Dell PowerSwitch S4810P Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4810P Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S4810
System
9.5(0.1)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 07
Rev. A00
Contents
1 About this Guide..................................................................................................35
Audience..............................................................................................................................................35
Conventions........................................................................................................................................ 35
Related Documents.............................................................................................................................35
2 Configuration Fundamentals........................................................................... 36
Accessing the Command Line............................................................................................................36
CLI Modes............................................................................................................................................36
Navigating CLI Modes................................................................................................................... 37
The do Command...............................................................................................................................40
Undoing Commands...........................................................................................................................41
Obtaining Help.................................................................................................................................... 42
Entering and Editing Commands....................................................................................................... 42
Command History...............................................................................................................................43
Filtering show Command Outputs.....................................................................................................43
Multiple Users in Configuration Mode............................................................................................... 45
3 Getting Started....................................................................................................46
Console Access...................................................................................................................................46
Serial Console................................................................................................................................46
Accessing the CLI Interface and Running Scripts Using SSH............................................................ 47
S4810 ............................................................................................................................................ 47
Entering CLI commands Using an SSH Connection................................................................... 48
Executing Local CLI Scripts Using an SSH Connection...............................................................48
Default Configuration......................................................................................................................... 49
Configuring a Host Name...................................................................................................................49
Accessing the System Remotely........................................................................................................ 49
Accessing the S4810 and Remotely.............................................................................................49
Configure the Management Port IP Address............................................................................... 49
Configure a Management Route..................................................................................................50
Configuring a Username and Password.......................................................................................50
Configuring the Enable Password......................................................................................................50
Configuration File Management......................................................................................................... 51
Copy Files to and from the System...............................................................................................51
Save the Running-Configuration..................................................................................................52
Configure the Overload Bit for a Startup Scenario...................................................................... 53
Viewing Files.................................................................................................................................. 53
Compressing Configuration Files................................................................................................. 54
Managing the File System................................................................................................................... 57
Enabling Software Features on Devices Using a Command Option................................................ 58
View Command History......................................................................................................................59
Upgrading Dell Networking OS.......................................................................................................... 59
Using Hashes to Validate Software Images........................................................................................59
Using HTTP for File Transfers.............................................................................................................60
4 Management........................................................................................................61
Configuring Privilege Levels................................................................................................................61
Creating a Custom Privilege Level................................................................................................61
Removing a Command from EXEC Mode....................................................................................61
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 61
Allowing Access to CONFIGURATION Mode Commands.......................................................... 62
Allowing Access to the Following Modes.................................................................................... 62
Applying a Privilege Level to a Username.................................................................................... 64
Applying a Privilege Level to a Terminal Line...............................................................................64
Configuring Logging...........................................................................................................................64
Audit and Security Logs.................................................................................................................65
Configuring Logging Format ...................................................................................................... 66
Display the Logging Buffer and the Logging Configuration........................................................67
Setting Up a Secure Connection to a Syslog Server....................................................................68
Sending System Messages to a Syslog Server..............................................................................69
Log Messages in the Internal Buffer...................................................................................................69
Configuration Task List for System Log Management................................................................ 69
Disabling System Logging.................................................................................................................. 69
Sending System Messages to a Syslog Server....................................................................................70
Configuring a UNIX System as a Syslog Server............................................................................70
Changing System Logging Settings....................................................................................................70
Display the Logging Buffer and the Logging Configuration..............................................................71
Configuring a UNIX Logging Facility Level.........................................................................................72
Synchronizing Log Messages..............................................................................................................73
Enabling Timestamp on Syslog Messages..........................................................................................74
File Transfer Services...........................................................................................................................74
Configuration Task List for File Transfer Services........................................................................ 74
Enabling the FTP Server.................................................................................................................75
Configuring FTP Server Parameters..............................................................................................75
Configuring FTP Client Parameters.............................................................................................. 75
Terminal Lines..................................................................................................................................... 76
Denying and Permitting Access to a Terminal Line..................................................................... 76
Configuring Login Authentication for Terminal Lines..................................................................77
Setting Time Out of EXEC Privilege Mode......................................................................................... 78
Using Telnet to get to Another Network Device............................................................................... 78
Lock CONFIGURATION Mode............................................................................................................79
Viewing the Configuration Lock Status........................................................................................ 79
Recovering from a Forgotten Password on the S4810 System........................................................80
Recovering from a Forgotten Enable Password on the S4810 ...................................................81
Recovering from a Failed Start on the S4810 System....................................................................... 82
Restoring the Factory Default Settings...............................................................................................83
S4810MXL Switch..........................................................................................................................83
Important Points to Remember....................................................................................................83
Restoring Factory Default Environment Variables....................................................................... 83
5 802.1ag................................................................................................................. 86
Ethernet CFM...................................................................................................................................... 86
Maintenance Domains........................................................................................................................ 87
Maintenance Points.............................................................................................................................87
Maintenance End Points.....................................................................................................................88
Implementation Information..............................................................................................................89
Configuring the CFM.......................................................................................................................... 89
Related Configuration Tasks.........................................................................................................89
Enabling Ethernet CFM.......................................................................................................................89
Creating a Maintenance Domain....................................................................................................... 89
Creating a Maintenance Association..................................................................................................90
Create Maintenance Points................................................................................................................ 90
Creating a Maintenance End Point...............................................................................................90
Creating a Maintenance Intermediate Point.................................................................................91
Displaying the MP Databases........................................................................................................92
Continuity Check Messages............................................................................................................... 93
Enabling CCM................................................................................................................................94
Enabling Cross-Checking.............................................................................................................94
Sending Loopback Messages and Responses................................................................................... 94
Sending Linktrace Messages and Responses.....................................................................................95
Caching Link Trace........................................................................................................................95
Enabling CFM SNMP Traps................................................................................................................. 96
Displaying Ethernet CFM Statistics.....................................................................................................98
6 802.1X...................................................................................................................99
The Port-Authentication Process.....................................................................................................100
EAP over RADIUS.........................................................................................................................102
Configuring 802.1X........................................................................................................................... 102
Related Configuration Tasks.......................................................................................................102
Important Points to Remember........................................................................................................103
Enabling 802.1X.................................................................................................................................103
Configuring Request Identity Re-Transmissions............................................................................. 105
Configuring a Quiet Period after a Failed Authentication......................................................... 105
Forcibly Authorizing or Unauthorizing a Port..................................................................................106
Re-Authenticating a Port.................................................................................................................. 107
Configuring Timeouts.......................................................................................................................108
Configuring Dynamic VLAN Assignment with Port Authentication................................................109
Guest and Authentication-Fail VLANs.............................................................................................. 110
Configuring a Guest VLAN...........................................................................................................111
Configuring an Authentication-Fail VLAN...................................................................................111
7 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)...................................................................................................... 113
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..........................................113
Guidelines for Configuring ACL VLAN groups................................................................................. 114
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.........................115
Configuring ACL VLAN Groups................................................................................................... 115
Configuring FP Blocks for VLAN Parameters..............................................................................116
Viewing CAM Usage...........................................................................................................................117
Allocating FP Blocks for VLAN Processes.........................................................................................118
8 Access Control Lists (ACLs)............................................................................ 120
IP Access Control Lists (ACLs)...........................................................................................................121
CAM Usage...................................................................................................................................121
Implementing ACLs on Dell Networking OS..............................................................................123
Important Points to Remember........................................................................................................124
Configuration Task List for Route Maps..................................................................................... 124
Configuring Match Routes.......................................................................................................... 127
Configuring Set Conditions........................................................................................................ 128
Configure a Route Map for Route Redistribution...................................................................... 129
Configure a Route Map for Route Tagging................................................................................130
Continue Clause..........................................................................................................................130
IP Fragment Handling........................................................................................................................131
IP Fragments ACL Examples........................................................................................................131
Layer 4 ACL Rules Examples....................................................................................................... 132
Configure a Standard IP ACL............................................................................................................ 133
Configuring a Standard IP ACL Filter.......................................................................................... 134
Configure an Extended IP ACL......................................................................................................... 135
Configuring Filters with a Sequence Number............................................................................ 135
Configuring Filters Without a Sequence Number......................................................................136
Configure Layer 2 and Layer 3 ACLs.................................................................................................137
Assign an IP ACL to an Interface.......................................................................................................138
Applying an IP ACL............................................................................................................................138
Counting ACL Hits.......................................................................................................................139
Configure Ingress ACLs.....................................................................................................................139
Configure Egress ACLs..................................................................................................................... 140
Applying Egress Layer 3 ACLs (Control-Plane)...........................................................................141
IP Prefix Lists...................................................................................................................................... 141
Implementation Information...................................................................................................... 142
Configuration Task List for Prefix Lists....................................................................................... 142
ACL Resequencing............................................................................................................................146
Resequencing an ACL or Prefix List............................................................................................146
Route Maps........................................................................................................................................148
Implementation Information...................................................................................................... 148
Logging of ACL Processes................................................................................................................148
Guidelines for Configuring ACL Logging................................................................................... 149
Configuring ACL Logging........................................................................................................... 150
Flow-Based Monitoring Support for ACLs........................................................................................151
Behavior of Flow-Based Monitoring........................................................................................... 151
Enabling Flow-Based Monitoring............................................................................................... 153
9 Bidirectional Forwarding Detection (BFD)...................................................155
How BFD Works................................................................................................................................ 155
BFD Packet Format......................................................................................................................156
BFD Sessions................................................................................................................................158
BFD Three-Way Handshake........................................................................................................158
Session State Changes................................................................................................................ 159
Important Points to Remember....................................................................................................... 160
Configure BFD...................................................................................................................................160
Configure BFD for Physical Ports................................................................................................161
Configure BFD for Static Routes.................................................................................................164
Configure BFD for OSPF............................................................................................................. 166
Configure BFD for OSPFv3......................................................................................................... 169
Configure BFD for IS-IS...............................................................................................................170
Configure BFD for BGP............................................................................................................... 173
Configure BFD for VRRP............................................................................................................. 180
Configuring Protocol Liveness................................................................................................... 183
Troubleshooting BFD.................................................................................................................. 183
10 Border Gateway Protocol IPv4 (BGPv4).....................................................185
Autonomous Systems (AS)................................................................................................................185
Sessions and Peers............................................................................................................................ 187
Establish a Session.......................................................................................................................188
Route Reflectors................................................................................................................................188
BGP Attributes................................................................................................................................... 189
Best Path Selection Criteria........................................................................................................ 190
Weight..........................................................................................................................................192
Local Preference......................................................................................................................... 192
Multi-Exit Discriminators (MEDs)................................................................................................ 193
Origin........................................................................................................................................... 194
AS Path.........................................................................................................................................195
Next Hop......................................................................................................................................195
Multiprotocol BGP............................................................................................................................ 196
Implement BGP with Dell Networking OS.......................................................................................196
Additional Path (Add-Path) Support........................................................................................... 196
Advertise IGP Cost as MED for Redistributed Routes................................................................ 196
Ignore Router-ID for Some Best-Path Calculations.................................................................. 197
Four-Byte AS Numbers................................................................................................................197
AS4 Number Representation...................................................................................................... 198
AS Number Migration..................................................................................................................199
BGP4 Management Information Base (MIB).............................................................................. 201
Important Points to Remember..................................................................................................201
Configuration Information............................................................................................................... 202
BGP Configuration............................................................................................................................202
Enabling BGP...............................................................................................................................203
Configuring AS4 Number Representations................................................................................207
Configuring Peer Groups........................................................................................................... 209
Configuring BGP Fast Fall-Over.................................................................................................. 211
Configuring Passive Peering....................................................................................................... 213
Maintaining Existing AS Numbers During an AS Migration........................................................214
Allowing an AS Number to Appear in its Own AS Path..............................................................215
Enabling Graceful Restart............................................................................................................216
Enabling Neighbor Graceful Restart........................................................................................... 217
Filtering on an AS-Path Attribute................................................................................................ 217
Regular Expressions as Filters..................................................................................................... 219
Redistributing Routes..................................................................................................................220
Enabling Additional Paths............................................................................................................221
Configuring IP Community Lists.................................................................................................221
Configuring an IP Extended Community List............................................................................ 223
Filtering Routes with Community Lists...................................................................................... 224
Manipulating the COMMUNITY Attribute...................................................................................224
Changing MED Attributes........................................................................................................... 226
Changing the LOCAL_PREFERENCE Attribute.......................................................................... 226
Changing the NEXT_HOP Attribute........................................................................................... 227
Changing the WEIGHT Attribute................................................................................................ 228
Enabling Multipath...................................................................................................................... 228
Filtering BGP Routes................................................................................................................... 228
Filtering BGP Routes Using Route Maps....................................................................................230
Filtering BGP Routes Using AS-PATH Information.................................................................... 231
Configuring BGP Route Reflectors.............................................................................................231
Aggregating Routes.....................................................................................................................232
Configuring BGP Confederations...............................................................................................233
Enabling Route Flap Dampening................................................................................................233
Changing BGP Timers.................................................................................................................236
Enabling BGP Neighbor Soft-Reconfiguration..........................................................................236
Route Map Continue...................................................................................................................238
Enabling MBGP Configurations........................................................................................................238
BGP Regular Expression Optimization.............................................................................................239
Debugging BGP................................................................................................................................ 239
Storing Last and Bad PDUs.........................................................................................................240
Capturing PDUs...........................................................................................................................241
PDU Counters............................................................................................................................. 242
Sample Configurations..................................................................................................................... 243
11 Content Addressable Memory (CAM)......................................................... 249
CAM Allocation................................................................................................................................. 249
Test CAM Usage................................................................................................................................ 251
View CAM-ACL Settings....................................................................................................................251
View CAM Usage...............................................................................................................................253
CAM Optimization............................................................................................................................ 254
Troubleshoot CAM Profiling.............................................................................................................254
CAM Profile Mismatches.............................................................................................................254
QoS CAM Region Limitation.......................................................................................................254
12 Control Plane Policing (CoPP)..................................................................... 256
Configure Control Plane Policing.................................................................................................... 257
Configuring CoPP for Protocols................................................................................................ 258
Configuring CoPP for CPU Queues...........................................................................................260
CoPP for OSPFv3 Packets...........................................................................................................261
Configuring CoPP for OSPFv3................................................................................................... 264
Show Commands....................................................................................................................... 265
13 Data Center Bridging (DCB)..........................................................................267
Ethernet Enhancements in Data Center Bridging........................................................................... 267
Priority-Based Flow Control.......................................................................................................268
Enhanced Transmission Selection............................................................................................. 269
Data Center Bridging Exchange Protocol (DCBx)......................................................................271
Data Center Bridging in a Traffic Flow....................................................................................... 272
Enabling Data Center Bridging......................................................................................................... 272
QoS dot1p Traffic Classification and Queue Assignment............................................................... 273
Configuring Priority-Based Flow Control........................................................................................ 274
Configuring Lossless Queues..................................................................................................... 276
Configuring the PFC Buffer in a Switch Stack............................................................................277
Configure Enhanced Transmission Selection..................................................................................278
ETS Prerequisites and Restrictions............................................................................................. 278
Creating a QoS DCB Output Policy............................................................................................279
Creating an ETS Priority Group.................................................................................................. 280
Applying an ETS Output Policy for a Priority Group to an Interface.........................................281
ETS Operation with DCBx...........................................................................................................283
Configuring Bandwidth Allocation for DCBx CIN..................................................................... 283
Applying DCB Policies in a Switch Stack......................................................................................... 284
Applying DCB Policies with an ETS Configuration..........................................................................284
Configure a DCBx Operation........................................................................................................... 285
DCBx Operation..........................................................................................................................285
DCBx Port Roles..........................................................................................................................285
DCB Configuration Exchange.................................................................................................... 287
Configuration Source Election...................................................................................................288
Propagation of DCB Information............................................................................................... 288
Auto-Detection and Manual Configuration of the DCBx Version............................................288
DCBx Example............................................................................................................................ 289
DCBx Prerequisites and Restrictions..........................................................................................290
Configuring DCBx.......................................................................................................................290
Verifying the DCB Configuration..................................................................................................... 294
PFC and ETS Configuration Examples............................................................................................. 305
Using PFC and ETS to Manage Data Center Traffic........................................................................ 305
PFC and ETS Configuration Command Examples.....................................................................307
Using PFC and ETS to Manage Converged Ethernet Traffic in a Switch Stack........................308
Hierarchical Scheduling in ETS Output Policies........................................................................308
Configuring DCB Maps and its Attributes........................................................................................309
DCB Map: Configuration Procedure..........................................................................................309
Important Points to Remember..................................................................................................310
Applying a DCB Map on a Port................................................................................................... 310
Configuring PFC without a DCB Map......................................................................................... 311
Configuring Lossless Queues..................................................................................................... 312
Priority-Based Flow Control Using Dynamic Buffer Method.......................................................... 313
Pause and Resume of Traffic...................................................................................................... 313
Buffer Sizes for Lossless or PFC Packets.................................................................................... 313
Interworking of DCB Map With DCB Buffer Threshold Settings.....................................................314
Configuring the Dynamic Buffer Method.........................................................................................315
14 Dynamic Host Configuration Protocol (DHCP)........................................ 317
DHCP Packet Format and Options...................................................................................................317
Assign an IP Address using DHCP.................................................................................................... 319
Implementation Information............................................................................................................320
Configure the System to be a DHCP Server.................................................................................... 321
Configuring the Server for Automatic Address Allocation.........................................................321
Specifying a Default Gateway.....................................................................................................323
Configure a Method of Hostname Resolution...........................................................................323
Using DNS for Address Resolution............................................................................................. 323
Using NetBIOS WINS for Address Resolution............................................................................ 323
Creating Manual Binding Entries................................................................................................ 324
Debugging the DHCP Server......................................................................................................324
Using DHCP Clear Commands.................................................................................................. 324
Configure the System to be a Relay Agent......................................................................................325
Configure the System to be a DHCP Client.....................................................................................327
Configuring the DHCP Client System........................................................................................ 327
DHCP Client on a Management Interface................................................................................. 329
DHCP Client Operation with Other Features............................................................................ 329
Configure the System for User Port Stacking (Option 230)............................................................330
Configure Secure DHCP................................................................................................................... 331
Option 82.....................................................................................................................................331
DHCP Snooping.......................................................................................................................... 332
Drop DHCP Packets on Snooped VLANs Only..........................................................................334
Dynamic ARP Inspection............................................................................................................ 334
Configuring Dynamic ARP Inspection........................................................................................335
Source Address Validation................................................................................................................336
Enabling IP Source Address Validation.......................................................................................336
DHCP MAC Source Address Validation...................................................................................... 337
Enabling IP+MAC Source Address Validation............................................................................ 337
15 Equal Cost Multi-Path (ECMP)..................................................................... 339
ECMP for Flow-Based Affinity.......................................................................................................... 339
Configuring the Hash Algorithm................................................................................................ 339
Enabling Deterministic ECMP Next Hop....................................................................................339
Configuring the Hash Algorithm Seed.......................................................................................340
Link Bundle Monitoring.................................................................................................................... 340
Managing ECMP Group Paths.....................................................................................................341
Creating an ECMP Group Bundle...............................................................................................342
Modifying the ECMP Group Threshold......................................................................................342
16 FCoE Transit....................................................................................................344
Fibre Channel over Ethernet............................................................................................................ 344
Ensure Robustness in a Converged Ethernet Network...................................................................344
FIP Snooping on Ethernet Bridges...................................................................................................346
FIP Snooping in a Switch Stack........................................................................................................348
Using FIP Snooping...........................................................................................................................348
FIP Snooping Prerequisites.........................................................................................................348
Important Points to Remember................................................................................................. 349
Enabling the FCoE Transit Feature.............................................................................................349
Enable FIP Snooping on VLANs..................................................................................................350
Configure the FC-MAP Value.....................................................................................................350
Configure a Port for a Bridge-to-Bridge Link............................................................................350
Configure a Port for a Bridge-to-FCF Link................................................................................ 350
Impact on Other Software Features...........................................................................................350
FIP Snooping Restrictions........................................................................................................... 351
Configuring FIP Snooping...........................................................................................................351
Displaying FIP Snooping Information...............................................................................................352
FCoE Transit Configuration Example...............................................................................................358
17 Enabling FIPS Cryptography........................................................................ 360
Configuration Tasks..........................................................................................................................360
Preparing the System....................................................................................................................... 360
Enabling FIPS Mode...........................................................................................................................361
Generating Host-Keys.......................................................................................................................361
Monitoring FIPS Mode Status........................................................................................................... 362
Disabling FIPS Mode......................................................................................................................... 362
18 Force10 Resilient Ring Protocol (FRRP).....................................................364
Protocol Overview............................................................................................................................364
Ring Status...................................................................................................................................365
Multiple FRRP Rings.................................................................................................................... 366
Important FRRP Points................................................................................................................366
Important FRRP Concepts..........................................................................................................366
Implementing FRRP..........................................................................................................................368
FRRP Configuration.......................................................................................................................... 368
Creating the FRRP Group........................................................................................................... 368
Configuring the Control VLAN...................................................................................................369
Configuring and Adding the Member VLANs.............................................................................370
Setting the FRRP Timers.............................................................................................................. 371
Clearing the FRRP Counters....................................................................................................... 372
Viewing the FRRP Configuration................................................................................................ 372
Viewing the FRRP Information....................................................................................................372
Troubleshooting FRRP...................................................................................................................... 373
Configuration Checks................................................................................................................. 373
Sample Configuration and Topology...............................................................................................373
19 GARP VLAN Registration Protocol (GVRP)................................................ 375
Important Points to Remember........................................................................................................375
Configure GVRP................................................................................................................................376
Related Configuration Tasks.......................................................................................................376
Enabling GVRP Globally.................................................................................................................... 377
Enabling GVRP on a Layer 2 Interface..............................................................................................377
Configure GVRP Registration............................................................................................................377
Configure a GARP Timer...................................................................................................................378
RPM Redundancy..............................................................................................................................379
20 High Availability (HA).................................................................................... 380
Component Redundancy.................................................................................................................380
Automatic and Manual Stack Unit Failover................................................................................380
Synchronization between Management and Standby Units..................................................... 381
Forcing an Stack Unit Failover.................................................................................................... 381
Specifying an Auto-Failover Limit.............................................................................................. 382
Disabling Auto-Reboot............................................................................................................... 382
Manually Synchronizing Management and Standby Units........................................................382
Pre-Configuring a Stack Unit Slot....................................................................................................382
Removing a Provisioned Logical Stack Unit.................................................................................... 383
Hitless Behavior.................................................................................................................................383
Graceful Restart................................................................................................................................ 384
Software Resiliency...........................................................................................................................384
Software Component Health Monitoring..................................................................................384
System Health Monitoring..........................................................................................................384
Failure and Event Logging.......................................................................................................... 384
Hot-Lock Behavior........................................................................................................................... 385
21 Internet Group Management Protocol (IGMP).........................................386
IGMP Implementation Information..................................................................................................386
IGMP Protocol Overview..................................................................................................................386
IGMP Version 2........................................................................................................................... 386
IGMP Version 3........................................................................................................................... 388
Configure IGMP.................................................................................................................................391
Related Configuration Tasks.......................................................................................................391
Viewing IGMP Enabled Interfaces.................................................................................................... 392
Selecting an IGMP Version............................................................................................................... 392
Viewing IGMP Groups.......................................................................................................................393
Adjusting Timers............................................................................................................................... 393
Adjusting Query and Response Timers......................................................................................393
Adjusting the IGMP Querier Timeout Value...............................................................................394
Configuring a Static IGMP Group.................................................................................................... 394
Enabling IGMP Immediate-Leave.....................................................................................................395
IGMP Snooping................................................................................................................................. 395
IGMP Snooping Implementation Information........................................................................... 395
Configuring IGMP Snooping...................................................................................................... 395
Removing a Group-Port Association......................................................................................... 396
Disabling Multicast Flooding...................................................................................................... 396
Specifying a Port as Connected to a Multicast Router..............................................................397
Configuring the Switch as Querier.............................................................................................397
Fast Convergence after MSTP Topology Changes......................................................................... 398
Egress Interface Selection (EIS) for HTTP and IGMP Applications..................................................398
Protocol Separation....................................................................................................................399
Enabling and Disabling Management Egress Interface Selection............................................ 400
Handling of Management Route Configuration........................................................................ 401
Handling of Switch-Initiated Traffic........................................................................................... 401
Handling of Switch-Destined Traffic......................................................................................... 402
Handling of Transit Traffic (Traffic Separation)..........................................................................403
Mapping of Management Applications and Traffic Type.......................................................... 403
Behavior of Various Applications for Switch-Initiated Traffic ..................................................404
Behavior of Various Applications for Switch-Destined Traffic .................................................405
Interworking of EIS With Various Applications.......................................................................... 406
Designating a Multicast Router Interface........................................................................................ 407
22 Interfaces.........................................................................................................408
Basic Interface Configuration.......................................................................................................... 408
Advanced Interface Configuration.................................................................................................. 408
Interface Types................................................................................................................................. 409
View Basic Interface Information.....................................................................................................409
Enabling a Physical Interface............................................................................................................ 411
Physical Interfaces.............................................................................................................................411
Configuration Task List for Physical Interfaces..........................................................................412
Overview of Layer Modes........................................................................................................... 412
Configuring Layer 2 (Data Link) Mode........................................................................................412
Configuring Layer 2 (Interface) Mode........................................................................................ 413
Configuring Layer 3 (Network) Mode.........................................................................................413
Configuring Layer 3 (Interface) Mode........................................................................................ 414
Egress Interface Selection (EIS)........................................................................................................ 414
Important Points to Remember..................................................................................................415
Configuring EIS............................................................................................................................415
Management Interfaces.................................................................................................................... 415
Configuring Management Interfaces..........................................................................................415
Configuring Management Interfaces on the S-Series............................................................... 416
VLAN Interfaces................................................................................................................................. 417
Loopback Interfaces......................................................................................................................... 418
Null Interfaces................................................................................................................................... 418
Port Channel Interfaces....................................................................................................................418
Port Channel Definition and Standards......................................................................................419
Port Channel Benefits................................................................................................................. 419
Port Channel Implementation....................................................................................................419
10/100/1000 Mbps Interfaces in Port Channels....................................................................... 420
Configuration Tasks for Port Channel Interfaces......................................................................420
Creating a Port Channel.............................................................................................................420
Adding a Physical Interface to a Port Channel...........................................................................421
Reassigning an Interface to a New Port Channel......................................................................423
Configuring the Minimum Oper Up Links in a Port Channel....................................................424
.....................................................................................................................................................424
Assigning an IP Address to a Port Channel................................................................................425
Deleting or Disabling a Port Channel.........................................................................................425
Load Balancing Through Port Channels....................................................................................425
Load-Balancing on the S- Series................................................................................................425
Changing the Hash Algorithm....................................................................................................426
Bulk Configuration............................................................................................................................427
Interface Range........................................................................................................................... 427
Bulk Configuration Examples..................................................................................................... 428
Defining Interface Range Macros.................................................................................................... 429
Define the Interface Range........................................................................................................ 430
Choosing an Interface-Range Macro........................................................................................ 430
Monitoring and Maintaining Interfaces............................................................................................430
Maintenance Using TDR..............................................................................................................431
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 432
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................ 433
Important Points to Remember................................................................................................. 433
Support for LM4 Optics.............................................................................................................. 434
Example Scenarios......................................................................................................................434
Link Dampening................................................................................................................................438
Important Points to Remember................................................................................................. 438
Enabling Link Dampening...........................................................................................................438
Link Bundle Monitoring....................................................................................................................440
Using Ethernet Pause Frames for Flow Control..............................................................................440
Threshold Settings.......................................................................................................................441
Enabling Pause Frames...............................................................................................................442
Configure the MTU Size on an Interface......................................................................................... 442
Port-Pipes......................................................................................................................................... 443
Auto-Negotiation on Ethernet Interfaces........................................................................................443
Setting the Speed and Duplex Mode of Ethernet Interfaces.................................................... 444
Set Auto-Negotiation Options................................................................................................... 445
View Advanced Interface Information.............................................................................................446
Configuring the Interface Sampling Size................................................................................... 447
Dynamic Counters............................................................................................................................448
Clearing Interface Counters.......................................................................................................448
Enhanced Validation of Interface Ranges....................................................................................... 449
23 Internet Protocol Security (IPSec).............................................................. 450
Configuring IPSec .............................................................................................................................451
24 IPv4 Routing................................................................................................... 452
IP Addresses...................................................................................................................................... 452
Implementation Information...................................................................................................... 452
Configuration Tasks for IP Addresses.............................................................................................. 452
Assigning IP Addresses to an Interface............................................................................................ 453
Configuring Static Routes................................................................................................................ 454
Configure Static Routes for the Management Interface.................................................................455
IPv4 Path MTU Discovery Overview.................................................................................................456
Using the Configured Source IP Address in ICMP Messages..........................................................457
Configuring the ICMP Source Interface.....................................................................................457
Configuring the Duration to Establish a TCP Connection..............................................................457
Enabling Directed Broadcast............................................................................................................458
Resolution of Host Names............................................................................................................... 458
Enabling Dynamic Resolution of Host Names................................................................................ 458
Specifying the Local System Domain and a List of Domains..........................................................459
Configuring DNS with Traceroute................................................................................................... 459
ARP....................................................................................................................................................460
Configuration Tasks for ARP.............................................................................................................461
Configuring Static ARP Entries......................................................................................................... 461
Enabling Proxy ARP...........................................................................................................................462
Clearing ARP Cache..........................................................................................................................462
ARP Learning via Gratuitous ARP..................................................................................................... 462
Enabling ARP Learning via Gratuitous ARP......................................................................................463
ARP Learning via ARP Request......................................................................................................... 463
Configuring ARP Retries...................................................................................................................464
ICMP..................................................................................................................................................465
Configuration Tasks for ICMP.......................................................................................................... 465
Enabling ICMP Unreachable Messages............................................................................................465
UDP Helper....................................................................................................................................... 465
Configure UDP Helper................................................................................................................465
Important Points to Remember................................................................................................. 466
Enabling UDP Helper........................................................................................................................466
Configuring a Broadcast Address.................................................................................................... 466
Configurations Using UDP Helper................................................................................................... 467
UDP Helper with Broadcast-All Addresses...................................................................................... 467
UDP Helper with Subnet Broadcast Addresses............................................................................... 468
UDP Helper with Configured Broadcast Addresses........................................................................469
UDP Helper with No Configured Broadcast Addresses..................................................................469
Troubleshooting UDP Helper...........................................................................................................469
25 IPv6 Routing....................................................................................................471
Protocol Overview.............................................................................................................................471
Extended Address Space............................................................................................................. 471
Stateless Autoconfiguration........................................................................................................471
IPv6 Headers................................................................................................................................472
IPv6 Header Fields.......................................................................................................................473
Extension Header Fields..............................................................................................................474
Addressing................................................................................................................................... 475
Implementing IPv6 with Dell Networking OS..................................................................................477
ICMPv6.............................................................................................................................................. 479
Path MTU Discovery......................................................................................................................... 479
IPv6 Neighbor Discovery..................................................................................................................480
IPv6 Neighbor Discovery of MTU Packets................................................................................. 481
Configuration Task List for IPv6 RDNSS...........................................................................................481
Configuring the IPv6 Recursive DNS Server.............................................................................. 481
Debugging IPv6 RDNSS Information Sent to the Host ............................................................ 482
Displaying IPv6 RDNSS Information...........................................................................................483
Secure Shell (SSH) Over an IPv6 Transport..................................................................................... 484
Configuration Tasks for IPv6............................................................................................................484
Adjusting Your CAM-Profile....................................................................................................... 484
Assigning an IPv6 Address to an Interface.................................................................................485
Assigning a Static IPv6 Route..................................................................................................... 485
Configuring Telnet with IPv6..................................................................................................... 486
SNMP over IPv6.......................................................................................................................... 486
Showing IPv6 Information.......................................................................................................... 487
Showing an IPv6 Interface..........................................................................................................487
Showing IPv6 Routes..................................................................................................................488
Showing the Running-Configuration for an Interface..............................................................489
Clearing IPv6 Routes.................................................................................................................. 490
26 iSCSI Optimization.........................................................................................491
iSCSI Optimization Overview............................................................................................................491
Monitoring iSCSI Traffic Flows................................................................................................... 493
Application of Quality of Service to iSCSI Traffic Flows............................................................493
Information Monitored in iSCSI Traffic Flows............................................................................493
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................494
Configuring Detection and Ports for Dell Compellent Arrays.................................................. 495
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................495
Enable and Disable iSCSI Optimization......................................................................................495
Default iSCSI Optimization Values...................................................................................................496
iSCSI Optimization Prerequisites......................................................................................................497
Configuring iSCSI Optimization....................................................................................................... 497
Displaying iSCSI Optimization Information..................................................................................... 499
27 Intermediate System to Intermediate System.......................................... 501
IS-IS Protocol Overview....................................................................................................................501
IS-IS Addressing................................................................................................................................ 501
Multi-Topology IS-IS........................................................................................................................ 502
Transition Mode.......................................................................................................................... 503
Interface Support........................................................................................................................ 503
Adjacencies................................................................................................................................. 503
Graceful Restart................................................................................................................................ 503
Timers..........................................................................................................................................504
Implementation Information............................................................................................................504
Configuration Information............................................................................................................... 505
Configuration Tasks for IS-IS......................................................................................................505
Configuring the Distance of a Route..........................................................................................514
Changing the IS-Type................................................................................................................. 514
Redistributing IPv4 Routes.......................................................................................................... 517
Redistributing IPv6 Routes..........................................................................................................518
Configuring Authentication Passwords......................................................................................519
Setting the Overload Bit.............................................................................................................. 519
Debugging IS-IS..........................................................................................................................520
IS-IS Metric Styles..............................................................................................................................521
Configure Metric Values....................................................................................................................521
Maximum Values in the Routing Table.......................................................................................522
Change the IS-IS Metric Style in One Level Only...................................................................... 522
Leaks from One Level to Another.............................................................................................. 524
Sample Configurations..................................................................................................................... 524
28 Link Aggregation Control Protocol (LACP)...............................................527
Introduction to Dynamic LAGs and LACP........................................................................................527
Important Points to Remember..................................................................................................527
LACP Modes................................................................................................................................528
Configuring LACP Commands...................................................................................................528
LACP Configuration Tasks................................................................................................................529
Creating a LAG............................................................................................................................ 529
Configuring the LAG Interfaces as Dynamic............................................................................. 530
Setting the LACP Long Timeout.................................................................................................530
Monitoring and Debugging LACP...............................................................................................531
Shared LAG State Tracking................................................................................................................531
Configuring Shared LAG State Tracking.....................................................................................532
Important Points about Shared LAG State Tracking..................................................................533
LACP Basic Configuration Example................................................................................................. 534
Configure a LAG on ALPHA........................................................................................................ 534
29 Layer 2..............................................................................................................542
Manage the MAC Address Table...................................................................................................... 542
Clearing the MAC Address Table................................................................................................542
Setting the Aging Time for Dynamic Entries..............................................................................542
Configuring a Static MAC Address............................................................................................. 543
Displaying the MAC Address Table.............................................................................................543
MAC Learning Limit...........................................................................................................................543
Setting the MAC Learning Limit..................................................................................................544
mac learning-limit Dynamic.......................................................................................................544
mac learning-limit mac-address-sticky.....................................................................................545
mac learning-limit station-move............................................................................................... 545
mac learning-limit no-station-move.........................................................................................545
Learning Limit Violation Actions.................................................................................................546
Setting Station Move Violation Actions......................................................................................546
Recovering from Learning Limit and Station Move Violations..................................................547
NIC Teaming..................................................................................................................................... 547
Configure Redundant Pairs.............................................................................................................. 548
Important Points about Configuring Redundant Pairs..............................................................550
Far-End Failure Detection.................................................................................................................551
FEFD State Changes....................................................................................................................552
Configuring FEFD........................................................................................................................ 553
Enabling FEFD on an Interface................................................................................................... 554
Debugging FEFD......................................................................................................................... 555
30 Link Layer Discovery Protocol (LLDP)........................................................ 557
802.1AB (LLDP) Overview................................................................................................................. 557
Protocol Data Units.....................................................................................................................557
Optional TLVs....................................................................................................................................558
Management TLVs...................................................................................................................... 558
TIA-1057 (LLDP-MED) Overview......................................................................................................560
TIA Organizationally Specific TLVs............................................................................................. 561
Configure LLDP.................................................................................................................................565
Related Configuration Tasks.......................................................................................................565
Important Points to Remember................................................................................................. 566
LLDP Compatibility..................................................................................................................... 566
CONFIGURATION versus INTERFACE Configurations....................................................................566
Enabling LLDP................................................................................................................................... 567
Disabling and Undoing LLDP......................................................................................................567
Enabling LLDP on Management Ports............................................................................................. 567
Disabling and Undoing LLDP on Management Ports................................................................ 567
Advertising TLVs................................................................................................................................568
Viewing the LLDP Configuration......................................................................................................569
Viewing Information Advertised by Adjacent LLDP Agents.............................................................570
Configuring LLDPDU Intervals.......................................................................................................... 571
Configuring Transmit and Receive Mode.........................................................................................571
Configuring a Time to Live............................................................................................................... 572
Debugging LLDP............................................................................................................................... 573
Relevant Management Objects........................................................................................................ 574
31 Microsoft Network Load Balancing............................................................580
NLB Unicast Mode Scenario.............................................................................................................580
NLB Multicast Mode Scenario...........................................................................................................581
Limitations With Enabling NLB on Switches.................................................................................... 581
Benefits and Working of Microsoft Clustering.................................................................................581
Enable and Disable VLAN Flooding .................................................................................................582
Configuring a Switch for NLB ..........................................................................................................582
..................................................................................................................................................... 582
32 Multicast Source Discovery Protocol (MSDP)...........................................583
Protocol Overview............................................................................................................................583
Anycast RP.........................................................................................................................................585
Implementation Information............................................................................................................585
Configure Multicast Source Discovery Protocol............................................................................. 585
Related Configuration Tasks.......................................................................................................585
Enable MSDP.....................................................................................................................................589
Manage the Source-Active Cache...................................................................................................590
Viewing the Source-Active Cache............................................................................................. 590
Limiting the Source-Active Cache..............................................................................................591
Clearing the Source-Active Cache............................................................................................. 591
Enabling the Rejected Source-Active Cache............................................................................. 591
Accept Source-Active Messages that Fail the RFP Check...............................................................591
Specifying Source-Active Messages................................................................................................ 595
Limiting the Source-Active Messages from a Peer......................................................................... 596
/