PowerSwitch S3048-ON

Dell PowerSwitch S3048-ON Administrator Guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S3048-ON Administrator Guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S3048–ON
System
9.11(2.5)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 10
Rev. A00
Contents
1 About this Guide...........................................................................................................................................33
Audience............................................................................................................................................................................33
Conventions......................................................................................................................................................................33
Related Documents......................................................................................................................................................... 33
2 Conguration Fundamentals........................................................................................................................ 34
Accessing the Command Line........................................................................................................................................34
CLI Modes.........................................................................................................................................................................34
Navigating CLI Modes...............................................................................................................................................36
The do Command............................................................................................................................................................ 39
Undoing Commands........................................................................................................................................................ 39
Obtaining Help..................................................................................................................................................................40
Entering and Editing Commands................................................................................................................................... 40
Command History.............................................................................................................................................................41
Filtering show Command Outputs..................................................................................................................................41
Example of the grep Keyword................................................................................................................................... 41
Multiple Users in Conguration Mode...........................................................................................................................42
3 Getting Started............................................................................................................................................44
Console Access................................................................................................................................................................45
Serial Console.............................................................................................................................................................45
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................46
Entering CLI commands Using an SSH Connection..............................................................................................46
Executing Local CLI Scripts Using an SSH Connection........................................................................................46
Default Conguration.......................................................................................................................................................47
Conguring a Host Name................................................................................................................................................47
Accessing the System Remotely....................................................................................................................................47
Accessing the System Remotely..............................................................................................................................47
Congure the Management Port IP Address......................................................................................................... 47
Congure a Management Route..............................................................................................................................48
Conguring a Username and Password..................................................................................................................48
Conguring the Enable Password..................................................................................................................................48
Conguration File Management.....................................................................................................................................49
Copy Files to and from the System......................................................................................................................... 49
Mounting an NFS File System..................................................................................................................................50
Save the Running-Conguration.............................................................................................................................. 51
Congure the Overload Bit for a Startup Scenario............................................................................................... 52
Viewing Files...............................................................................................................................................................52
Compressing Conguration Files............................................................................................................................. 53
Managing the File System.............................................................................................................................................. 56
Enabling Software Features on Devices Using a Command Option......................................................................... 56
View Command History...................................................................................................................................................57
Contents
3
Upgrading Dell Networking OS.......................................................................................................................................57
Verify Software Images Before Installation...................................................................................................................57
Using HTTP for File Transfers........................................................................................................................................ 58
4 Management............................................................................................................................................... 60
Conguring Privilege Levels........................................................................................................................................... 60
Creating a Custom Privilege Level............................................................................................................................61
Removing a Command from EXEC Mode............................................................................................................... 61
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................ 61
Allowing Access to CONFIGURATION Mode Commands.....................................................................................61
Allowing Access to Dierent Modes........................................................................................................................ 61
Applying a Privilege Level to a Username............................................................................................................... 63
Applying a Privilege Level to a Terminal Line.......................................................................................................... 63
Conguring Logging........................................................................................................................................................ 63
Audit and Security Logs............................................................................................................................................ 64
Conguring Logging Format ...................................................................................................................................66
Display the Logging Buer and the Logging Conguration..................................................................................66
Setting Up a Secure Connection to a Syslog Server.............................................................................................67
Sending System Messages to a Syslog Server......................................................................................................68
Track Login Activity......................................................................................................................................................... 68
Restrictions for Tracking Login Activity...................................................................................................................68
Conguring Login Activity Tracking......................................................................................................................... 68
Display Login Statistics..............................................................................................................................................69
Limit Concurrent Login Sessions....................................................................................................................................70
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................70
Conguring Concurrent Session Limit......................................................................................................................71
Enabling the System to Clear Existing Sessions..................................................................................................... 71
Enabling Secured CLI Mode............................................................................................................................................72
Log Messages in the Internal Buer..............................................................................................................................72
Conguration Task List for System Log Management.......................................................................................... 72
Disabling System Logging............................................................................................................................................... 72
Sending System Messages to a Syslog Server............................................................................................................ 73
Conguring a UNIX System as a Syslog Server.....................................................................................................73
Changing System Logging Settings...............................................................................................................................73
Display the Logging Buer and the Logging Conguration........................................................................................ 74
Conguring a UNIX Logging Facility Level....................................................................................................................75
Synchronizing Log Messages......................................................................................................................................... 76
Enabling Timestamp on Syslog Messages.................................................................................................................... 76
File Transfer Services.......................................................................................................................................................77
Conguration Task List for File Transfer Services.................................................................................................. 77
Enabling the FTP Server........................................................................................................................................... 77
Conguring FTP Server Parameters........................................................................................................................77
Conguring FTP Client Parameters......................................................................................................................... 78
Terminal Lines................................................................................................................................................................... 78
Denying and Permitting Access to a Terminal Line................................................................................................79
Conguring Login Authentication for Terminal Lines.............................................................................................80
4
Contents
Setting Timeout for EXEC Privilege Mode....................................................................................................................81
Using Telnet to get to Another Network Device...........................................................................................................81
Lock CONFIGURATION Mode....................................................................................................................................... 82
Viewing the Conguration Lock Status...................................................................................................................82
LPC Bus Quality Degradation......................................................................................................................................... 82
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................83
Reloading the system...................................................................................................................................................... 83
5 802.1X......................................................................................................................................................... 85
Port-Authentication Process.......................................................................................................................................... 87
EAP over RADIUS...................................................................................................................................................... 87
Conguring 802.1X...........................................................................................................................................................88
Related Conguration Tasks..................................................................................................................................... 88
Important Points to Remember......................................................................................................................................88
Conguring dot1x Prole ................................................................................................................................................89
Conguring MAC addresses for a do1x Prole.............................................................................................................89
Conguring the Static MAB and MAB Prole .............................................................................................................89
Conguring Critical VLAN ..............................................................................................................................................90
Enabling 802.1X................................................................................................................................................................ 92
Conguring Request Identity Re-Transmissions...........................................................................................................93
Conguring a Quiet Period after a Failed Authentication..................................................................................... 94
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 95
Re-Authenticating a Port................................................................................................................................................95
Conguring Timeouts......................................................................................................................................................96
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................97
Guest and Authentication-Fail VLANs.......................................................................................................................... 98
Conguring a Guest VLAN....................................................................................................................................... 99
Conguring an Authentication-Fail VLAN...............................................................................................................99
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)................................... 101
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................................................................101
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 102
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................102
Conguring ACL VLAN Groups.............................................................................................................................. 102
Conguring FP Blocks for VLAN Parameters.......................................................................................................103
Viewing CAM Usage...................................................................................................................................................... 104
Allocating FP Blocks for VLAN Processes.................................................................................................................. 105
7 Access Control Lists (ACLs)....................................................................................................................... 107
IP Access Control Lists (ACLs).....................................................................................................................................108
CAM Usage...............................................................................................................................................................109
Implementing ACLs on Dell Networking OS..........................................................................................................109
Important Points to Remember......................................................................................................................................111
Conguration Task List for Route Maps..................................................................................................................111
Conguring Match Routes.......................................................................................................................................113
Conguring Set Conditions......................................................................................................................................114
Contents
5
Congure a Route Map for Route Redistribution..................................................................................................115
Congure a Route Map for Route Tagging............................................................................................................ 116
Continue Clause........................................................................................................................................................ 116
IP Fragment Handling..................................................................................................................................................... 117
IP Fragments ACL Examples....................................................................................................................................117
Layer 4 ACL Rules Examples....................................................................................................................................117
Congure a Standard IP ACL.........................................................................................................................................118
Conguring a Standard IP ACL Filter......................................................................................................................119
Congure an Extended IP ACL.....................................................................................................................................120
Conguring Filters with a Sequence Number.......................................................................................................120
Conguring Filters Without a Sequence Number................................................................................................. 121
Congure Layer 2 and Layer 3 ACLs............................................................................................................................122
Assign an IP ACL to an Interface..................................................................................................................................123
Applying an IP ACL.........................................................................................................................................................123
Counting ACL Hits....................................................................................................................................................124
Congure Ingress ACLs................................................................................................................................................. 124
Congure Egress ACLs.................................................................................................................................................. 124
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 125
IP Prex Lists.................................................................................................................................................................. 126
Implementation Information.................................................................................................................................... 126
Conguration Task List for Prex Lists.................................................................................................................. 126
ACL Resequencing......................................................................................................................................................... 130
Resequencing an ACL or Prex List.......................................................................................................................130
Route Maps.....................................................................................................................................................................132
Implementation Information.................................................................................................................................... 132
Logging of ACL Processes............................................................................................................................................ 132
Guidelines for Conguring ACL Logging................................................................................................................133
Conguring ACL Logging.........................................................................................................................................133
Flow-Based Monitoring..................................................................................................................................................134
Behavior of Flow-Based Monitoring.......................................................................................................................134
Enabling Flow-Based Monitoring............................................................................................................................136
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 138
How BFD Works............................................................................................................................................................. 138
BFD Packet Format..................................................................................................................................................139
BFD Sessions............................................................................................................................................................ 140
BFD Three-Way Handshake.....................................................................................................................................141
Session State Changes............................................................................................................................................143
Important Points to Remember.................................................................................................................................... 143
Congure BFD................................................................................................................................................................ 143
Congure BFD for Physical Ports...........................................................................................................................144
Congure BFD for Static Routes............................................................................................................................145
Congure BFD for OSPF.........................................................................................................................................148
Congure BFD for OSPFv3......................................................................................................................................151
Congure BFD for IS-IS...........................................................................................................................................154
Congure BFD for BGP...........................................................................................................................................156
6
Contents
Congure BFD for VRRP.........................................................................................................................................162
Conguring Protocol Liveness................................................................................................................................165
Troubleshooting BFD................................................................................................................................................165
9 Border Gateway Protocol IPv4 (BGPv4).....................................................................................................167
Autonomous Systems (AS)........................................................................................................................................... 167
Sessions and Peers........................................................................................................................................................ 169
Establish a Session...................................................................................................................................................169
Route Reectors.............................................................................................................................................................170
BGP Attributes.................................................................................................................................................................171
Best Path Selection Criteria.....................................................................................................................................171
Weight........................................................................................................................................................................173
Local Preference....................................................................................................................................................... 173
Multi-Exit Discriminators (MEDs)........................................................................................................................... 174
Origin..........................................................................................................................................................................175
AS Path......................................................................................................................................................................176
Next Hop................................................................................................................................................................... 176
Multiprotocol BGP..........................................................................................................................................................176
Implement BGP with Dell Networking OS................................................................................................................... 177
Additional Path (Add-Path) Support...................................................................................................................... 177
Advertise IGP Cost as MED for Redistributed Routes.........................................................................................177
Ignore Router-ID in Best-Path Calculation............................................................................................................ 178
Four-Byte AS Numbers............................................................................................................................................178
AS4 Number Representation.................................................................................................................................. 178
AS Number Migration.............................................................................................................................................. 180
BGP4 Management Information Base (MIB).........................................................................................................181
Important Points to Remember...............................................................................................................................181
Conguration Information..............................................................................................................................................182
BGP Conguration......................................................................................................................................................... 182
Enabling BGP............................................................................................................................................................ 183
Conguring AS4 Number Representations........................................................................................................... 186
Conguring Peer Groups.........................................................................................................................................188
Conguring BGP Fast Fall-Over.............................................................................................................................190
Conguring Passive Peering................................................................................................................................... 192
Maintaining Existing AS Numbers During an AS Migration................................................................................. 192
Allowing an AS Number to Appear in its Own AS Path....................................................................................... 193
Enabling Graceful Restart........................................................................................................................................194
Enabling Neighbor Graceful Restart...................................................................................................................... 195
Filtering on an AS-Path Attribute........................................................................................................................... 195
Regular Expressions as Filters.................................................................................................................................197
Redistributing Routes...............................................................................................................................................198
Enabling Additional Paths........................................................................................................................................ 199
Conguring IP Community Lists.............................................................................................................................199
Conguring an IP Extended Community List....................................................................................................... 200
Filtering Routes with Community Lists..................................................................................................................201
Manipulating the COMMUNITY Attribute............................................................................................................ 202
Contents
7
Changing MED Attributes.......................................................................................................................................203
Changing the LOCAL_PREFERENCE Attribute..................................................................................................203
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............ 204
Changing the WEIGHT Attribute...........................................................................................................................205
Enabling Multipath...................................................................................................................................................205
Filtering BGP Routes...............................................................................................................................................205
Filtering BGP Routes Using Route Maps..............................................................................................................207
Filtering BGP Routes Using AS-PATH Information..............................................................................................207
Conguring BGP Route Reectors........................................................................................................................208
Aggregating Routes.................................................................................................................................................209
Conguring BGP Confederations.......................................................................................................................... 209
Enabling Route Flap Dampening.............................................................................................................................210
Changing BGP Timers..............................................................................................................................................212
Enabling BGP Neighbor Soft-Reconguration......................................................................................................212
Enabling or disabling BGP neighbors......................................................................................................................213
Route Map Continue................................................................................................................................................215
Enabling MBGP Congurations.................................................................................................................................... 215
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor..........................................216
BGP Regular Expression Optimization.........................................................................................................................216
Debugging BGP.............................................................................................................................................................. 216
Storing Last and Bad PDUs.....................................................................................................................................217
Capturing PDUs........................................................................................................................................................218
PDU Counters...........................................................................................................................................................219
Sample Congurations...................................................................................................................................................219
10 Content Addressable Memory (CAM).......................................................................................................226
CAM Allocation...............................................................................................................................................................226
Test CAM Usage............................................................................................................................................................228
View CAM-ACL Settings.............................................................................................................................................. 228
View CAM Usage...........................................................................................................................................................230
CAM Optimization......................................................................................................................................................... 230
Troubleshoot CAM Proling..........................................................................................................................................230
QoS CAM Region Limitation...................................................................................................................................230
11 Control Plane Policing (CoPP)...................................................................................................................231
Congure Control Plane Policing................................................................................................................................. 232
Conguring CoPP for Protocols............................................................................................................................ 233
Conguring CoPP for CPU Queues...................................................................................................................... 235
CoPP for OSPFv3 Packets.....................................................................................................................................236
Conguring CoPP for OSPFv3.............................................................................................................................. 239
Displaying CoPP Conguration ............................................................................................................................. 239
12 Dynamic Host Conguration Protocol (DHCP)......................................................................................... 242
DHCP Packet Format and Options..............................................................................................................................242
Assign an IP Address using DHCP...............................................................................................................................244
Implementation Information..........................................................................................................................................245
8
Contents
Congure the System to be a DHCP Server..............................................................................................................245
Conguring the Server for Automatic Address Allocation..................................................................................246
Specifying a Default Gateway................................................................................................................................ 247
Congure a Method of Hostname Resolution......................................................................................................247
Using DNS for Address Resolution........................................................................................................................ 247
Using NetBIOS WINS for Address Resolution......................................................................................................248
Creating Manual Binding Entries............................................................................................................................248
Debugging the DHCP Server................................................................................................................................. 248
Using DHCP Clear Commands...............................................................................................................................249
Congure the System to be a Relay Agent................................................................................................................ 249
Congure the System to be a DHCP Client................................................................................................................251
Conguring the DHCP Client System....................................................................................................................251
DHCP Client on a Management Interface............................................................................................................252
DHCP Client Operation with Other Features.......................................................................................................253
Congure the System for User Port Stacking (Option 230)....................................................................................254
Congure Secure DHCP...............................................................................................................................................254
Option 82..................................................................................................................................................................254
DHCP Snooping.......................................................................................................................................................255
Drop DHCP Packets on Snooped VLANs Only....................................................................................................258
Dynamic ARP Inspection........................................................................................................................................ 259
Conguring Dynamic ARP Inspection................................................................................................................... 260
Source Address Validation............................................................................................................................................. 261
Enabling IP Source Address Validation...................................................................................................................261
DHCP MAC Source Address Validation................................................................................................................ 262
Enabling IP+MAC Source Address Validation.......................................................................................................262
Viewing the Number of SAV Dropped Packets....................................................................................................263
Clearing the Number of SAV Dropped Packets................................................................................................... 263
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 264
ECMP for Flow-Based Anity.....................................................................................................................................264
Conguring the Hash Algorithm............................................................................................................................ 264
Enabling Deterministic ECMP Next Hop.............................................................................................................. 264
Conguring the Hash Algorithm Seed.................................................................................................................. 265
Link Bundle Monitoring................................................................................................................................................. 265
Managing ECMP Group Paths...............................................................................................................................266
Creating an ECMP Group Bundle..........................................................................................................................266
Modifying the ECMP Group Threshold.................................................................................................................266
14 FIPS Cryptography...................................................................................................................................268
Conguration Tasks....................................................................................................................................................... 268
Preparing the System....................................................................................................................................................268
Enabling FIPS Mode...................................................................................................................................................... 269
Generating Host-Keys...................................................................................................................................................269
Monitoring FIPS Mode Status......................................................................................................................................269
Disabling FIPS Mode......................................................................................................................................................270
Contents
9
15 Force10 Resilient Ring Protocol (FRRP)....................................................................................................271
Protocol Overview..........................................................................................................................................................271
Ring Status............................................................................................................................................................... 272
Multiple FRRP Rings................................................................................................................................................272
Important FRRP Points........................................................................................................................................... 273
Important FRRP Concepts......................................................................................................................................274
Implementing FRRP.......................................................................................................................................................275
FRRP Conguration.......................................................................................................................................................275
Creating the FRRP Group.......................................................................................................................................275
Conguring the Control VLAN............................................................................................................................... 276
Conguring and Adding the Member VLANs....................................................................................................... 277
Setting the FRRP Timers........................................................................................................................................ 278
Clearing the FRRP Counters.................................................................................................................................. 278
Viewing the FRRP Conguration........................................................................................................................... 278
Viewing the FRRP Information...............................................................................................................................278
Troubleshooting FRRP...................................................................................................................................................279
Conguration Checks..............................................................................................................................................279
Sample Conguration and Topology............................................................................................................................ 279
FRRP Support on VLT...................................................................................................................................................280
Example Scenario..................................................................................................................................................... 281
Important Points to Remember..............................................................................................................................282
16 GARP VLAN Registration Protocol (GVRP)..............................................................................................283
Important Points to Remember....................................................................................................................................283
Congure GVRP............................................................................................................................................................ 284
Related Conguration Tasks................................................................................................................................... 284
Enabling GVRP Globally................................................................................................................................................ 285
Enabling GVRP on a Layer 2 Interface........................................................................................................................285
Congure GVRP Registration...................................................................................................................................... 285
Congure a GARP Timer.............................................................................................................................................. 286
RPM Redundancy..........................................................................................................................................................286
17 High Availability (HA)................................................................................................................................288
Component Redundancy.............................................................................................................................................. 288
Automatic and Manual Stack Unit Failover.......................................................................................................... 288
Synchronization between Management and Standby Units..............................................................................289
Forcing a Stack Unit Failover................................................................................................................................. 289
Specifying an Auto-Failover Limit..........................................................................................................................290
Disabling Auto-Reboot............................................................................................................................................ 290
Manually Synchronizing Management and Standby Units.................................................................................290
Pre-Conguring a Stack Unit Slot............................................................................................................................... 290
Removing a Provisioned Logical Stack Unit............................................................................................................... 290
Hitless Behavior..............................................................................................................................................................291
Graceful Restart............................................................................................................................................................. 291
Software Resiliency........................................................................................................................................................291
10
Contents
Software Component Health Monitoring..............................................................................................................291
System Health Monitoring.......................................................................................................................................291
Failure and Event Logging.......................................................................................................................................292
Hot-Lock Behavior.........................................................................................................................................................292
18 Internet Group Management Protocol (IGMP)......................................................................................... 293
IGMP Implementation Information...............................................................................................................................293
IGMP Protocol Overview..............................................................................................................................................293
IGMP Version 2........................................................................................................................................................ 293
IGMP Version 3........................................................................................................................................................295
Congure IGMP............................................................................................................................................................. 298
Related Conguration Tasks...................................................................................................................................298
Viewing IGMP Enabled Interfaces...............................................................................................................................299
Selecting an IGMP Version...........................................................................................................................................299
Viewing IGMP Groups...................................................................................................................................................299
Adjusting Timers............................................................................................................................................................ 300
Adjusting Query and Response Timers................................................................................................................. 300
Preventing a Host from Joining a Group..................................................................................................................... 301
Enabling IGMP Immediate-Leave................................................................................................................................ 304
IGMP Snooping..............................................................................................................................................................304
IGMP Snooping Implementation Information.......................................................................................................304
Conguring IGMP Snooping...................................................................................................................................304
Removing a Group-Port Association.....................................................................................................................305
Disabling Multicast Flooding...................................................................................................................................305
Specifying a Port as Connected to a Multicast Router...................................................................................... 306
Conguring the Switch as Querier........................................................................................................................ 306
Fast Convergence after MSTP Topology Changes................................................................................................... 307
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................307
Protocol Separation................................................................................................................................................. 307
Enabling and Disabling Management Egress Interface Selection...................................................................... 308
Handling of Management Route Conguration...................................................................................................309
Handling of Switch-Initiated Trac........................................................................................................................310
Handling of Switch-Destined Trac...................................................................................................................... 310
Handling of Transit Trac (Trac Separation)......................................................................................................311
Mapping of Management Applications and Trac Type...................................................................................... 311
Behavior of Various Applications for Switch-Initiated Trac .............................................................................312
Behavior of Various Applications for Switch-Destined Trac ........................................................................... 313
Interworking of EIS With Various Applications......................................................................................................314
Designating a Multicast Router Interface....................................................................................................................314
19 Interfaces..................................................................................................................................................316
Basic Interface Conguration........................................................................................................................................316
Advanced Interface Conguration................................................................................................................................316
Interface Types................................................................................................................................................................317
View Basic Interface Information..................................................................................................................................317
Resetting an Interface to its Factory Default State................................................................................................... 319
Contents
11
Enabling a Physical Interface.........................................................................................................................................319
Enabling Energy Ecient Ethernet..............................................................................................................................320
View EEE Information................................................................................................................................................... 320
Clear EEE Counters.......................................................................................................................................................325
Physical Interfaces.........................................................................................................................................................325
Conguration Task List for Physical Interfaces....................................................................................................325
Overview of Layer Modes...................................................................................................................................... 326
Conguring Layer 2 (Data Link) Mode..................................................................................................................326
Conguring Layer 2 (Interface) Mode...................................................................................................................327
Conguring Layer 3 (Network) Mode...................................................................................................................327
Conguring Layer 3 (Interface) Mode...................................................................................................................327
Egress Interface Selection (EIS)..................................................................................................................................328
Important Points to Remember..............................................................................................................................328
Conguring EIS........................................................................................................................................................ 328
Management Interfaces................................................................................................................................................329
Conguring Management Interfaces.....................................................................................................................329
Conguring a Management Interface on an Ethernet Port............................................................................... 330
VLAN Interfaces............................................................................................................................................................. 331
Loopback Interfaces...................................................................................................................................................... 332
Null Interfaces................................................................................................................................................................ 332
Port Channel Interfaces................................................................................................................................................ 333
Port Channel Denition and Standards.................................................................................................................333
Port Channel Benets............................................................................................................................................. 333
Port Channel Implementation.................................................................................................................................333
Interfaces in Port Channels.................................................................................................................................... 334
Conguration Tasks for Port Channel Interfaces.................................................................................................334
Creating a Port Channel..........................................................................................................................................334
Adding a Physical Interface to a Port Channel.....................................................................................................335
Reassigning an Interface to a New Port Channel................................................................................................336
Conguring the Minimum Oper Up Links in a Port Channel...............................................................................337
Adding or Removing a Port Channel from a VLAN..............................................................................................337
Assigning an IP Address to a Port Channel.......................................................................................................... 339
Deleting or Disabling a Port Channel.....................................................................................................................339
Load Balancing Through Port Channels................................................................................................................339
Changing the Hash Algorithm................................................................................................................................339
Bulk Conguration.......................................................................................................................................................... 341
Interface Range........................................................................................................................................................ 341
Bulk Conguration Examples.................................................................................................................................. 341
Dening Interface Range Macros................................................................................................................................ 343
Dene the Interface Range.................................................................................................................................... 343
Choosing an Interface-Range Macro.................................................................................................................... 343
Monitoring and Maintaining Interfaces........................................................................................................................343
Maintenance Using TDR......................................................................................................................................... 344
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................345
Link Dampening..............................................................................................................................................................345
12
Contents
Important Points to Remember............................................................................................................................. 346
Enabling Link Dampening........................................................................................................................................346
Link Bundle Monitoring..................................................................................................................................................347
Using Ethernet Pause Frames for Flow Control........................................................................................................ 348
Enabling Pause Frames........................................................................................................................................... 349
Congure the MTU Size on an Interface....................................................................................................................349
Port-Pipes.......................................................................................................................................................................350
Auto-Negotiation on Ethernet Interfaces...................................................................................................................350
Setting the Speed of Ethernet Interfaces............................................................................................................350
Set Auto-Negotiation Options................................................................................................................................352
View Advanced Interface Information.........................................................................................................................352
Conguring the Interface Sampling Size.............................................................................................................. 353
Conguring the Trac Sampling Size Globally...........................................................................................................354
Dynamic Counters......................................................................................................................................................... 356
Clearing Interface Counters................................................................................................................................... 356
20 Internet Protocol Security (IPSec).......................................................................................................... 358
Conguring IPSec .........................................................................................................................................................358
21 IPv4 Routing............................................................................................................................................ 360
IP Addresses....................................................................................................................................................................361
Implementation Information.................................................................................................................................... 361
Conguration Tasks for IP Addresses.......................................................................................................................... 361
Assigning IP Addresses to an Interface........................................................................................................................361
Conguring Static Routes.............................................................................................................................................362
Congure Static Routes for the Management Interface..........................................................................................363
IPv4 Path MTU Discovery Overview.......................................................................................................................... 364
Using the Congured Source IP Address in ICMP Messages..................................................................................364
Conguring the ICMP Source Interface............................................................................................................... 364
Conguring the Duration to Establish a TCP Connection........................................................................................ 365
Enabling Directed Broadcast........................................................................................................................................ 365
Resolution of Host Names............................................................................................................................................365
Enabling Dynamic Resolution of Host Names............................................................................................................366
Specifying the Local System Domain and a List of Domains................................................................................... 366
Conguring DNS with Traceroute................................................................................................................................367
ARP..................................................................................................................................................................................367
Conguration Tasks for ARP........................................................................................................................................ 368
Conguring Static ARP Entries....................................................................................................................................368
Enabling Proxy ARP.......................................................................................................................................................368
Clearing ARP Cache......................................................................................................................................................369
ARP Learning via Gratuitous ARP............................................................................................................................... 369
Enabling ARP Learning via Gratuitous ARP................................................................................................................369
ARP Learning via ARP Request................................................................................................................................... 369
Conguring ARP Retries............................................................................................................................................... 370
ICMP................................................................................................................................................................................ 371
Conguration Tasks for ICMP....................................................................................................................................... 371
Contents
13
Enabling ICMP Unreachable Messages....................................................................................................................... 371
UDP Helper......................................................................................................................................................................371
Congure UDP Helper..............................................................................................................................................371
Important Points to Remember..............................................................................................................................372
Enabling UDP Helper..................................................................................................................................................... 372
Conguring a Broadcast Address.................................................................................................................................372
Congurations Using UDP Helper................................................................................................................................373
UDP Helper with Broadcast-All Addresses................................................................................................................. 373
UDP Helper with Subnet Broadcast Addresses......................................................................................................... 374
UDP Helper with Congured Broadcast Addresses.................................................................................................. 374
UDP Helper with No Congured Broadcast Addresses............................................................................................375
Troubleshooting UDP Helper........................................................................................................................................ 375
22 IPv6 Routing............................................................................................................................................ 376
Protocol Overview......................................................................................................................................................... 376
Extended Address Space........................................................................................................................................ 377
Stateless Autoconguration....................................................................................................................................377
IPv6 Headers............................................................................................................................................................ 377
IPv6 Header Fields...................................................................................................................................................378
Extension Header Fields......................................................................................................................................... 380
Addressing.................................................................................................................................................................381
Implementing IPv6 with Dell Networking OS............................................................................................................. 382
ICMPv6...........................................................................................................................................................................383
Path MTU Discovery.....................................................................................................................................................384
IPv6 Neighbor Discovery.............................................................................................................................................. 384
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................385
Conguration Task List for IPv6 RDNSS.................................................................................................................... 385
Conguring the IPv6 Recursive DNS Server....................................................................................................... 385
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................386
Displaying IPv6 RDNSS Information......................................................................................................................387
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 387
Conguration Tasks for IPv6........................................................................................................................................ 388
Adjusting Your CAM-Prole....................................................................................................................................388
Assigning an IPv6 Address to an Interface...........................................................................................................389
Assigning a Static IPv6 Route................................................................................................................................389
Conguring Telnet with IPv6..................................................................................................................................390
SNMP over IPv6......................................................................................................................................................390
Displaying IPv6 Information....................................................................................................................................390
Displaying an IPv6 Interface Information...............................................................................................................391
Showing IPv6 Routes...............................................................................................................................................391
Showing the Running-Conguration for an Interface.........................................................................................393
Clearing IPv6 Routes...............................................................................................................................................393
Disabling ND Entry Timeout................................................................................................................................... 393
Conguring IPv6 RA Guard.......................................................................................................................................... 394
Conguring IPv6 RA Guard on an Interface.........................................................................................................395
Monitoring IPv6 RA Guard..................................................................................................................................... 396
14
Contents
23 Intermediate System to Intermediate System...........................................................................................397
IS-IS Protocol Overview................................................................................................................................................397
IS-IS Addressing.............................................................................................................................................................397
Multi-Topology IS-IS...................................................................................................................................................... 398
Transition Mode....................................................................................................................................................... 398
Interface Support.....................................................................................................................................................399
Adjacencies...............................................................................................................................................................399
Graceful Restart............................................................................................................................................................ 399
Timers....................................................................................................................................................................... 399
Implementation Information..........................................................................................................................................399
Conguration Information.............................................................................................................................................400
Conguration Tasks for IS-IS.................................................................................................................................. 401
Conguring the Distance of a Route.....................................................................................................................408
Changing the IS-Type.............................................................................................................................................. 409
Redistributing IPv4 Routes...................................................................................................................................... 411
Redistributing IPv6 Routes......................................................................................................................................412
Conguring Authentication Passwords..................................................................................................................413
Setting the Overload Bit..........................................................................................................................................413
Debugging IS-IS........................................................................................................................................................414
IS-IS Metric Styles......................................................................................................................................................... 415
Congure Metric Values................................................................................................................................................ 415
Maximum Values in the Routing Table................................................................................................................... 415
Change the IS-IS Metric Style in One Level Only.................................................................................................415
Leaks from One Level to Another...........................................................................................................................417
Sample Congurations...................................................................................................................................................418
24 Link Aggregation Control Protocol (LACP).............................................................................................. 420
Introduction to Dynamic LAGs and LACP.................................................................................................................. 420
Important Points to Remember............................................................................................................................. 420
LACP Modes.............................................................................................................................................................421
Conguring LACP Commands................................................................................................................................421
LACP Conguration Tasks............................................................................................................................................ 422
Creating a LAG.........................................................................................................................................................422
Conguring the LAG Interfaces as Dynamic........................................................................................................ 422
Setting the LACP Long Timeout............................................................................................................................423
Monitoring and Debugging LACP.......................................................................................................................... 423
Shared LAG State Tracking.......................................................................................................................................... 424
Conguring Shared LAG State Tracking............................................................................................................... 424
Important Points about Shared LAG State Tracking........................................................................................... 426
LACP Basic Conguration Example.............................................................................................................................426
Congure a LAG on ALPHA................................................................................................................................... 426
25 Layer 2.....................................................................................................................................................435
Manage the MAC Address Table................................................................................................................................. 435
Clearing the MAC Address Table........................................................................................................................... 435
Contents
15
Setting the Aging Time for Dynamic Entries........................................................................................................435
Conguring a Static MAC Address........................................................................................................................436
Displaying the MAC Address Table........................................................................................................................ 436
MAC Learning Limit.......................................................................................................................................................436
Setting the MAC Learning Limit.............................................................................................................................437
mac learning-limit Dynamic.....................................................................................................................................437
mac learning-limit mac-address-sticky..................................................................................................................437
mac learning-limit station-move.............................................................................................................................438
mac learning-limit no-station-move.......................................................................................................................438
Learning Limit Violation Actions.............................................................................................................................438
Setting Station Move Violation Actions................................................................................................................ 439
Recovering from Learning Limit and Station Move Violations........................................................................... 439
Disabling MAC Address Learning on the System.................................................................................................440
NIC Teaming................................................................................................................................................................... 440
Congure Redundant Pairs........................................................................................................................................... 441
Important Points about Conguring Redundant Pairs........................................................................................ 443
Far-End Failure Detection............................................................................................................................................. 444
FEFD State Changes...............................................................................................................................................445
Conguring FEFD.................................................................................................................................................... 446
Enabling FEFD on an Interface...............................................................................................................................446
Debugging FEFD...................................................................................................................................................... 447
26 Link Layer Discovery Protocol (LLDP)..................................................................................................... 449
802.1AB (LLDP) Overview............................................................................................................................................449
Protocol Data Units................................................................................................................................................. 449
Optional TLVs.................................................................................................................................................................450
Management TLVs.................................................................................................................................................. 450
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 452
TIA Organizationally Specic TLVs........................................................................................................................ 452
Congure LLDP............................................................................................................................................................. 456
Related Conguration Tasks...................................................................................................................................456
Important Points to Remember............................................................................................................................. 456
LLDP Compatibility.................................................................................................................................................. 457
CONFIGURATION versus INTERFACE Congurations............................................................................................ 457
Enabling LLDP................................................................................................................................................................ 457
Disabling and Undoing LLDP.................................................................................................................................. 458
Enabling LLDP on Management Ports........................................................................................................................458
Disabling and Undoing LLDP on Management Ports..........................................................................................458
Advertising TLVs............................................................................................................................................................ 458
Viewing the LLDP Conguration................................................................................................................................. 460
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................460
Examples of Viewing Information Advertised by Neighbors............................................................................... 461
Conguring LLDPDU Intervals..................................................................................................................................... 462
Conguring LLDP Notication Interval....................................................................................................................... 463
Conguring Transmit and Receive Mode....................................................................................................................463
Conguring the Time to Live Value............................................................................................................................. 464
16
Contents
Debugging LLDP............................................................................................................................................................465
Relevant Management Objects................................................................................................................................... 466
27 Microsoft Network Load Balancing........................................................................................................... 471
NLB Unicast Mode Scenario.........................................................................................................................................471
NLB Multicast Mode Scenario......................................................................................................................................471
Limitations of the NLB Feature.................................................................................................................................... 472
Microsoft Clustering......................................................................................................................................................472
Enable and Disable VLAN Flooding .............................................................................................................................472
Conguring a Switch for NLB ..................................................................................................................................... 472
Enabling a Switch for Multicast NLB.....................................................................................................................473
28 Multicast Source Discovery Protocol (MSDP)......................................................................................... 474
Protocol Overview......................................................................................................................................................... 474
Anycast RP.....................................................................................................................................................................475
Implementation Information..........................................................................................................................................476
Congure Multicast Source Discovery Protocol........................................................................................................ 476
Related Conguration Tasks................................................................................................................................... 476
Enable MSDP................................................................................................................................................................. 480
Manage the Source-Active Cache............................................................................................................................... 481
Viewing the Source-Active Cache......................................................................................................................... 481
Limiting the Source-Active Cache..........................................................................................................................481
Clearing the Source-Active Cache........................................................................................................................ 482
Enabling the Rejected Source-Active Cache....................................................................................................... 482
Accept Source-Active Messages that Fail the RFP Check......................................................................................482
Specifying Source-Active Messages...........................................................................................................................485
Limiting the Source-Active Messages from a Peer...................................................................................................486
Preventing MSDP from Caching a Local Source.......................................................................................................486
Preventing MSDP from Caching a Remote Source...................................................................................................487
Preventing MSDP from Advertising a Local Source..................................................................................................487
Logging Changes in Peership States...........................................................................................................................488
Terminating a Peership..................................................................................................................................................488
Clearing Peer Statistics.................................................................................................................................................489
Debugging MSDP.......................................................................................................................................................... 489
MSDP with Anycast RP................................................................................................................................................490
Conguring Anycast RP................................................................................................................................................ 491
Reducing Source-Active Message Flooding.........................................................................................................492
Specifying the RP Address Used in SA Messages.............................................................................................. 492
MSDP Sample Congurations......................................................................................................................................494
29 Multiple Spanning Tree Protocol (MSTP).................................................................................................497
Protocol Overview......................................................................................................................................................... 497
Spanning Tree Variations...............................................................................................................................................498
Implementation Information....................................................................................................................................498
Congure Multiple Spanning Tree Protocol................................................................................................................498
Related Conguration Tasks...................................................................................................................................499
Contents
17
Enable Multiple Spanning Tree Globally...................................................................................................................... 499
Adding and Removing Interfaces.................................................................................................................................499
Creating Multiple Spanning Tree Instances................................................................................................................500
Inuencing MSTP Root Selection................................................................................................................................ 501
Interoperate with Non-Dell Bridges..............................................................................................................................501
Changing the Region Name or Revision..................................................................................................................... 502
Modifying Global Parameters.......................................................................................................................................502
Modifying the Interface Parameters........................................................................................................................... 503
Conguring an EdgePort.............................................................................................................................................. 504
Flush MAC Addresses after a Topology Change....................................................................................................... 505
MSTP Sample Congurations......................................................................................................................................505
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................506
Debugging and Verifying MSTP Congurations........................................................................................................ 509
30 Multicast Features.................................................................................................................................... 511
Enabling IP Multicast...................................................................................................................................................... 511
Implementation Information........................................................................................................................................... 511
Multicast Policies............................................................................................................................................................512
IPv4 Multicast Policies.............................................................................................................................................512
Understanding Multicast Traceroute (mtrace)........................................................................................................... 519
Important Points to Remember............................................................................................................................. 520
Printing Multicast Traceroute (mtrace) Paths........................................................................................................... 520
Supported Error Codes..................................................................................................................................................521
mtrace Scenarios...........................................................................................................................................................522
31 Object Tracking........................................................................................................................................ 528
Object Tracking Overview............................................................................................................................................ 528
Track Layer 2 Interfaces..........................................................................................................................................529
Track Layer 3 Interfaces..........................................................................................................................................529
Track IPv4 and IPv6 Routes...................................................................................................................................530
Set Tracking Delays.................................................................................................................................................. 531
VRRP Object Tracking............................................................................................................................................. 531
Object Tracking Conguration...................................................................................................................................... 531
Tracking a Layer 2 Interface.................................................................................................................................... 531
Tracking a Layer 3 Interface................................................................................................................................... 532
Track an IPv4/IPv6 Route...................................................................................................................................... 534
Displaying Tracked Objects........................................................................................................................................... 537
32 Open Shortest Path First (OSPFv2 and OSPFv3)....................................................................................539
Protocol Overview.........................................................................................................................................................539
Autonomous System (AS) Areas........................................................................................................................... 539
Area Types................................................................................................................................................................ 540
Networks and Neighbors.........................................................................................................................................541
Router Types............................................................................................................................................................. 541
Designated and Backup Designated Routers....................................................................................................... 543
18
Contents
Link-State Advertisements (LSAs)........................................................................................................................543
Router Priority and Cost.........................................................................................................................................544
OSPF with Dell Networking OS...................................................................................................................................545
Graceful Restart...................................................................................................................................................... 546
Fast Convergence (OSPFv2, IPv4 Only).............................................................................................................. 547
Multi-Process OSPFv2 with VRF.......................................................................................................................... 547
OSPF ACK Packing................................................................................................................................................. 547
Setting OSPF Adjacency with Cisco Routers...................................................................................................... 547
Conguration Information.............................................................................................................................................548
Conguration Task List for OSPFv2 (OSPF for IPv4)........................................................................................ 548
Conguration Task List for OSPFv3 (OSPF for IPv6).............................................................................................. 562
Enabling IPv6 Unicast Routing...............................................................................................................................563
Applying cost for OSPFv3......................................................................................................................................563
Assigning IPv6 Addresses on an Interface........................................................................................................... 564
Assigning Area ID on an Interface..........................................................................................................................564
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................564
Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................565
Conguring Stub Areas...........................................................................................................................................565
Conguring Passive-Interface................................................................................................................................566
Redistributing Routes..............................................................................................................................................566
Conguring a Default Route...................................................................................................................................566
Enabling OSPFv3 Graceful Restart....................................................................................................................... 567
OSPFv3 Authentication Using IPsec.....................................................................................................................569
Troubleshooting OSPFv3........................................................................................................................................ 575
33 Policy-based Routing (PBR).................................................................................................................... 577
Overview.........................................................................................................................................................................577
Implementing PBR......................................................................................................................................................... 578
Conguration Task List for Policy-based Routing...................................................................................................... 578
PBR Exceptions (Permit)........................................................................................................................................578
Create a Redirect List..............................................................................................................................................579
Create a Rule for a Redirect-list.............................................................................................................................579
Apply a Redirect-list to an Interface using a Redirect-group.............................................................................. 581
Sample Conguration....................................................................................................................................................583
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD..... 584
34 PIM Sparse-Mode (PIM-SM).................................................................................................................. 587
Implementation Information..........................................................................................................................................587
Protocol Overview......................................................................................................................................................... 587
Requesting Multicast Trac...................................................................................................................................587
Refuse Multicast Trac..........................................................................................................................................588
Send Multicast Trac............................................................................................................................................. 588
Conguring PIM-SM.....................................................................................................................................................588
Related Conguration Tasks...................................................................................................................................589
Enable PIM-SM..............................................................................................................................................................589
Conguring S,G Expiry Timers.....................................................................................................................................590
Contents
19
Conguring a Static Rendezvous Point.......................................................................................................................591
Overriding Bootstrap Router Updates...................................................................................................................591
Conguring a Designated Router................................................................................................................................. 591
Creating Multicast Boundaries and Domains............................................................................................................. 592
35 PIM Source-Specic Mode (PIM-SSM).................................................................................................. 593
Implementation Information..........................................................................................................................................593
Important Points to Remember............................................................................................................................. 593
Congure PIM-SSM......................................................................................................................................................594
Related Conguration Tasks...................................................................................................................................594
Enabling PIM-SSM........................................................................................................................................................ 594
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................594
Conguring PIM-SSM with IGMPv2.................................................................................................................... 595
Electing an RP using the BSR Mechanism.................................................................................................................596
Enabling RP to Server Specic Multicast Groups...............................................................................................596
36 Port Monitoring....................................................................................................................................... 598
Important Points to Remember................................................................................................................................... 598
Port Monitoring..............................................................................................................................................................599
Conguring Port Monitoring......................................................................................................................................... 601
Conguring Monitor Multicast Queue........................................................................................................................ 602
Enabling Flow-Based Monitoring.................................................................................................................................603
Remote Port Mirroring..................................................................................................................................................604
Remote Port Mirroring Example............................................................................................................................ 604
Conguring Remote Port Mirroring.......................................................................................................................605
Displaying Remote-Port Mirroring Congurations...............................................................................................607
Conguring the Sample Remote Port Mirroring.................................................................................................. 607
Encapsulated Remote Port Monitoring....................................................................................................................... 610
ERPM Behavior on a typical Dell Networking OS ..................................................................................................... 612
Decapsulation of ERPM packets at the Destination IP/ Analyzer......................................................................612
Port Monitoring on VLT................................................................................................................................................. 613
VLT Non-fail over Scenario..................................................................................................................................... 613
VLT Fail-over Scenario.............................................................................................................................................614
RPM over VLT Scenarios........................................................................................................................................ 614
37 Private VLANs (PVLAN)...........................................................................................................................616
Private VLAN Concepts................................................................................................................................................ 616
Using the Private VLAN Commands............................................................................................................................617
Conguration Task List.................................................................................................................................................. 618
Creating PVLAN ports............................................................................................................................................. 618
Creating a Primary VLAN........................................................................................................................................ 619
Creating a Community VLAN.................................................................................................................................620
Creating an Isolated VLAN..................................................................................................................................... 620
Private VLAN Conguration Example......................................................................................................................... 622
Inspecting the Private VLAN Conguration............................................................................................................... 623
20
Contents
/