Dell PowerSwitch S6010-ON User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6010-ON User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S6010–ON
System
9.11(0.0)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 01
Rev. A00
Contents
1 About this Guide...........................................................................................................................................34
Audience............................................................................................................................................................................34
Conventions......................................................................................................................................................................34
Related Documents......................................................................................................................................................... 34
2 Configuration Fundamentals........................................................................................................................35
Accessing the Command Line........................................................................................................................................35
CLI Modes.........................................................................................................................................................................35
Navigating CLI Modes............................................................................................................................................... 37
The do Command............................................................................................................................................................ 39
Undoing Commands........................................................................................................................................................ 40
Obtaining Help..................................................................................................................................................................40
Entering and Editing Commands.................................................................................................................................... 41
Command History............................................................................................................................................................42
Filtering show Command Outputs.................................................................................................................................42
Example of the grep Keyword..................................................................................................................................42
Multiple Users in Configuration Mode...........................................................................................................................43
3 Getting Started........................................................................................................................................... 44
Console Access................................................................................................................................................................45
Serial Console.............................................................................................................................................................45
Default Configuration...................................................................................................................................................... 46
Configuring a Host Name............................................................................................................................................... 46
Accessing the System Remotely................................................................................................................................... 46
Accessing the System Remotely............................................................................................................................. 47
Configure the Management Port IP Address.........................................................................................................47
Configure a Management Route..............................................................................................................................47
Configuring a Username and Password..................................................................................................................47
Configuring the Enable Password................................................................................................................................. 48
Configuration File Management.....................................................................................................................................48
Copy Files to and from the System.........................................................................................................................48
Mounting an NFS File System..................................................................................................................................49
Save the Running-Configuration..............................................................................................................................51
Configure the Overload Bit for a Startup Scenario................................................................................................51
Viewing Files................................................................................................................................................................51
Managing the File System.............................................................................................................................................. 52
View Command History.................................................................................................................................................. 53
Upgrading Dell Networking OS...................................................................................................................................... 53
Using HTTP for File Transfers....................................................................................................................................... 53
Verify Software Images Before Installation..................................................................................................................54
4 Management............................................................................................................................................... 56
Contents
3
Configuring Privilege Levels........................................................................................................................................... 56
Creating a Custom Privilege Level.......................................................................................................................... 56
Removing a Command from EXEC Mode.............................................................................................................. 57
Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 57
Allowing Access to CONFIGURATION Mode Commands....................................................................................57
Allowing Access to Different Modes....................................................................................................................... 57
Applying a Privilege Level to a Username...............................................................................................................59
Applying a Privilege Level to a Terminal Line......................................................................................................... 59
Configuring Logging........................................................................................................................................................ 59
Audit and Security Logs............................................................................................................................................60
Configuring Logging Format ................................................................................................................................... 61
Setting Up a Secure Connection to a Syslog Server.............................................................................................61
Log Messages in the Internal Buffer............................................................................................................................. 63
Configuration Task List for System Log Management.........................................................................................63
Disabling System Logging...............................................................................................................................................63
Sending System Messages to a Syslog Server............................................................................................................63
Configuring a UNIX System as a Syslog Server.................................................................................................... 63
Track Login Activity.........................................................................................................................................................64
Restrictions for Tracking Login Activity..................................................................................................................64
Configuring Login Activity Tracking........................................................................................................................ 64
Display Login Statistics............................................................................................................................................. 65
Limit Concurrent Login Sessions................................................................................................................................... 66
Restrictions for Limiting the Number of Concurrent Sessions............................................................................66
Configuring Concurrent Session Limit.................................................................................................................... 66
Enabling the System to Clear Existing Sessions.................................................................................................... 67
Enabling Secured CLI Mode........................................................................................................................................... 68
Changing System Logging Settings.............................................................................................................................. 68
Display the Logging Buffer and the Logging Configuration....................................................................................... 69
Configuring a UNIX Logging Facility Level................................................................................................................... 69
Synchronizing Log Messages.........................................................................................................................................70
Enabling Timestamp on Syslog Messages.....................................................................................................................71
File Transfer Services.......................................................................................................................................................71
Configuration Task List for File Transfer Services.................................................................................................72
Enabling the FTP Server........................................................................................................................................... 72
Configuring FTP Server Parameters....................................................................................................................... 72
Configuring FTP Client Parameters.........................................................................................................................73
Terminal Lines...................................................................................................................................................................73
Denying and Permitting Access to a Terminal Line............................................................................................... 73
Configuring Login Authentication for Terminal Lines............................................................................................ 74
Setting Timeout for EXEC Privilege Mode...................................................................................................................75
Using Telnet to get to Another Network Device.........................................................................................................76
Lock CONFIGURATION Mode.......................................................................................................................................76
Viewing the Configuration Lock Status.................................................................................................................. 76
Restoring the Factory Default Settings........................................................................................................................ 77
Important Points to Remember................................................................................................................................77
4
Contents
Restoring Factory Default Environment Variables.................................................................................................78
5 802.1X......................................................................................................................................................... 80
Port-Authentication Process..........................................................................................................................................82
EAP over RADIUS......................................................................................................................................................82
Configuring 802.1X.......................................................................................................................................................... 83
Related Configuration Tasks.................................................................................................................................... 83
Important Points to Remember..................................................................................................................................... 83
Enabling 802.1X................................................................................................................................................................84
Configuring Request Identity Re-Transmissions..........................................................................................................85
Configuring a Quiet Period after a Failed Authentication.....................................................................................86
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 87
Re-Authenticating a Port................................................................................................................................................87
Configuring Timeouts......................................................................................................................................................88
Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................... 89
Guest and Authentication-Fail VLANs.......................................................................................................................... 90
Configuring a Guest VLAN........................................................................................................................................91
Configuring an Authentication-Fail VLAN............................................................................................................... 91
6 Access Control Lists (ACLs)........................................................................................................................93
IP Access Control Lists (ACLs)......................................................................................................................................94
CAM Usage................................................................................................................................................................ 95
Implementing ACLs on Dell Networking OS...........................................................................................................95
Important Points to Remember..................................................................................................................................... 97
Configuration Task List for Route Maps.................................................................................................................97
Configuring Match Routes....................................................................................................................................... 99
Configuring Set Conditions.....................................................................................................................................100
Configure a Route Map for Route Redistribution.................................................................................................101
Configure a Route Map for Route Tagging.......................................................................................................... 102
Continue Clause........................................................................................................................................................102
IP Fragment Handling.................................................................................................................................................... 103
IP Fragments ACL Examples.................................................................................................................................. 103
Layer 4 ACL Rules Examples.................................................................................................................................. 103
Configure a Standard IP ACL........................................................................................................................................104
Configuring a Standard IP ACL Filter.................................................................................................................... 105
Configure an Extended IP ACL.....................................................................................................................................106
Configuring Filters with a Sequence Number.......................................................................................................106
Configuring Filters Without a Sequence Number................................................................................................ 107
Configure Layer 2 and Layer 3 ACLs...........................................................................................................................108
Assign an IP ACL to an Interface................................................................................................................................. 109
Applying an IP ACL.........................................................................................................................................................109
Counting ACL Hits.................................................................................................................................................... 110
Configure Ingress ACLs..................................................................................................................................................110
Configure Egress ACLs.................................................................................................................................................. 110
Applying Egress Layer 3 ACLs (Control-Plane).....................................................................................................111
IP Prefix Lists...................................................................................................................................................................112
Contents
5
Implementation Information.....................................................................................................................................112
Configuration Task List for Prefix Lists..................................................................................................................112
ACL Resequencing..........................................................................................................................................................116
Resequencing an ACL or Prefix List....................................................................................................................... 116
Route Maps......................................................................................................................................................................118
Implementation Information.....................................................................................................................................118
Flow-Based Monitoring Support for ACLs.................................................................................................................. 118
Behavior of Flow-Based Monitoring.......................................................................................................................118
Enabling Flow-Based Monitoring............................................................................................................................120
Configuring IP Mirror Access Group.............................................................................................................................121
Sample Configuration............................................................................................................................................... 121
Example of viewing IP mirror–access–group applied to an Interface...............................................................122
7 Bidirectional Forwarding Detection (BFD)..................................................................................................123
How BFD Works.............................................................................................................................................................123
BFD Packet Format................................................................................................................................................. 124
BFD Sessions............................................................................................................................................................ 125
BFD Three-Way Handshake................................................................................................................................... 126
Session State Changes............................................................................................................................................128
Important Points to Remember....................................................................................................................................128
Configure BFD................................................................................................................................................................ 128
Configure BFD for Physical Ports.......................................................................................................................... 129
Configure BFD for Static Routes........................................................................................................................... 130
Configure BFD for OSPF.........................................................................................................................................133
Configure BFD for OSPFv3.................................................................................................................................... 136
Configure BFD for IS-IS...........................................................................................................................................137
Configure BFD for BGP...........................................................................................................................................139
Configure BFD for VRRP........................................................................................................................................ 146
Configuring Protocol Liveness................................................................................................................................149
Troubleshooting BFD............................................................................................................................................... 149
8 Border Gateway Protocol IPv4 (BGPv4).....................................................................................................151
Autonomous Systems (AS)........................................................................................................................................... 151
Sessions and Peers........................................................................................................................................................ 153
Establish a Session...................................................................................................................................................153
Route Reflectors............................................................................................................................................................ 154
BGP Attributes............................................................................................................................................................... 155
Best Path Selection Criteria....................................................................................................................................156
Weight........................................................................................................................................................................157
Local Preference...................................................................................................................................................... 157
Multi-Exit Discriminators (MEDs).......................................................................................................................... 158
Origin..........................................................................................................................................................................159
AS Path......................................................................................................................................................................160
Next Hop...................................................................................................................................................................160
Multiprotocol BGP..........................................................................................................................................................160
Implement BGP with Dell Networking OS................................................................................................................... 161
6
Contents
Additional Path (Add-Path) Support......................................................................................................................161
Advertise IGP Cost as MED for Redistributed Routes.........................................................................................161
Ignore Router-ID in Best-Path Calculation............................................................................................................162
Four-Byte AS Numbers........................................................................................................................................... 162
AS4 Number Representation..................................................................................................................................162
AS Number Migration.............................................................................................................................................. 164
BGP4 Management Information Base (MIB)....................................................................................................... 165
Important Points to Remember..............................................................................................................................165
Configuration Information............................................................................................................................................. 166
BGP Configuration......................................................................................................................................................... 166
Enabling BGP............................................................................................................................................................ 167
Configuring AS4 Number Representations...........................................................................................................170
Configuring Peer Groups.........................................................................................................................................172
Configuring BGP Fast Fall-Over.............................................................................................................................174
Configuring Passive Peering................................................................................................................................... 176
Maintaining Existing AS Numbers During an AS Migration.................................................................................176
Allowing an AS Number to Appear in its Own AS Path....................................................................................... 177
Enabling Graceful Restart........................................................................................................................................178
Enabling Neighbor Graceful Restart...................................................................................................................... 179
Filtering on an AS-Path Attribute...........................................................................................................................179
Regular Expressions as Filters................................................................................................................................. 181
Redistributing Routes.............................................................................................................................................. 182
Enabling Additional Paths........................................................................................................................................183
Configuring IP Community Lists.............................................................................................................................183
Configuring an IP Extended Community List........................................................................................................184
Filtering Routes with Community Lists..................................................................................................................185
Manipulating the COMMUNITY Attribute.............................................................................................................186
Changing MED Attributes....................................................................................................................................... 187
Changing the LOCAL_PREFERENCE Attribute.................................................................................................. 187
Configuring the local System or a Different System to be the Next Hop for BGP-Learned Routes............188
Changing the WEIGHT Attribute........................................................................................................................... 189
Enabling Multipath....................................................................................................................................................189
Filtering BGP Routes............................................................................................................................................... 189
Filtering BGP Routes Using Route Maps...............................................................................................................191
Filtering BGP Routes Using AS-PATH Information.............................................................................................. 191
Configuring BGP Route Reflectors........................................................................................................................192
Aggregating Routes................................................................................................................................................. 193
Configuring BGP Confederations...........................................................................................................................193
Enabling Route Flap Dampening.............................................................................................................................194
Changing BGP Timers............................................................................................................................................. 196
Enabling BGP Neighbor Soft-Reconfiguration.....................................................................................................196
Enabling or disabling BGP neighbors......................................................................................................................197
Route Map Continue................................................................................................................................................199
Enabling MBGP Configurations....................................................................................................................................199
BGP Regular Expression Optimization........................................................................................................................200
Contents
7
Debugging BGP............................................................................................................................................................. 200
Storing Last and Bad PDUs.................................................................................................................................... 201
Capturing PDUs.......................................................................................................................................................202
PDU Counters..........................................................................................................................................................203
Sample Configurations..................................................................................................................................................203
9 Content Addressable Memory (CAM)........................................................................................................ 210
CAM Allocation...............................................................................................................................................................210
Test CAM Usage............................................................................................................................................................ 212
View CAM Profiles......................................................................................................................................................... 212
View CAM-ACL Settings...............................................................................................................................................213
View CAM Usage........................................................................................................................................................... 214
CAM Optimization..........................................................................................................................................................215
Troubleshoot CAM Profiling..........................................................................................................................................215
QoS CAM Region Limitation...................................................................................................................................215
Syslog Error When the Table is Full....................................................................................................................... 215
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................216
Syslog Warning for Discrepancies Between Configured Extended Prefixes....................................................216
Unified Forwarding Table (UFT) Modes......................................................................................................................216
Configuring UFT Modes.......................................................................................................................................... 216
10 Control Plane Policing (CoPP)..................................................................................................................218
Configure Control Plane Policing..................................................................................................................................219
Configuring CoPP for Protocols............................................................................................................................220
Configuring CoPP for CPU Queues...................................................................................................................... 222
Displaying CoPP Configuration .............................................................................................................................223
11 Data Center Bridging (DCB)..................................................................................................................... 225
Ethernet Enhancements in Data Center Bridging.....................................................................................................225
Priority-Based Flow Control...................................................................................................................................226
Enhanced Transmission Selection......................................................................................................................... 227
Data Center Bridging Exchange Protocol (DCBx).............................................................................................. 228
Data Center Bridging in a Traffic Flow................................................................................................................. 229
Enabling Data Center Bridging.....................................................................................................................................229
DCB Maps and its Attributes................................................................................................................................. 230
Data Center Bridging: Default Configuration..............................................................................................................231
Configuring Priority-Based Flow Control.................................................................................................................... 231
Configuring Lossless Queues................................................................................................................................. 232
Configuring PFC in a DCB Map................................................................................................................................... 233
PFC Configuration Notes....................................................................................................................................... 233
PFC Prerequisites and Restrictions.......................................................................................................................234
Applying a DCB Map on a Port....................................................................................................................................235
Configuring PFC without a DCB Map.........................................................................................................................235
Configuring Lossless QueuesExample:................................................................................................................. 236
Priority-Based Flow Control Using Dynamic Buffer Method................................................................................... 237
Pause and Resume of Traffic.................................................................................................................................237
8
Contents
Buffer Sizes for Lossless or PFC Packets............................................................................................................238
Behavior of Tagged Packets........................................................................................................................................238
Configuration Example for DSCP and PFC Priorities................................................................................................239
SNMP Support for PFC and Buffer Statistics Tracking...........................................................................................239
Performing PFC Using DSCP Bits Instead of 802.1p Bits........................................................................................240
PFC and ETS Configuration Examples........................................................................................................................ 241
Using PFC to Manage Converged Ethernet Traffic.................................................................................................. 241
Operations on Untagged Packets................................................................................................................................ 241
Generation of PFC for a Priority for Untagged Packets...........................................................................................241
Configure Enhanced Transmission Selection..............................................................................................................241
ETS Prerequisites and Restrictions.......................................................................................................................242
Creating an ETS Priority Group............................................................................................................................. 242
ETS Operation with DCBx......................................................................................................................................243
Configuring Bandwidth Allocation for DCBx CIN................................................................................................ 243
Configuring ETS in a DCB Map..............................................................................................................................244
Hierarchical Scheduling in ETS Output Policies.........................................................................................................245
Using ETS to Manage Converged Ethernet Traffic..................................................................................................246
Applying DCB Policies in a Switch Stack....................................................................................................................246
Configure a DCBx Operation........................................................................................................................................246
DCBx Operation....................................................................................................................................................... 247
DCBx Port Roles...................................................................................................................................................... 247
DCB Configuration Exchange................................................................................................................................ 248
Configuration Source Election............................................................................................................................... 249
Propagation of DCB Information........................................................................................................................... 249
Auto-Detection and Manual Configuration of the DCBx Version..................................................................... 249
DCBx Example......................................................................................................................................................... 250
DCBx Prerequisites and Restrictions....................................................................................................................250
Configuring DCBx.....................................................................................................................................................251
Verifying the DCB Configuration.................................................................................................................................254
QoS dot1p Traffic Classification and Queue Assignment.........................................................................................263
Configuring the Dynamic Buffer Method...................................................................................................................263
Sample DCB Configuration...........................................................................................................................................264
PFC and ETS Configuration Command Examples.............................................................................................. 266
12 Dynamic Host Configuration Protocol (DHCP).........................................................................................267
DHCP Packet Format and Options............................................................................................................................. 267
Assign an IP Address using DHCP...............................................................................................................................269
Implementation Information......................................................................................................................................... 270
Configure the System to be a DHCP Server............................................................................................................. 270
Configuring the Server for Automatic Address Allocation.................................................................................. 271
Specifying a Default Gateway................................................................................................................................272
Configure a Method of Hostname Resolution..................................................................................................... 272
Using DNS for Address Resolution........................................................................................................................272
Using NetBIOS WINS for Address Resolution..................................................................................................... 273
Creating Manual Binding Entries............................................................................................................................273
Debugging the DHCP Server................................................................................................................................. 273
Contents
9
Using DHCP Clear Commands...............................................................................................................................274
Configure the System to be a DHCP Client...............................................................................................................274
Configuring the DHCP Client System...................................................................................................................274
DHCP Client on a Management Interface............................................................................................................276
DHCP Client Operation with Other Features.......................................................................................................276
Configure the System for User Port Stacking (Option 230)................................................................................... 277
Configure Secure DHCP............................................................................................................................................... 277
Option 82.................................................................................................................................................................. 278
DHCP Snooping....................................................................................................................................................... 278
Drop DHCP Packets on Snooped VLANs Only.................................................................................................... 281
Dynamic ARP Inspection.........................................................................................................................................282
Configuring Dynamic ARP Inspection................................................................................................................... 283
Source Address Validation............................................................................................................................................284
Enabling IP Source Address Validation................................................................................................................. 284
DHCP MAC Source Address Validation................................................................................................................285
Enabling IP+MAC Source Address Validation......................................................................................................285
Viewing the Number of SAV Dropped Packets...................................................................................................286
Clearing the Number of SAV Dropped Packets.................................................................................................. 286
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 287
ECMP for Flow-Based Affinity.....................................................................................................................................287
Configuring the Hash Algorithm............................................................................................................................ 287
Enabling Deterministic ECMP Next Hop.............................................................................................................. 287
Configuring the Hash Algorithm Seed.................................................................................................................. 288
Link Bundle Monitoring................................................................................................................................................. 288
Managing ECMP Group Paths.............................................................................................................................. 289
Creating an ECMP Group Bundle..........................................................................................................................289
Modifying the ECMP Group Threshold................................................................................................................ 289
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table.................................... 290
Support for ECMP in host table.............................................................................................................................291
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ........................................................................ 291
14 FIP Snooping............................................................................................................................................292
Fibre Channel over Ethernet........................................................................................................................................292
Ensure Robustness in a Converged Ethernet Network............................................................................................292
FIP Snooping on Ethernet Bridges..............................................................................................................................294
FIP Snooping in a Switch Stack...................................................................................................................................296
Using FIP Snooping....................................................................................................................................................... 296
FIP Snooping Prerequisites.................................................................................................................................... 296
Important Points to Remember.............................................................................................................................296
Enabling the FCoE Transit Feature....................................................................................................................... 297
Enable FIP Snooping on VLANs.............................................................................................................................298
Configure the FC-MAP Value................................................................................................................................298
Configure a Port for a Bridge-to-Bridge Link...................................................................................................... 298
Configure a Port for a Bridge-to-FCF Link.......................................................................................................... 298
Impact on Other Software Features.....................................................................................................................298
10
Contents
FIP Snooping Restrictions...................................................................................................................................... 299
Configuring FIP Snooping.......................................................................................................................................299
Displaying FIP Snooping Information.......................................................................................................................... 300
FCoE Transit Configuration Example..........................................................................................................................305
15 Flex Hash and Optimized Boot-Up........................................................................................................... 307
Flex Hash Capability Overview.....................................................................................................................................307
Configuring the Flex Hash Mechanism.......................................................................................................................307
Configuring Fast Boot and LACP Fast Switchover.................................................................................................. 308
Optimizing the Boot Time.............................................................................................................................................308
Booting Process When Optimized Boot Time Mechanism is Enabled............................................................. 308
Guidelines for Configuring Optimized Booting Mechanism............................................................................... 309
Interoperation of Applications with Fast Boot and System States..........................................................................310
LACP and IPv4 Routing...........................................................................................................................................310
LACP and IPv6 Routing...........................................................................................................................................310
BGP Graceful Restart...............................................................................................................................................311
Cold Boot Caused by Power Cycling the System.................................................................................................311
Unexpected Reload of the System.........................................................................................................................311
Software Upgrade.....................................................................................................................................................311
LACP Fast Switchover.............................................................................................................................................311
Changes to BGP Multipath..................................................................................................................................... 312
Delayed Installation of ECMP Routes Into BGP...................................................................................................312
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................312
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces..................................................................................... 313
16 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 314
Protocol Overview......................................................................................................................................................... 314
Ring Status................................................................................................................................................................315
Multiple FRRP Rings................................................................................................................................................ 315
Important FRRP Points........................................................................................................................................... 316
Important FRRP Concepts......................................................................................................................................317
Implementing FRRP....................................................................................................................................................... 318
FRRP Configuration....................................................................................................................................................... 318
Creating the FRRP Group.......................................................................................................................................318
Configuring the Control VLAN................................................................................................................................319
Configuring and Adding the Member VLANs.......................................................................................................320
Setting the FRRP Timers........................................................................................................................................ 321
Clearing the FRRP Counters...................................................................................................................................321
Viewing the FRRP Configuration........................................................................................................................... 321
Viewing the FRRP Information............................................................................................................................... 321
Troubleshooting FRRP..................................................................................................................................................322
Configuration Checks..............................................................................................................................................322
Sample Configuration and Topology........................................................................................................................... 322
FRRP Support on VLT.................................................................................................................................................. 323
Example Scenario.................................................................................................................................................... 324
Important Points to Remember.............................................................................................................................325
Contents
11
17 GARP VLAN Registration Protocol (GVRP)............................................................................................. 326
Important Points to Remember...................................................................................................................................326
Configure GVRP............................................................................................................................................................ 327
Related Configuration Tasks.................................................................................................................................. 327
Enabling GVRP Globally................................................................................................................................................ 328
Enabling GVRP on a Layer 2 Interface....................................................................................................................... 328
Configure GVRP Registration...................................................................................................................................... 328
Configure a GARP Timer.............................................................................................................................................. 329
18 Internet Group Management Protocol (IGMP).........................................................................................330
IGMP Implementation Information.............................................................................................................................. 330
IGMP Protocol Overview............................................................................................................................................. 330
IGMP Version 2........................................................................................................................................................330
IGMP Version 3........................................................................................................................................................332
Configure IGMP.............................................................................................................................................................335
Related Configuration Tasks..................................................................................................................................335
Viewing IGMP Enabled Interfaces...............................................................................................................................336
Selecting an IGMP Version...........................................................................................................................................336
Viewing IGMP Groups...................................................................................................................................................336
Adjusting Timers.............................................................................................................................................................337
Adjusting Query and Response Timers................................................................................................................. 337
Enabling IGMP Immediate-Leave................................................................................................................................ 338
IGMP Snooping..............................................................................................................................................................338
IGMP Snooping Implementation Information.......................................................................................................338
Configuring IGMP Snooping...................................................................................................................................338
Removing a Group-Port Association.....................................................................................................................339
Disabling Multicast Flooding...................................................................................................................................339
Specifying a Port as Connected to a Multicast Router......................................................................................339
Configuring the Switch as Querier........................................................................................................................340
Fast Convergence after MSTP Topology Changes..................................................................................................340
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................ 341
Protocol Separation................................................................................................................................................. 341
Enabling and Disabling Management Egress Interface Selection......................................................................342
Handling of Management Route Configuration...................................................................................................343
Handling of Switch-Initiated Traffic...................................................................................................................... 343
Handling of Switch-Destined Traffic.....................................................................................................................344
Handling of Transit Traffic (Traffic Separation)..................................................................................................345
Mapping of Management Applications and Traffic Type................................................................................... 345
Behavior of Various Applications for Switch-Initiated Traffic ...........................................................................346
Behavior of Various Applications for Switch-Destined Traffic ......................................................................... 347
Interworking of EIS With Various Applications.................................................................................................... 348
Designating a Multicast Router Interface...................................................................................................................348
19 Interfaces.................................................................................................................................................349
Basic Interface Configuration...................................................................................................................................... 349
12
Contents
Advanced Interface Configuration.............................................................................................................................. 349
Interface Types..............................................................................................................................................................350
View Basic Interface Information................................................................................................................................ 350
Resetting an Interface to its Factory Default State..................................................................................................352
Enabling a Physical Interface....................................................................................................................................... 352
Physical Interfaces........................................................................................................................................................ 353
Configuration Task List for Physical Interfaces...................................................................................................353
40G to 1G Breakout Cable Adaptor.......................................................................................................................353
Overview of Layer Modes...................................................................................................................................... 354
Configuring Layer 2 (Data Link) Mode................................................................................................................. 354
Configuring Layer 2 (Interface) Mode..................................................................................................................355
Configuring Layer 3 (Network) Mode.................................................................................................................. 355
Configuring Layer 3 (Interface) Mode..................................................................................................................356
Egress Interface Selection (EIS)................................................................................................................................. 356
Important Points to Remember.............................................................................................................................356
Configuring EIS........................................................................................................................................................ 357
Management Interfaces................................................................................................................................................357
Configuring Management Interfaces.................................................................................................................... 357
Configuring a Management Interface on an Ethernet Port...............................................................................359
VLAN Interfaces............................................................................................................................................................ 360
Loopback Interfaces......................................................................................................................................................360
Null Interfaces.................................................................................................................................................................361
Port Channel Interfaces................................................................................................................................................ 361
Port Channel Definition and Standards................................................................................................................. 361
Port Channel Benefits..............................................................................................................................................361
Port Channel Implementation................................................................................................................................ 362
Interfaces in Port Channels....................................................................................................................................362
Configuration Tasks for Port Channel Interfaces................................................................................................363
Creating a Port Channel......................................................................................................................................... 363
Adding a Physical Interface to a Port Channel.................................................................................................... 363
Reassigning an Interface to a New Port Channel............................................................................................... 365
Configuring the Minimum Oper Up Links in a Port Channel..............................................................................366
Adding or Removing a Port Channel from a VLAN.............................................................................................366
Assigning an IP Address to a Port Channel.......................................................................................................... 367
Deleting or Disabling a Port Channel.....................................................................................................................367
Load Balancing Through Port Channels............................................................................................................... 368
Changing the Hash Algorithm................................................................................................................................368
Bulk Configuration.........................................................................................................................................................369
Interface Range....................................................................................................................................................... 369
Bulk Configuration Examples..................................................................................................................................370
Defining Interface Range Macros.................................................................................................................................371
Define the Interface Range..................................................................................................................................... 371
Choosing an Interface-Range Macro.....................................................................................................................371
Monitoring and Maintaining Interfaces....................................................................................................................... 372
Maintenance Using TDR......................................................................................................................................... 373
Contents
13
Splitting 40G Ports without Reload.............................................................................................................................373
Splitting QSFP Ports to SFP+ Ports...........................................................................................................................375
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................376
Important Points to Remember............................................................................................................................. 377
Example Scenarios...................................................................................................................................................377
Link Dampening..............................................................................................................................................................378
Important Points to Remember............................................................................................................................. 378
Enabling Link Dampening........................................................................................................................................379
Link Bundle Monitoring................................................................................................................................................. 380
Using Ethernet Pause Frames for Flow Control.........................................................................................................381
Enabling Pause Frames............................................................................................................................................381
Configure the MTU Size on an Interface................................................................................................................... 382
Port-Pipes.......................................................................................................................................................................383
Auto-Negotiation on Ethernet Interfaces...................................................................................................................383
Setting the Speed of Ethernet Interfaces............................................................................................................383
Set Auto-Negotiation Options............................................................................................................................... 384
View Advanced Interface Information........................................................................................................................ 385
Configuring the Interface Sampling Size..............................................................................................................386
Configuring the Traffic Sampling Size Globally..........................................................................................................387
Dynamic Counters......................................................................................................................................................... 388
Clearing Interface Counters................................................................................................................................... 389
Compressing Configuration Files.................................................................................................................................389
20 IPv4 Routing............................................................................................................................................393
IP Addresses...................................................................................................................................................................394
Implementation Information................................................................................................................................... 394
Configuration Tasks for IP Addresses.........................................................................................................................394
Assigning IP Addresses to an Interface...................................................................................................................... 394
Configuring Static Routes............................................................................................................................................ 395
Configure Static Routes for the Management Interface......................................................................................... 396
Using the Configured Source IP Address in ICMP Messages..................................................................................397
Configuring the ICMP Source Interface............................................................................................................... 397
Configuring the Duration to Establish a TCP Connection........................................................................................397
Enabling Directed Broadcast........................................................................................................................................398
Resolution of Host Names............................................................................................................................................398
Enabling Dynamic Resolution of Host Names............................................................................................................398
Specifying the Local System Domain and a List of Domains...................................................................................399
Configuring DNS with Traceroute...............................................................................................................................399
ARP................................................................................................................................................................................. 400
Configuration Tasks for ARP....................................................................................................................................... 400
Configuring Static ARP Entries................................................................................................................................... 400
Enabling Proxy ARP....................................................................................................................................................... 401
Clearing ARP Cache.......................................................................................................................................................401
ARP Learning via Gratuitous ARP................................................................................................................................401
Enabling ARP Learning via Gratuitous ARP............................................................................................................... 402
ARP Learning via ARP Request...................................................................................................................................402
14
Contents
Configuring ARP Retries...............................................................................................................................................403
ICMP............................................................................................................................................................................... 403
Configuration Tasks for ICMP..................................................................................................................................... 403
Enabling ICMP Unreachable Messages......................................................................................................................403
UDP Helper.....................................................................................................................................................................404
Configure UDP Helper............................................................................................................................................ 404
Important Points to Remember.............................................................................................................................404
Enabling UDP Helper.....................................................................................................................................................404
Configuring a Broadcast Address................................................................................................................................405
Configurations Using UDP Helper...............................................................................................................................405
UDP Helper with Broadcast-All Addresses................................................................................................................ 405
UDP Helper with Subnet Broadcast Addresses........................................................................................................ 406
UDP Helper with Configured Broadcast Addresses................................................................................................. 406
UDP Helper with No Configured Broadcast Addresses........................................................................................... 407
Troubleshooting UDP Helper........................................................................................................................................407
21 IPv6 Routing............................................................................................................................................ 408
Protocol Overview.........................................................................................................................................................408
Extended Address Space....................................................................................................................................... 409
Stateless Autoconfiguration...................................................................................................................................409
IPv6 Headers............................................................................................................................................................409
Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support................................................................... 410
IPv6 Header Fields.................................................................................................................................................... 411
Extension Header Fields.......................................................................................................................................... 413
Addressing.................................................................................................................................................................414
Implementing IPv6 with Dell Networking OS..............................................................................................................415
ICMPv6............................................................................................................................................................................416
Path MTU Discovery......................................................................................................................................................417
IPv6 Neighbor Discovery...............................................................................................................................................417
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................418
Configuring the IPv6 Recursive DNS Server........................................................................................................418
Debugging IPv6 RDNSS Information Sent to the Host ..................................................................................... 419
Displaying IPv6 RDNSS Information...................................................................................................................... 419
Secure Shell (SSH) Over an IPv6 Transport............................................................................................................. 420
Configuration Tasks for IPv6....................................................................................................................................... 420
Adjusting Your CAM-Profile................................................................................................................................... 420
Assigning an IPv6 Address to an Interface........................................................................................................... 421
Assigning a Static IPv6 Route................................................................................................................................422
Configuring Telnet with IPv6................................................................................................................................. 422
SNMP over IPv6......................................................................................................................................................422
Displaying IPv6 Information....................................................................................................................................423
Displaying an IPv6 Interface Information..............................................................................................................423
Showing IPv6 Routes..............................................................................................................................................424
Showing the Running-Configuration for an Interface........................................................................................ 425
Clearing IPv6 Routes...............................................................................................................................................426
Configuring IPv6 RA Guard..........................................................................................................................................426
Contents
15
Configuring IPv6 RA Guard on an Interface.........................................................................................................428
Monitoring IPv6 RA Guard..................................................................................................................................... 428
22 iSCSI Optimization.................................................................................................................................. 429
iSCSI Optimization Overview.......................................................................................................................................429
Monitoring iSCSI Traffic Flows...............................................................................................................................431
Application of Quality of Service to iSCSI Traffic Flows..................................................................................... 431
Information Monitored in iSCSI Traffic Flows.......................................................................................................431
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................... 432
Configuring Detection and Ports for Dell Compellent Arrays............................................................................ 432
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer...............................................................433
Enable and Disable iSCSI Optimization................................................................................................................. 433
Default iSCSI Optimization Values...............................................................................................................................434
iSCSI Optimization Prerequisites.................................................................................................................................434
Configuring iSCSI Optimization................................................................................................................................... 434
Displaying iSCSI Optimization Information................................................................................................................. 436
23 Intermediate System to Intermediate System..........................................................................................438
IS-IS Protocol Overview............................................................................................................................................... 438
IS-IS Addressing.............................................................................................................................................................438
Multi-Topology IS-IS..................................................................................................................................................... 439
Transition Mode.......................................................................................................................................................439
Interface Support.................................................................................................................................................... 440
Adjacencies...............................................................................................................................................................440
Graceful Restart............................................................................................................................................................ 440
Timers....................................................................................................................................................................... 440
Implementation Information......................................................................................................................................... 440
Configuration Information............................................................................................................................................. 441
Configuration Tasks for IS-IS.................................................................................................................................442
Configuring the Distance of a Route.....................................................................................................................449
Changing the IS-Type.............................................................................................................................................450
Redistributing IPv4 Routes.....................................................................................................................................452
Redistributing IPv6 Routes.....................................................................................................................................453
Configuring Authentication Passwords................................................................................................................ 454
Setting the Overload Bit.........................................................................................................................................454
Debugging IS-IS.......................................................................................................................................................455
IS-IS Metric Styles.........................................................................................................................................................456
Configure Metric Values...............................................................................................................................................456
Maximum Values in the Routing Table..................................................................................................................457
Change the IS-IS Metric Style in One Level Only................................................................................................457
Leaks from One Level to Another......................................................................................................................... 458
Sample Configurations..................................................................................................................................................459
24 Link Aggregation Control Protocol (LACP)..............................................................................................462
Introduction to Dynamic LAGs and LACP.................................................................................................................. 462
Important Points to Remember.............................................................................................................................462
16
Contents
LACP Modes............................................................................................................................................................ 463
Configuring LACP Commands...............................................................................................................................463
LACP Configuration Tasks........................................................................................................................................... 464
Creating a LAG.........................................................................................................................................................464
Configuring the LAG Interfaces as Dynamic........................................................................................................464
Setting the LACP Long Timeout........................................................................................................................... 465
Monitoring and Debugging LACP..........................................................................................................................465
Shared LAG State Tracking......................................................................................................................................... 466
Configuring Shared LAG State Tracking.............................................................................................................. 466
Important Points about Shared LAG State Tracking..........................................................................................468
LACP Basic Configuration Example............................................................................................................................ 468
Configure a LAG on ALPHA...................................................................................................................................468
25 Layer 2.....................................................................................................................................................477
Manage the MAC Address Table.................................................................................................................................477
Clearing the MAC Address Table...........................................................................................................................477
Setting the Aging Time for Dynamic Entries........................................................................................................ 477
Configuring a Static MAC Address........................................................................................................................478
Displaying the MAC Address Table....................................................................................................................... 478
MAC Learning Limit.......................................................................................................................................................478
Setting the MAC Learning Limit............................................................................................................................ 479
mac learning-limit Dynamic.....................................................................................................................................479
mac learning-limit mac-address-sticky................................................................................................................. 479
mac learning-limit station-move............................................................................................................................ 480
mac learning-limit no-station-move...................................................................................................................... 480
Learning Limit Violation Actions.............................................................................................................................480
Setting Station Move Violation Actions.................................................................................................................481
Recovering from Learning Limit and Station Move Violations........................................................................... 481
NIC Teaming...................................................................................................................................................................482
Configure Redundant Pairs.......................................................................................................................................... 483
Important Points about Configuring Redundant Pairs........................................................................................485
Far-End Failure Detection............................................................................................................................................ 486
FEFD State Changes...............................................................................................................................................487
Configuring FEFD.................................................................................................................................................... 488
Enabling FEFD on an Interface.............................................................................................................................. 488
Debugging FEFD......................................................................................................................................................489
26 Link Layer Discovery Protocol (LLDP)..................................................................................................... 491
802.1AB (LLDP) Overview............................................................................................................................................491
Protocol Data Units..................................................................................................................................................491
Optional TLVs.................................................................................................................................................................492
Management TLVs..................................................................................................................................................492
TIA-1057 (LLDP-MED) Overview............................................................................................................................... 494
TIA Organizationally Specific TLVs........................................................................................................................494
Configure LLDP............................................................................................................................................................. 498
Related Configuration Tasks..................................................................................................................................498
Contents
17
Important Points to Remember.............................................................................................................................498
LLDP Compatibility..................................................................................................................................................499
CONFIGURATION versus INTERFACE Configurations........................................................................................... 499
Enabling LLDP................................................................................................................................................................499
Disabling and Undoing LLDP..................................................................................................................................500
Enabling LLDP on Management Ports....................................................................................................................... 500
Disabling and Undoing LLDP on Management Ports..........................................................................................500
Advertising TLVs........................................................................................................................................................... 500
Viewing the LLDP Configuration.................................................................................................................................502
Viewing Information Advertised by Adjacent LLDP Agents.....................................................................................502
Configuring LLDPDU Intervals.....................................................................................................................................503
Configuring Transmit and Receive Mode...................................................................................................................504
Configuring the Time to Live Value.............................................................................................................................504
Debugging LLDP............................................................................................................................................................505
Relevant Management Objects...................................................................................................................................506
27 Microsoft Network Load Balancing........................................................................................................... 511
NLB Unicast Mode Scenario......................................................................................................................................... 511
NLB Multicast Mode Scenario...................................................................................................................................... 511
Limitations of the NLB Feature.................................................................................................................................... 512
Microsoft Clustering...................................................................................................................................................... 512
Enable and Disable VLAN Flooding ............................................................................................................................. 512
Configuring a Switch for NLB ..................................................................................................................................... 512
Enabling a Switch for Multicast NLB.....................................................................................................................513
28 Multicast Source Discovery Protocol (MSDP)......................................................................................... 514
Protocol Overview......................................................................................................................................................... 514
Anycast RP..................................................................................................................................................................... 515
Implementation Information..........................................................................................................................................516
Configure Multicast Source Discovery Protocol........................................................................................................516
Related Configuration Tasks...................................................................................................................................516
Enable MSDP.................................................................................................................................................................520
Manage the Source-Active Cache...............................................................................................................................521
Viewing the Source-Active Cache.........................................................................................................................521
Limiting the Source-Active Cache......................................................................................................................... 521
Clearing the Source-Active Cache........................................................................................................................522
Enabling the Rejected Source-Active Cache.......................................................................................................522
Accept Source-Active Messages that Fail the RFP Check..................................................................................... 522
Specifying Source-Active Messages.......................................................................................................................... 525
Limiting the Source-Active Messages from a Peer.................................................................................................. 526
Preventing MSDP from Caching a Local Source...................................................................................................... 526
Preventing MSDP from Caching a Remote Source..................................................................................................527
Preventing MSDP from Advertising a Local Source.................................................................................................527
Logging Changes in Peership States.......................................................................................................................... 528
Terminating a Peership................................................................................................................................................. 528
Clearing Peer Statistics................................................................................................................................................ 529
18
Contents
Debugging MSDP..........................................................................................................................................................529
MSDP with Anycast RP................................................................................................................................................530
Configuring Anycast RP................................................................................................................................................ 531
Reducing Source-Active Message Flooding........................................................................................................ 532
Specifying the RP Address Used in SA Messages..............................................................................................532
MSDP Sample Configurations..................................................................................................................................... 534
29 Multiple Spanning Tree Protocol (MSTP)................................................................................................537
Protocol Overview.........................................................................................................................................................537
Spanning Tree Variations..............................................................................................................................................538
Implementation Information................................................................................................................................... 538
Configure Multiple Spanning Tree Protocol...............................................................................................................538
Related Configuration Tasks..................................................................................................................................539
Enable Multiple Spanning Tree Globally......................................................................................................................539
Adding and Removing Interfaces................................................................................................................................ 539
Creating Multiple Spanning Tree Instances............................................................................................................... 540
Influencing MSTP Root Selection................................................................................................................................ 541
Interoperate with Non-Dell Bridges.............................................................................................................................542
Changing the Region Name or Revision.....................................................................................................................542
Modifying Global Parameters.......................................................................................................................................542
Modifying the Interface Parameters...........................................................................................................................544
Configuring an EdgePort..............................................................................................................................................545
Flush MAC Addresses after a Topology Change...................................................................................................... 545
MSTP Sample Configurations......................................................................................................................................546
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration...................................................................................... 546
Debugging and Verifying MSTP Configurations........................................................................................................550
30 Multicast Features...................................................................................................................................552
Enabling IP Multicast.....................................................................................................................................................552
Implementation Information......................................................................................................................................... 552
Multicast Policies...........................................................................................................................................................553
IPv4 Multicast Policies............................................................................................................................................553
Understanding Multicast Traceroute (mtrace)......................................................................................................... 560
Important Points to Remember..............................................................................................................................561
Printing Multicast Traceroute (mtrace) Paths...........................................................................................................561
Supported Error Codes.................................................................................................................................................562
mtrace Scenarios...........................................................................................................................................................563
31 Object Tracking........................................................................................................................................569
Object Tracking Overview............................................................................................................................................569
Track Layer 2 Interfaces.........................................................................................................................................570
Track Layer 3 Interfaces.........................................................................................................................................570
Track IPv4 and IPv6 Routes................................................................................................................................... 571
Set Tracking Delays.................................................................................................................................................572
VRRP Object Tracking............................................................................................................................................572
Contents
19
Object Tracking Configuration.....................................................................................................................................572
Tracking a Layer 2 Interface...................................................................................................................................572
Tracking a Layer 3 Interface...................................................................................................................................573
Track an IPv4/IPv6 Route......................................................................................................................................575
Displaying Tracked Objects.......................................................................................................................................... 578
32 Open Shortest Path First (OSPFv2 and OSPFv3)...................................................................................580
Protocol Overview........................................................................................................................................................ 580
Autonomous System (AS) Areas.......................................................................................................................... 580
Area Types................................................................................................................................................................ 581
Networks and Neighbors........................................................................................................................................582
Router Types............................................................................................................................................................582
Designated and Backup Designated Routers.......................................................................................................584
Link-State Advertisements (LSAs)....................................................................................................................... 584
Router Priority and Cost.........................................................................................................................................585
OSPF with Dell Networking OS...................................................................................................................................586
Graceful Restart...................................................................................................................................................... 587
Fast Convergence (OSPFv2, IPv4 Only)............................................................................................................. 588
Multi-Process OSPFv2 with VRF..........................................................................................................................588
RFC-2328 Compliant OSPF Flooding...................................................................................................................588
OSPF ACK Packing.................................................................................................................................................589
Setting OSPF Adjacency with Cisco Routers......................................................................................................589
Configuration Information............................................................................................................................................ 590
Configuration Task List for OSPFv2 (OSPF for IPv4)....................................................................................... 590
Configuration Task List for OSPFv3 (OSPF for IPv6)............................................................................................. 604
Enabling IPv6 Unicast Routing.............................................................................................................................. 605
Applying cost for OSPFv3......................................................................................................................................605
Assigning IPv6 Addresses on an Interface...........................................................................................................605
Assigning Area ID on an Interface......................................................................................................................... 606
Assigning OSPFv3 Process ID and Router ID Globally....................................................................................... 606
Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................607
Configuring Stub Areas...........................................................................................................................................607
Configuring Passive-Interface............................................................................................................................... 607
Redistributing Routes............................................................................................................................................. 608
Configuring a Default Route.................................................................................................................................. 608
Enabling OSPFv3 Graceful Restart.......................................................................................................................609
OSPFv3 Authentication Using IPsec......................................................................................................................611
Troubleshooting OSPFv3........................................................................................................................................ 617
33 Policy-based Routing (PBR).................................................................................................................... 619
Overview......................................................................................................................................................................... 619
Implementing PBR.........................................................................................................................................................620
Configuration Task List for Policy-based Routing.....................................................................................................620
PBR Exceptions (Permit)........................................................................................................................................621
Create a Redirect List..............................................................................................................................................621
Create a Rule for a Redirect-list.............................................................................................................................621
20
Contents
/