember............................................................................................................................. 404
Enabling UDP Helper.....................................................................................................................................................404
Conguring a Broadcast Address................................................................................................................................405
Congurations Using UDP Helper............................................................................................................................... 405
UDP Helper with Broadcast-All Addresses.................................................................................................................405
UDP Helper with Subnet Broadcast Addresses.........................................................................................................406
UDP Helper with Congured Broadcast Addresses..................................................................................................406
UDP Helper with No Congured Broadcast Addresses............................................................................................407
Troubleshooting UDP Helper........................................................................................................................................ 407
21 IPv6 Routing............................................................................................................................................ 408
Protocol Overview.........................................................................................................................................................408
Extended Address Space........................................................................................................................................409
Stateless Autoconguration................................................................................................................................... 409
IPv6 Headers............................................................................................................................................................409
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support.................................................................... 410
IPv6 Header Fields.................................................................................................................................................... 411
Extension Header Fields.......................................................................................................................................... 413
Addressing.................................................................................................................................................................414
Implementing IPv6 with Dell Networking OS..............................................................................................................415
ICMPv6............................................................................................................................................................................416
Path MTU Discovery......................................................................................................................................................417
IPv6 Neighbor Discovery............................................................................................................................................... 417
IPv6 Neighbor Discovery of MTU Packets........................................................................................................... 418
Conguring the IPv6 Recursive DNS Server........................................................................................................418
Debugging IPv6 RDNSS Information Sent to the Host ......................................................................................419
Displaying IPv6 RDNSS Information.......................................................................................................................419
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 420
Conguration Tasks for IPv6........................................................................................................................................ 420
Adjusting Your CAM-Prole....................................................................................................................................420
Assigning an IPv6 Address to an Interface............................................................................................................421
Assigning a Static IPv6 Route................................................................................................................................422
Conguring Telnet with IPv6..................................................................................................................................422
SNMP over IPv6......................................................................................................................................................422
Displaying IPv6 Information.................................................................................................................................... 423
Displaying an IPv6 Interface Information.............................................................................................................. 423
Showing IPv6 Routes.............................................................................................................................................. 424
Showing the Running-Conguration for an Interface.........................................................................................425
Clearing IPv6 Routes...............................................................................................................................................426
Contents
15
Disabling ND Entry Timeout................................................................................................................................... 426
Conguring IPv6 RA Guard.......................................................................................................................................... 426
Conguring IPv6 RA Guard on an Interface.........................................................................................................428
Monitoring IPv6 RA Guard......................................................................................................................................429
22 iSCSI Optimization...................................................................................................................................430
iSCSI Optimization Overview.......................................................................................................................................430
Monitoring iSCSI Trac Flows...............................................................................................................................432
Application of Quality of Service to iSCSI Trac Flows......................................................................................432
Information Monitored in iSCSI Trac Flows.......................................................................................................432
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 433
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................433
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................434
Enable and Disable iSCSI Optimization................................................................................................................. 434
Default iSCSI Optimization Values...............................................................................................................................435
iSCSI Optimization Prerequisites................................................................................................................................. 435
Conguring iSCSI Optimization................................................................................................................................... 435
Displaying iSCSI Optimization Information..................................................................................................................437
23 Intermediate System to Intermediate System.......................................................................................... 439
IS-IS Protocol Overview................................................................................................................................................439
IS-IS Addressing.............................................................................................................................................................439
Multi-Topology IS-IS...................................................................................................................................................... 440
Transition Mode....................................................................................................................................................... 440
Interface Support..................................................................................................................................................... 441
Adjacencies................................................................................................................................................................441
Graceful Restart............................................................................................................................................................. 441
Timers........................................................................................................................................................................ 441
Implementation Information.......................................................................................................................................... 441
Conguration Information.............................................................................................................................................442
Conguration Tasks for IS-IS..................................................................................................................................443
Conguring the Distance of a Route.....................................................................................................................450
Changing the IS-Type...............................................................................................................................................451
Redistributing IPv4 Routes.....................................................................................................................................453
Redistributing IPv6 Routes.....................................................................................................................................454
Conguring Authentication Passwords.................................................................................................................455
Setting the Overload Bit.........................................................................................................................................455
Debugging IS-IS.......................................................................................................................................................456
IS-IS Metric Styles.........................................................................................................................................................457
Congure Metric Values................................................................................................................................................457
Maximum Values in the Routing Table...................................................................................................................457
Change the IS-IS Metric Style in One Level Only................................................................................................457
Leaks from One Level to Another..........................................................................................................................459
Sample Congurations..................................................................................................................................................460
24 Link Aggregation Control Protocol (LACP).............................................................................................. 462
16
Contents
Introduction to Dynamic LAGs and LACP.................................................................................................................. 462
Important Points to Remember............................................................................................................................. 462
LACP Modes............................................................................................................................................................ 463
Conguring LACP Commands............................................................................................................................... 463
LACP Conguration Tasks............................................................................................................................................ 464
Creating a LAG.........................................................................................................................................................464
Conguring the LAG Interfaces as Dynamic........................................................................................................ 464
Setting the LACP Long Timeout........................................................................................................................... 465
Monitoring and Debugging LACP..........................................................................................................................465
Shared LAG State Tracking.......................................................................................................................................... 466
Conguring Shared LAG State Tracking...............................................................................................................466
Important Points about Shared LAG State Tracking........................................................................................... 468
LACP Basic Conguration Example............................................................................................................................ 468
Congure a LAG on ALPHA................................................................................................................................... 468
25 Layer 2.....................................................................................................................................................477
Manage the MAC Address Table..................................................................................................................................477
Clearing the MAC Address Table............................................................................................................................477
Setting the Aging Time for Dynamic Entries........................................................................................................ 477
Conguring a Static MAC Address........................................................................................................................ 478
Displaying the MAC Address Table........................................................................................................................ 478
MAC Learning Limit....................................................................................................................................................... 478
Setting the MAC Learning Limit.............................................................................................................................479
mac learning-limit Dynamic.....................................................................................................................................479
mac learning-limit mac-address-sticky..................................................................................................................479
mac learning-limit station-move............................................................................................................................ 480
mac learning-limit no-station-move...................................................................................................................... 480
Learning Limit Violation Actions.............................................................................................................................480
Setting Station Move Violation Actions................................................................................................................. 481
Recovering from Learning Limit and Station Move Violations............................................................................481
NIC Teaming................................................................................................................................................................... 482
Congure Redundant Pairs...........................................................................................................................................483
Important Points about Conguring Redundant Pairs........................................................................................ 485
Far-End Failure Detection.............................................................................................................................................486
FEFD State Changes............................................................................................................................................... 487
Conguring FEFD.................................................................................................................................................... 488
Enabling FEFD on an Interface...............................................................................................................................488
Debugging FEFD......................................................................................................................................................489
26 Link Layer Discovery Protocol (LLDP)......................................................................................................491
802.1AB (LLDP) Overview............................................................................................................................................ 491
Protocol Data Units..................................................................................................................................................491
Optional TLVs................................................................................................................................................................. 492
Management TLVs...................................................................................................................................................492
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 494
TIA Organizationally Specic TLVs........................................................................................................................ 494
Contents
17
Congure LLDP..............................................................................................................................................................498
Related Conguration Tasks...................................................................................................................................498
Important Points to Remember............................................................................................................................. 498
LLDP Compatibility..................................................................................................................................................499
CONFIGURATION versus INTERFACE Congurations............................................................................................ 499
Enabling LLDP................................................................................................................................................................499
Disabling and Undoing LLDP..................................................................................................................................500
Enabling LLDP on Management Ports........................................................................................................................500
Disabling and Undoing LLDP on Management Ports..........................................................................................500
Advertising TLVs............................................................................................................................................................500
Viewing the LLDP Conguration................................................................................................................................. 502
Viewing Information Advertised by Adjacent LLDP Agents..................................................................................... 502
Conguring LLDPDU Intervals.....................................................................................................................................503
Conguring Transmit and Receive Mode................................................................................................................... 504
Conguring the Time to Live Value............................................................................................................................. 504
Debugging LLDP............................................................................................................................................................505
Relevant Management Objects................................................................................................................................... 506
27 Microsoft Network Load Balancing............................................................................................................511
NLB Unicast Mode Scenario..........................................................................................................................................511
NLB Multicast Mode Scenario.......................................................................................................................................511
Limitations of the NLB Feature.....................................................................................................................................512
Microsoft Clustering.......................................................................................................................................................512
Enable and Disable VLAN Flooding ............................................................................................................................. 512
Conguring a Switch for NLB ......................................................................................................................................512
Enabling a Switch for Multicast NLB..................................................................................................................... 513
28 Multicast Source Discovery Protocol (MSDP)..........................................................................................514
Protocol Overview..........................................................................................................................................................514
Anycast RP......................................................................................................................................................................515
Implementation Information.......................................................................................................................................... 516
Congure Multicast Source Discovery Protocol.........................................................................................................516
Related Conguration Tasks....................................................................................................................................516
Enable MSDP................................................................................................................................................................. 520
Manage the Source-Active Cache...............................................................................................................................521
Viewing the Source-Active Cache......................................................................................................................... 521
Limiting the Source-Active Cache..........................................................................................................................521
Clearing the Source-Active Cache........................................................................................................................ 522
Enabling the Rejected Source-Active Cache....................................................................................................... 522
Accept Source-Active Messages that Fail the RFP Check......................................................................................522
Specifying Source-Active Messages...........................................................................................................................525
Limiting the Source-Active Messages from a Peer...................................................................................................526
Preventing MSDP from Caching a Local Source.......................................................................................................526
Preventing MSDP from Caching a Remote Source...................................................................................................527
Preventing MSDP from Advertising a Local Source..................................................................................................527
Logging Changes in Peership States...........................................................................................................................528
18
Contents
Terminating a Peership..................................................................................................................................................528
Clearing Peer Statistics.................................................................................................................................................529
Debugging MSDP.......................................................................................................................................................... 529
MSDP with Anycast RP................................................................................................................................................530
Conguring Anycast RP................................................................................................................................................ 531
Reducing Source-Active Message Flooding.........................................................................................................532
Specifying the RP Address Used in SA Messages.............................................................................................. 532
MSDP Sample Congurations......................................................................................................................................534
29 Multiple Spanning Tree Protocol (MSTP).................................................................................................537
Protocol Overview......................................................................................................................................................... 537
Spanning Tree Variations.............................................................................................................................................. 538
Implementation Information....................................................................................................................................538
Congure Multiple Spanning Tree Protocol................................................................................................................538
Related Conguration Tasks...................................................................................................................................539
Enable Multiple Spanning Tree Globally...................................................................................................................... 539
Adding and Removing Interfaces.................................................................................................................................539
Creating Multiple Spanning Tree Instances................................................................................................................ 540
Inuencing MSTP Root Selection................................................................................................................................ 541
Interoperate with Non-Dell Bridges.............................................................................................................................542
Changing the Region Name or Revision..................................................................................................................... 542
Modifying Global Parameters....................................................................................................................................... 542
Modifying the Interface Parameters............................................................................................................................544
Conguring an EdgePort.............................................................................................................................................. 545
Flush MAC Addresses after a Topology Change....................................................................................................... 545
MSTP Sample Congurations......................................................................................................................................546
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................546
Debugging and Verifying MSTP Congurations........................................................................................................ 550
30 Multicast Features...................................................................................................................................552
Enabling IP Multicast.....................................................................................................................................................552
Implementation Information......................................................................................................................................... 552
Multicast Policies...........................................................................................................................................................553
IPv4 Multicast Policies............................................................................................................................................553
Understanding Multicast Traceroute (mtrace).......................................................................................................... 560
Important Points to Remember..............................................................................................................................561
Printing Multicast Traceroute (mtrace) Paths............................................................................................................561
Supported Error Codes.................................................................................................................................................562
mtrace Scenarios...........................................................................................................................................................563
31 Object Tracking........................................................................................................................................ 569
Object Tracking Overview............................................................................................................................................ 569
Track Layer 2 Interfaces..........................................................................................................................................570
Track Layer 3 Interfaces..........................................................................................................................................570
Track IPv4 and IPv6 Routes.................................................................................................................................... 571
Contents
19
Set Tracking Delays..................................................................................................................................................572
VRRP Object Tracking.............................................................................................................................................572
Object Tracking Conguration......................................................................................................................................572
Tracking a Layer 2 Interface................................................................................................................................... 572
Tracking a Layer 3 Interface................................................................................................................................... 573
Track an IPv4/IPv6 Route...................................................................................................................................... 575
Displaying Tracked Objects........................................................................................................................................... 578
32 Open Shortest Path First (OSPFv2 and OSPFv3)....................................................................................580
Protocol Overview.........................................................................................................................................................580
Autonomous System (AS) Areas........................................................................................................................... 580
Area Types................................................................................................................................................................. 581
Networks and Neighbors........................................................................................................................................582
Router Types............................................................................................................................................................ 582
Designated and Backup Designated Routers....................................................................................................... 584
Link-State Advertisements (LSAs)........................................................................................................................584
Router Priority and Cost.........................................................................................................................................585
OSPF with Dell Networking OS...................................................................................................................................586
Graceful Restart.......................................................................................................................................................587
Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................588
Multi-Process OSPFv2 with VRF..........................................................................................................................588
RFC-2328 Compliant OSPF Flooding................................................................................................................... 588
OSPF ACK Packing................................................................................................................................................. 589
Setting OSPF Adjacency with Cisco Routers...................................................................................................... 589
Conguration Information.............................................................................................................................................590
Conguration Task List for OSPFv2 (OSPF for IPv4)........................................................................................ 590
Conguration Task List for OSPFv3 (OSPF for IPv6).............................................................................................. 604
Enabling IPv6 Unicast Routing.............................................................................................................................. 605
Applying cost for OSPFv3......................................................................................................................................605
Assigning IPv6 Addresses on an Interface........................................................................................................... 606
Assigning Area ID on an Interface..........................................................................................................................606
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................606
Assigning OSPFv3 Process ID and Router ID to a VRF...................................................................................... 607
Conguring Stub Areas........................................................................................................................................... 607
Conguring Passive-Interface................................................................................................................................608
Redistributing Routes..............................................................................................................................................608
Conguring a Default Route...................................................................................................................................608
Enabling OSPFv3 Graceful Restart.......................................................................................................................609
OSPFv3 Authentication Using IPsec...................................................................................................................... 611
Troubleshooting OSPFv3.........................................................................................................................................617
33 Policy-based Routing (PBR).....................................................................................................................619
Overview......................................................................................................................................................................... 619
Implementing PBR.........................................................................................................................................................620
Conguration Task List for Policy-based Routing......................................................................................................620
PBR Exceptions (Permit)........................................................................................................................................ 621
20
Contents
/