Networking Z9500

Dell Networking Z9500 Reference guide

  • Hello! I am an AI chatbot trained to assist you with the Dell Networking Z9500 Reference guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Networking Configuration Guide for the
Z9500 Switch
9.7(0.0)
March 2015
Rev. A00
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
NOTE: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein
may be trademarks of their respective companies.
Chapter 1: About this Guide......................................................................................................... 27
Audience.............................................................................................................................................................................. 27
Conventions........................................................................................................................................................................ 27
Related Documents...........................................................................................................................................................27
Chapter 2: Configuration Fundamentals...................................................................................... 28
Accessing the Command Line........................................................................................................................................ 28
CLI Modes........................................................................................................................................................................... 28
Navigating CLI Modes................................................................................................................................................ 29
The do Command...............................................................................................................................................................31
Undoing Commands..........................................................................................................................................................32
Obtaining Help....................................................................................................................................................................33
Entering and Editing Commands................................................................................................................................... 33
Command History..............................................................................................................................................................34
Filtering show Command Outputs.................................................................................................................................34
Multiple Users in Configuration Mode..........................................................................................................................36
Chapter 3: Getting Started..........................................................................................................37
Console Access.................................................................................................................................................................. 37
Serial Console............................................................................................................................................................... 38
Default Configuration....................................................................................................................................................... 39
Configuring a Host Name................................................................................................................................................ 39
Accessing the System Remotely................................................................................................................................... 39
Configure the Management Port IP Address....................................................................................................... 39
Configure a Management Route..............................................................................................................................40
Configuring a Username and Password................................................................................................................. 40
Configuring the Enable Password................................................................................................................................. 40
Manage Configuration Files............................................................................................................................................. 41
File Storage....................................................................................................................................................................41
Copy Files to and from the System......................................................................................................................... 41
Save the Running-Configuration............................................................................................................................. 42
Configure the Overload Bit for a Startup Scenario.............................................................................................43
Viewing Files................................................................................................................................................................. 43
Changes in Configuration Files.................................................................................................................................44
Enabling Software Features on Devices Using a Command Option..................................................................... 44
View Command History................................................................................................................................................... 45
Upgrading the Dell Networking OS...............................................................................................................................45
Using Hashes to Validate Software Images........................................................................................................45
Chapter 4: Switch Management...................................................................................................47
Configuring Privilege Levels............................................................................................................................................47
Removing a Command from EXEC Mode..............................................................................................................48
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 48
Allowing Access to CONFIGURATION Mode Commands................................................................................. 48
Contents
Contents 3
Allowing Access to the Following Modes.............................................................................................................. 48
Applying a Privilege Level to a Username............................................................................................................. 50
Applying a Privilege Level to a Terminal Line....................................................................................................... 50
Configuring Logging......................................................................................................................................................... 50
Audit and Security Logs.............................................................................................................................................50
Configuring Logging Format .............................................................................................................................52
Setting Up a Secure Connection to a Syslog Server................................................................................ 53
Log Messages in the Internal Buffer............................................................................................................................ 54
Disabling System Logging............................................................................................................................................... 54
Sending System Messages to a Syslog Server.......................................................................................................... 54
Configuring a UNIX System as a Syslog Server...................................................................................................55
Display the Logging Buffer and the Logging Configuration....................................................................................55
Changing System Logging Settings..............................................................................................................................55
Configuring a UNIX Logging Facility Level..................................................................................................................56
Synchronizing Log Messages......................................................................................................................................... 57
Enabling Timestamp on Syslog Messages...................................................................................................................57
File Transfer Services.......................................................................................................................................................58
Enabling the FTP Server............................................................................................................................................58
Configuring FTP Server Parameters...................................................................................................................... 59
Configuring FTP Client Parameters........................................................................................................................59
Terminal Lines.................................................................................................................................................................... 59
Denying and Permitting Access to a Terminal Line.............................................................................................60
Configuring Login Authentication for Terminal Lines......................................................................................... 60
Setting Time Out of EXEC Privilege Mode..................................................................................................................61
Using Telnet to Access Another Network Device......................................................................................................61
Lock CONFIGURATION Mode....................................................................................................................................... 62
Recovering from a Forgotten Password on the Z9500...........................................................................................63
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration.............................63
Recovering from a Failed Start on the Z9500........................................................................................................... 63
Restoring Factory-Default Settings..............................................................................................................................64
Restoring Factory-Default Boot Environment Variables....................................................................................64
Chapter 5: 802.1X........................................................................................................................67
The Port-Authentication Process................................................................................................................................. 69
EAP over RADIUS........................................................................................................................................................69
Configuring 802.1X............................................................................................................................................................70
Important Points to Remember..................................................................................................................................... 70
Enabling 802.1X...................................................................................................................................................................71
Configuring Request Identity Re-Transmissions........................................................................................................72
Configuring a Quiet Period after a Failed Authentication..................................................................................73
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 73
Re-Authenticating a Port.................................................................................................................................................74
Configuring Timeouts....................................................................................................................................................... 75
Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................76
Guest and Authentication-Fail VLANs..........................................................................................................................77
Configuring a Guest VLAN........................................................................................................................................ 77
Configuring an Authentication-Fail VLAN..............................................................................................................77
Chapter 6: Access Control Lists (ACLs).......................................................................................79
4
Contents
IP Access Control Lists (ACLs)..................................................................................................................................... 80
CAM Usage................................................................................................................................................................... 80
Implementing ACLs .....................................................................................................................................................81
IP Fragment Handling.......................................................................................................................................................82
IP Fragments ACL Examples.....................................................................................................................................82
Layer 4 ACL Rules Examples.................................................................................................................................... 83
Configure a Standard IP ACL......................................................................................................................................... 84
Configuring a Standard IP ACL Filter..................................................................................................................... 84
Configure an Extended IP ACL...................................................................................................................................... 85
Configuring Filters with a Sequence Number.......................................................................................................85
Configuring Filters Without a Sequence Number................................................................................................86
Configure Layer 2 and Layer 3 ACLs............................................................................................................................87
Using ACL VLAN Groups.................................................................................................................................................88
Guidelines for Configuring ACL VLAN Groups..................................................................................................... 88
Configuring an ACL VLAN Group............................................................................................................................ 88
Allocating ACL VLAN CAM....................................................................................................................................... 89
Applying an IP ACL to an Interface...............................................................................................................................90
Configure Ingress ACLs............................................................................................................................................. 90
Configure Egress ACLs...............................................................................................................................................91
Applying Egress Layer 3 ACLs (Control-Plane)....................................................................................................91
Counting ACL Hits.......................................................................................................................................................92
IP Prefix Lists..................................................................................................................................................................... 92
Configuration Task List for Prefix Lists................................................................................................................. 93
ACL Resequencing............................................................................................................................................................96
Resequencing an ACL or Prefix List....................................................................................................................... 96
Route Maps.........................................................................................................................................................................97
Important Points to Remember..................................................................................................................................... 98
Configuration Task List for Route Maps................................................................................................................98
Configuring Match Routes...................................................................................................................................... 100
Configuring Set Conditions...................................................................................................................................... 101
Configure a Route Map for Route Redistribution.............................................................................................. 102
Configure a Route Map for Route Tagging......................................................................................................... 102
Continue Clause......................................................................................................................................................... 103
Chapter 7: Bare Metal Provisioning (BMP).................................................................................104
Chapter 8: Bidirectional Forwarding Detection (BFD)................................................................ 105
How BFD Works...............................................................................................................................................................105
BFD Packet Format...................................................................................................................................................106
BFD Sessions.............................................................................................................................................................. 107
BFD Three-Way Handshake....................................................................................................................................108
Session State Changes.............................................................................................................................................109
Important Points to Remember....................................................................................................................................109
Configure BFD..................................................................................................................................................................109
Configure BFD for Static Routes............................................................................................................................110
Configure BFD for OSPF........................................................................................................................................... 111
Configure BFD for OSPFv3......................................................................................................................................113
Configure BFD for IS-IS............................................................................................................................................115
Configure BFD for BGP.............................................................................................................................................117
Contents
5
Configure BFD for VRRP......................................................................................................................................... 122
Configuring Protocol Liveness................................................................................................................................125
Chapter 9: Border Gateway Protocol IPv4 (BGPv4)....................................................................126
Autonomous Systems (AS)........................................................................................................................................... 126
Sessions and Peers..........................................................................................................................................................128
Establish a Session.................................................................................................................................................... 128
Route Reflectors..............................................................................................................................................................129
BGP Attributes................................................................................................................................................................. 130
Best Path Selection Criteria....................................................................................................................................130
Weight.......................................................................................................................................................................... 132
Local Preference........................................................................................................................................................ 132
Multi-Exit Discriminators (MEDs).......................................................................................................................... 133
Origin.............................................................................................................................................................................134
AS Path........................................................................................................................................................................ 134
Next Hop......................................................................................................................................................................135
Multiprotocol BGP...........................................................................................................................................................135
Implement BGP ............................................................................................................................................................... 135
Advertise IGP Cost as MED for Redistributed Routes..................................................................................... 136
Ignore Router-ID for Some Best-Path Calculations.......................................................................................... 136
Four-Byte AS Numbers............................................................................................................................................ 136
AS4 Number Representation...................................................................................................................................137
AS Number Migration............................................................................................................................................... 138
BGP4 Management Information Base (MIB)...................................................................................................... 139
Important Points to Remember..............................................................................................................................140
Configuration Information..............................................................................................................................................140
BGP Configuration........................................................................................................................................................... 141
Enabling BGP............................................................................................................................................................... 141
Configuring AS4 Number Representations..........................................................................................................144
Configuring Peer Groups..........................................................................................................................................146
Configuring BGP Fast Fail-Over.............................................................................................................................148
Configuring Passive Peering................................................................................................................................... 149
Maintaining Existing AS Numbers During an AS Migration............................................................................. 150
Allowing an AS Number to Appear in its Own AS Path.....................................................................................151
Enabling Neighbor Graceful Restart...................................................................................................................... 151
Filtering on an AS-Path Attribute.......................................................................................................................... 152
Regular Expressions as Filters................................................................................................................................ 153
Redistributing Routes............................................................................................................................................... 154
Enabling Additional Paths........................................................................................................................................ 155
Configuring IP Community Lists.............................................................................................................................155
Configuring an IP Extended Community List...................................................................................................... 156
Filtering Routes with Community Lists.................................................................................................................157
Manipulating the COMMUNITY Attribute............................................................................................................157
Changing MED Attributes........................................................................................................................................159
Changing the LOCAL_PREFERENCE Attribute.................................................................................................159
Changing the NEXT_HOP Attribute..................................................................................................................... 160
Changing the WEIGHT Attribute........................................................................................................................... 160
Enabling Multipath.....................................................................................................................................................160
Filtering BGP Routes................................................................................................................................................. 161
Filtering BGP Routes Using Route Maps............................................................................................................. 162
6
Contents
Filtering BGP Routes Using AS-PATH Information........................................................................................... 162
Configuring BGP Route Reflectors........................................................................................................................163
Aggregating Routes...................................................................................................................................................163
Configuring BGP Confederations...........................................................................................................................164
Enabling Route Flap Dampening.............................................................................................................................164
Changing BGP Timers...............................................................................................................................................166
Enabling BGP Neighbor Soft-Reconfiguration....................................................................................................167
Route Map Continue................................................................................................................................................. 168
Enabling MBGP Configurations....................................................................................................................................168
BGP Regular Expression Optimization....................................................................................................................... 169
Debugging BGP................................................................................................................................................................169
Storing Last and Bad PDUs..................................................................................................................................... 170
Capturing PDUs..........................................................................................................................................................170
PDU Counters............................................................................................................................................................. 172
Sample Configurations....................................................................................................................................................172
Chapter 10: Content Addressable Memory (CAM)...................................................................... 180
CAM Allocation.................................................................................................................................................................180
Test CAM Usage...............................................................................................................................................................181
View CAM-ACL Settings................................................................................................................................................182
View CAM Usage............................................................................................................................................................. 183
Return to the Default CAM Configuration.................................................................................................................183
CAM Optimization........................................................................................................................................................... 184
Applications for CAM Profiling..................................................................................................................................... 184
Unified Forwarding Table (UFT) Modes.................................................................................................................... 185
Configuring UFT Modes........................................................................................................................................... 185
Chapter 11: Control Plane Policing (CoPP)................................................................................. 186
Z9500 CoPP Implementation....................................................................................................................................... 186
CoPP Example.................................................................................................................................................................. 187
Configure Control Plane Policing.................................................................................................................................189
Configuring CoPP for Protocols.............................................................................................................................189
Examples of Configuring CoPP for Protocols.....................................................................................................189
Configuring CoPP for CPU Queues...................................................................................................................... 190
Examples of Configuring CoPP for CPU Queues................................................................................................191
Displaying CoPP Configuration...............................................................................................................................192
Troubleshooting CoPP Operation................................................................................................................................ 194
Chapter 12: Data Center Bridging (DCB).................................................................................... 201
Ethernet Enhancements in Data Center Bridging....................................................................................................201
Priority-Based Flow Control................................................................................................................................... 202
Enhanced Transmission Selection.........................................................................................................................203
Data Center Bridging Exchange Protocol (DCBx)............................................................................................204
Data Center Bridging in a Traffic Flow................................................................................................................ 204
Enabling Data Center Bridging.................................................................................................................................... 205
QoS dot1p Traffic Classification and Queue Assignment......................................................................................205
SNMP Support for PFC and Buffer Statistics Tracking........................................................................................206
DCB Maps and its Attributes....................................................................................................................................... 206
Data Center Bridging: Default Configuration...........................................................................................................209
Contents
7
Configuring PFC and ETS in a DCB Map.................................................................................................................. 209
Configuring Priority-Based Flow Control................................................................................................................... 212
Configuring Lossless Queues.................................................................................................................................. 212
Configure Enhanced Transmission Selection............................................................................................................ 213
ETS Prerequisites and Restrictions....................................................................................................................... 213
Creating an ETS Priority Group..............................................................................................................................213
ETS Operation with DCBx....................................................................................................................................... 214
Configuring Bandwidth Allocation for DCBx CIN............................................................................................... 215
Applying the DCB Policies on Linecard.......................................................................................................................215
Applying DCB Policies on SFM Ports..........................................................................................................................216
Configure a DCBx Operation........................................................................................................................................ 216
DCBx Operation......................................................................................................................................................... 216
DCBx Port Roles........................................................................................................................................................ 216
DCB Configuration Exchange................................................................................................................................. 218
Configuration Source Election................................................................................................................................ 218
Propagation of DCB Information............................................................................................................................218
Auto-Detection and Manual Configuration of the DCBx Version.................................................................. 219
Behavior of Tagged Packets................................................................................................................................... 219
Configuration Example for DSCP and PFC Priorities........................................................................................219
DCBx Example............................................................................................................................................................220
DCBx Prerequisites and Restrictions.................................................................................................................... 221
Configuring DCBx...................................................................................................................................................... 221
Verifying the DCB Configuration.................................................................................................................................224
Generation of PFC for a Priority for Untagged Packets....................................................................................... 234
Operations on Untagged Packets............................................................................................................................... 234
Performing PFC Using DSCP Bits Instead of 802.1p Bits.....................................................................................234
PFC and ETS Configuration Examples.......................................................................................................................235
Using PFC and ETS to Manage Data Center Traffic............................................................................................. 235
Using PFC and ETS to Manage Converged Ethernet Traffic.........................................................................237
Hierarchical Scheduling in ETS Output Policies.................................................................................................237
Priority-Based Flow Control Using Dynamic Buffer Method................................................................................238
Configuring the Dynamic Buffer Method..................................................................................................................239
Sample Configurations...................................................................................................................................................240
Chapter 13: Debugging and Diagnostics..................................................................................... 244
Offline Diagnostics..........................................................................................................................................................244
Running Offline Diagnostics....................................................................................................................................244
Examples of Running Offline Diagnostics............................................................................................................245
TRACE Logs..................................................................................................................................................................... 252
Auto Save on Reload, Crash, or Rollover............................................................................................................ 252
Last Restart Reason.......................................................................................................................................................253
show hardware Commands.......................................................................................................................................... 253
Environmental Monitoring.............................................................................................................................................254
Display Power Supply Status..................................................................................................................................254
Display Fan Status.................................................................................................................................................... 255
Display Transceiver Type........................................................................................................................................ 256
Recognize an Over-Temperature Condition.......................................................................................................257
Troubleshoot an Over-Temperature Condition..................................................................................................258
Troubleshooting Packet Loss.......................................................................................................................................259
Displaying Drop Counters........................................................................................................................................260
8
Contents
Displaying Dataplane Statistics...............................................................................................................................261
Displaying Line-Card Counters.............................................................................................................................. 262
Accessing Application Core Dumps............................................................................................................................ 263
Mini Core Dumps.............................................................................................................................................................263
Full Kernel Core Dumps................................................................................................................................................. 264
Enabling TCP Dumps......................................................................................................................................................264
Chapter 14: Dynamic Host Configuration Protocol (DHCP)........................................................ 265
DHCP Packet Format and Options.............................................................................................................................265
Assign an IP Address using DHCP.............................................................................................................................. 266
Implementation Information..........................................................................................................................................267
Configure the System to be a DHCP Server............................................................................................................268
Configuring the Server for Automatic Address Allocation..............................................................................268
Specifying a Default Gateway................................................................................................................................269
Configure a Method of Hostname Resolution....................................................................................................270
Using DNS for Address Resolution....................................................................................................................... 270
Using NetBIOS WINS for Address Resolution....................................................................................................270
Creating Manual Binding Entries........................................................................................................................... 270
Debugging the DHCP Server...................................................................................................................................271
Using DHCP Clear Commands................................................................................................................................ 271
Configure the System to be a Relay Agent............................................................................................................... 271
Configure the System to be a DHCP Client............................................................................................................. 273
DHCP Client on a Management Interface...........................................................................................................273
DHCP Client Operation with Other Features..................................................................................................... 273
Configure Secure DHCP................................................................................................................................................274
Option 82.....................................................................................................................................................................274
DHCP Snooping......................................................................................................................................................... 275
Drop DHCP Packets on Snooped VLANs Only.................................................................................................. 278
Dynamic ARP Inspection..........................................................................................................................................278
Configuring Dynamic ARP Inspection...................................................................................................................279
Source Address Validation............................................................................................................................................280
Enabling IP Source Address Validation................................................................................................................ 280
DHCP MAC Source Address Validation...............................................................................................................280
Enabling IP+MAC Source Address Validation.................................................................................................... 280
Viewing the Number of SAV Dropped Packets.................................................................................................. 281
Clearing the Number of SAV Dropped Packets..................................................................................................281
Chapter 15: Equal Cost Multi-Path (ECMP)............................................................................... 282
ECMP for Flow-Based Affinity.................................................................................................................................... 282
Enabling Deterministic ECMP Next Hop............................................................................................................. 282
Configuring the Hash Algorithm Seed..................................................................................................................282
Link Bundle Monitoring..................................................................................................................................................283
Managing ECMP Group Paths............................................................................................................................... 283
Creating an ECMP Group Bundle..........................................................................................................................283
Modifying the ECMP Group Threshold................................................................................................................284
ECMP Support in L3 Host and LPM Tables............................................................................................................. 284
Chapter 16: FCoE Transit...........................................................................................................286
Fibre Channel over Ethernet........................................................................................................................................286
Contents
9
Ensure Robustness in a Converged Ethernet Network.........................................................................................286
FIP Snooping on Ethernet Bridges..............................................................................................................................287
Using FIP Snooping........................................................................................................................................................ 289
FIP Snooping Prerequisites.....................................................................................................................................289
Important Points to Remember............................................................................................................................. 289
Enabling the FCoE Transit Feature.......................................................................................................................290
Enable FIP Snooping on VLANs.............................................................................................................................290
Configure the FC-MAP Value................................................................................................................................. 291
Configure a Port for a Bridge-to-Bridge Link..................................................................................................... 291
Configure a Port for a Bridge-to-FCF Link..........................................................................................................291
Impact on Other Software Features..................................................................................................................... 291
FIP Snooping Restrictions........................................................................................................................................291
Configuring FIP Snooping....................................................................................................................................... 292
FCoE Transit Configuration Example......................................................................................................................... 293
Displaying FIP Snooping Information..........................................................................................................................294
Chapter 17: Enabling FIPS Cryptography................................................................................... 300
Configuration Tasks....................................................................................................................................................... 300
Preparing the System.................................................................................................................................................... 300
Enabling FIPS Mode........................................................................................................................................................ 301
Generating Host-Keys.................................................................................................................................................... 301
Monitoring FIPS Mode Status...................................................................................................................................... 301
Disabling FIPS Mode...................................................................................................................................................... 302
Chapter 18: Flex Hash................................................................................................................303
Flex Hash Capability Overview.................................................................................................................................... 303
Configuring the Flex Hash Mechanism......................................................................................................................303
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 304
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 304
Chapter 19: Force10 Resilient Ring Protocol (FRRP)................................................................. 306
Protocol Overview..........................................................................................................................................................306
Ring Status................................................................................................................................................................. 307
Multiple FRRP Rings.................................................................................................................................................307
Important FRRP Points............................................................................................................................................308
Important FRRP Concepts......................................................................................................................................308
Implementing FRRP........................................................................................................................................................309
FRRP Configuration....................................................................................................................................................... 309
Creating the FRRP Group.......................................................................................................................................309
Configuring the Control VLAN................................................................................................................................310
Configuring and Adding the Member VLANs.......................................................................................................311
Setting the FRRP Timers..........................................................................................................................................311
Clearing the FRRP Counters...................................................................................................................................312
Viewing the FRRP Configuration........................................................................................................................... 312
Viewing the FRRP Information............................................................................................................................... 312
Troubleshooting FRRP....................................................................................................................................................312
Sample Configuration and Topology........................................................................................................................... 313
Chapter 20: GARP VLAN Registration Protocol (GVRP)............................................................. 315
10
Contents
Configure GVRP...............................................................................................................................................................316
Enabling GVRP Globally..................................................................................................................................................316
Enabling GVRP on a Layer 2 Interface....................................................................................................................... 317
Configure GVRP Registration....................................................................................................................................... 317
Configure a GARP Timer................................................................................................................................................318
Chapter 21: Internet Group Management Protocol (IGMP)......................................................... 319
IGMP Protocol Overview............................................................................................................................................... 319
IGMP Version 2.......................................................................................................................................................... 319
IGMP Version 3...........................................................................................................................................................321
Configure IGMP...............................................................................................................................................................323
Viewing IGMP Enabled Interfaces...............................................................................................................................324
Selecting an IGMP Version........................................................................................................................................... 324
Viewing IGMP Groups....................................................................................................................................................325
Adjusting Timers..............................................................................................................................................................325
Adjusting Query and Response Timers................................................................................................................ 325
Adjusting the IGMP Querier Timeout Value........................................................................................................326
Configuring a Static IGMP Group............................................................................................................................... 326
Enabling IGMP Immediate-Leave................................................................................................................................ 326
IGMP Snooping................................................................................................................................................................327
Configuring IGMP Snooping................................................................................................................................... 327
Removing a Group-Port Association.................................................................................................................... 327
Disabling Multicast Flooding...................................................................................................................................328
Specifying a Port as Connected to a Multicast Router................................................................................... 328
Configuring the Switch as Querier........................................................................................................................328
Fast Convergence after MSTP Topology Changes................................................................................................329
Designating a Multicast Router Interface................................................................................................................. 329
Chapter 22: Interfaces.............................................................................................................. 330
Port Numbering Convention......................................................................................................................................... 331
Interface Types................................................................................................................................................................ 331
View Basic Interface Information................................................................................................................................332
Enabling a Physical Interface....................................................................................................................................... 333
Physical Interfaces..........................................................................................................................................................333
Port Pipes....................................................................................................................................................................334
Network Processing Units (NPUs)....................................................................................................................... 334
Configuration Task List for Physical Interfaces.................................................................................................334
Overview of Layer Modes....................................................................................................................................... 334
Configuring Layer 2 (Data Link) Mode................................................................................................................ 335
Configuring Layer 2 (Interface) Mode.................................................................................................................335
Configuring Layer 3 (Network) Mode..................................................................................................................335
Configuring Layer 3 (Interface) Mode.................................................................................................................336
Egress Interface Selection (EIS).................................................................................................................................336
Configuring EIS.......................................................................................................................................................... 337
Management Interfaces.................................................................................................................................................337
Configuring a Dedicated Management Interface ............................................................................................. 337
Configuring a Management Interface on an Ethernet Port............................................................................338
VLAN Interfaces..............................................................................................................................................................339
Loopback Interfaces.......................................................................................................................................................340
Contents
11
Null Interfaces..................................................................................................................................................................340
Port Channel Interfaces................................................................................................................................................ 340
Port Channel Definition and Standards................................................................................................................ 341
Port Channel Benefits...............................................................................................................................................341
Port Channel Implementation................................................................................................................................. 341
10/40 Gbps Interfaces in Port Channels..............................................................................................................341
Configuration Tasks for Port Channel Interfaces..............................................................................................342
Creating a Port Channel.......................................................................................................................................... 342
Adding a Physical Interface to a Port Channel.................................................................................................. 342
Reassigning an Interface to a New Port Channel............................................................................................. 344
Configuring the Minimum Oper Up Links in a Port Channel...........................................................................344
Adding or Removing a Port Channel from a VLAN........................................................................................... 345
Assigning an IP Address to a Port Channel........................................................................................................ 345
Deleting or Disabling a Port Channel....................................................................................................................345
Load Balancing Through Port Channels.............................................................................................................. 346
Load-Balancing Methods.........................................................................................................................................346
Changing the Hash Algorithm................................................................................................................................ 346
Bulk Configuration...........................................................................................................................................................347
Interface Range......................................................................................................................................................... 347
Bulk Configuration Examples..................................................................................................................................347
Defining Interface Range Macros............................................................................................................................... 349
Define the Interface Range.....................................................................................................................................349
Choosing an Interface-Range Macro................................................................................................................... 349
Monitoring and Maintaining Interfaces......................................................................................................................350
Displaying Traffic Statistics on HiGig Ports.............................................................................................................. 351
Link Bundle Monitoring...................................................................................................................................................351
Monitoring HiGig Link Bundles..................................................................................................................................... 351
Enabling HiGig Link-Bundle Monitoring............................................................................................................... 353
Fanning out 40G Ports Dynamically........................................................................................................................... 353
Splitting QSFP Ports to SFP+ Ports..........................................................................................................................353
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port........................................................................ 354
Link Dampening............................................................................................................................................................... 358
Enabling Link Dampening........................................................................................................................................ 358
Using Ethernet Pause Frames for Flow Control......................................................................................................360
Enabling Pause Frames............................................................................................................................................360
Configure the MTU Size on an Interface...................................................................................................................361
Auto-Negotiation on Ethernet Interfaces..................................................................................................................361
Set Auto-Negotiation Options............................................................................................................................... 362
View Advanced Interface Information....................................................................................................................... 362
Configuring the Interface Sampling Size.............................................................................................................363
Dynamic Counters...........................................................................................................................................................364
Clearing Interface Counters................................................................................................................................... 364
Chapter 23: Internet Protocol Security (IPSec).........................................................................366
Configuring IPSec ..........................................................................................................................................................366
Chapter 24: IPv4 Routing.......................................................................................................... 368
IP Addresses.....................................................................................................................................................................369
Configuration Tasks for IP Addresses........................................................................................................................369
12
Contents
Assigning IP Addresses to an Interface.....................................................................................................................369
Configuring Static Routes.............................................................................................................................................370
Configure Static Routes for the Management Interface....................................................................................... 371
Enabling Directed Broadcast.........................................................................................................................................371
Resolution of Host Names............................................................................................................................................ 372
Enabling Dynamic Resolution of Host Names.......................................................................................................... 372
Specifying the Local System Domain and a List of Domains................................................................................372
Configuring DNS with Traceroute...............................................................................................................................373
ARP.....................................................................................................................................................................................373
Configuration Tasks for ARP........................................................................................................................................374
Configuring Static ARP Entries....................................................................................................................................374
Enabling Proxy ARP........................................................................................................................................................ 374
Clearing ARP Cache....................................................................................................................................................... 374
ARP Learning via Gratuitous ARP...............................................................................................................................375
Enabling ARP Learning via Gratuitous ARP.............................................................................................................. 375
ARP Learning via ARP Request................................................................................................................................... 375
Configuring ARP Retries................................................................................................................................................376
ICMP...................................................................................................................................................................................377
Configuration Tasks for ICMP......................................................................................................................................377
Enabling ICMP Unreachable Messages......................................................................................................................377
UDP Helper....................................................................................................................................................................... 377
Enabling UDP Helper...................................................................................................................................................... 378
Configuring a Broadcast Address................................................................................................................................378
Configurations Using UDP Helper...............................................................................................................................379
UDP Helper with Broadcast-All Addresses............................................................................................................... 379
UDP Helper with Subnet Broadcast Addresses...................................................................................................... 380
UDP Helper with Configured Broadcast Addresses............................................................................................... 380
UDP Helper with No Configured Broadcast Addresses......................................................................................... 381
Troubleshooting UDP Helper........................................................................................................................................ 381
Chapter 25: IPv6 Routing.......................................................................................................... 382
Protocol Overview.......................................................................................................................................................... 382
Extended Address Space........................................................................................................................................ 382
Stateless Autoconfiguration................................................................................................................................... 382
IPv6 Headers..............................................................................................................................................................383
IPv6 Header Fields.................................................................................................................................................... 384
Extension Header Fields.......................................................................................................................................... 385
IPv6 Addressing.........................................................................................................................................................386
IPv6 Implementation on the Dell Networking OS....................................................................................................387
Configuring the LPM Table for IPv6 Extended Prefixes....................................................................................... 388
ICMPv6..............................................................................................................................................................................389
Path MTU Discovery......................................................................................................................................................389
IPv6 Neighbor Discovery...............................................................................................................................................390
IPv6 Neighbor Discovery of MTU Packets......................................................................................................... 390
Configuring the IPv6 Recursive DNS Server..................................................................................................... 390
Secure Shell (SSH) Over an IPv6 Transport............................................................................................................392
Configuration Tasks for IPv6....................................................................................................................................... 392
Adjusting Your CAM Profile.................................................................................................................................... 393
Assigning an IPv6 Address to an Interface......................................................................................................... 393
Assigning a Static IPv6 Route................................................................................................................................394
Contents
13
Configuring Telnet with IPv6................................................................................................................................. 394
SNMP over IPv6........................................................................................................................................................394
Displaying IPv6 Information.................................................................................................................................... 395
Displaying an IPv6 Configuration.......................................................................................................................... 395
Displaying IPv6 Routes............................................................................................................................................ 396
Displaying the Running Configuration for an Interface.................................................................................... 397
Clearing IPv6 Routes................................................................................................................................................397
Chapter 26: iSCSI Optimization.................................................................................................398
iSCSI Optimization Overview....................................................................................................................................... 398
Default iSCSI Optimization Values..............................................................................................................................399
iSCSI Optimization Prerequisites................................................................................................................................ 400
Configuring iSCSI Optimization...................................................................................................................................400
Displaying iSCSI Optimization Information............................................................................................................... 402
Enable and Disable iSCSI Optimization......................................................................................................................403
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer................................................................ 403
Monitoring iSCSI Traffic Flows....................................................................................................................................404
Information Monitored in iSCSI Traffic Flows..........................................................................................................404
Detection and Auto-Configuration for Dell EqualLogic Arrays............................................................................ 404
Configuring Detection and Ports for Dell Compellent Arrays.............................................................................. 405
Application of Quality of Service to iSCSI Traffic Flows.......................................................................................405
Chapter 27: Intermediate System to Intermediate System.........................................................407
IS-IS Protocol Overview................................................................................................................................................407
IS-IS Addressing.............................................................................................................................................................. 407
Multi-Topology IS-IS...................................................................................................................................................... 408
Transition Mode.........................................................................................................................................................408
Interface Support......................................................................................................................................................409
Adjacencies.................................................................................................................................................................409
Graceful Restart..............................................................................................................................................................409
Timers.......................................................................................................................................................................... 409
Implementation Information......................................................................................................................................... 409
Configuration Information..............................................................................................................................................410
Configuration Tasks for IS-IS..................................................................................................................................410
Configuring the Distance of a Route.....................................................................................................................417
Changing the IS-Type............................................................................................................................................... 418
Redistributing IPv4 Routes..................................................................................................................................... 420
Redistributing IPv6 Routes......................................................................................................................................421
Configuring Authentication Passwords................................................................................................................ 421
Setting the Overload Bit..........................................................................................................................................422
Debugging IS-IS.........................................................................................................................................................422
IS-IS Metric Styles..........................................................................................................................................................423
Configure Metric Values................................................................................................................................................423
Maximum Values in the Routing Table.................................................................................................................424
Change the IS-IS Metric Style in One Level Only............................................................................................. 424
Leaks from One Level to Another......................................................................................................................... 425
Sample Configurations...................................................................................................................................................426
Chapter 28: Link Aggregation Control Protocol (LACP)............................................................. 429
14
Contents
Introduction to Dynamic LAGs and LACP.................................................................................................................429
Important Points to Remember............................................................................................................................. 429
LACP Modes...............................................................................................................................................................430
Configuring LACP Commands................................................................................................................................430
LACP Configuration Tasks............................................................................................................................................430
Creating a LAG........................................................................................................................................................... 431
Configuring the LAG Interfaces as Dynamic....................................................................................................... 431
Setting the LACP Long Timeout........................................................................................................................... 432
Monitoring and Debugging LACP.......................................................................................................................... 432
Shared LAG State Tracking..........................................................................................................................................432
Configuring Shared LAG State Tracking............................................................................................................. 433
Important Points about Shared LAG State Tracking........................................................................................434
LACP Basic Configuration Example............................................................................................................................435
Configure a LAG on ALPHA....................................................................................................................................435
Chapter 29: Layer 2................................................................................................................... 443
Manage the MAC Address Table.................................................................................................................................443
Clearing the MAC Address Table.......................................................................................................................... 443
Setting the Aging Time for Dynamic Entries...................................................................................................... 443
Configuring a Static MAC Address....................................................................................................................... 444
Displaying the MAC Address Table.......................................................................................................................444
MAC Learning Limit........................................................................................................................................................ 444
Setting the MAC Learning Limit............................................................................................................................ 444
mac learning-limit Dynamic.....................................................................................................................................445
mac learning-limit mac-address-sticky................................................................................................................ 445
mac learning-limit station-move............................................................................................................................ 445
mac learning-limit no-station-move......................................................................................................................445
Learning Limit Violation Actions............................................................................................................................ 446
Setting Station Move Violation Actions...............................................................................................................446
Recovering from Learning Limit and Station Move Violations....................................................................... 447
NIC Teaming.....................................................................................................................................................................447
Configure Redundant Pairs...........................................................................................................................................448
Far-End Failure Detection..............................................................................................................................................451
FEFD State Changes.................................................................................................................................................451
Configuring FEFD......................................................................................................................................................452
Enabling FEFD on an Interface.............................................................................................................................. 453
Debugging FEFD........................................................................................................................................................454
Chapter 30: Link Layer Discovery Protocol (LLDP).................................................................... 455
802.1AB (LLDP) Overview............................................................................................................................................455
Protocol Data Units.................................................................................................................................................. 455
Optional TLVs.................................................................................................................................................................. 456
Management TLVs....................................................................................................................................................456
TIA-1057 (LLDP-MED) Overview............................................................................................................................... 458
TIA Organizationally Specific TLVs.......................................................................................................................458
Configure LLDP............................................................................................................................................................... 462
CONFIGURATION versus INTERFACE Configurations......................................................................................... 462
Enabling LLDP..................................................................................................................................................................463
Disabling and Undoing LLDP...................................................................................................................................463
Contents
15
Enabling LLDP on Management Ports....................................................................................................................... 463
Disabling and Undoing LLDP on Management Ports........................................................................................464
Advertising TLVs............................................................................................................................................................. 464
Viewing the LLDP Configuration.................................................................................................................................465
Viewing Information Advertised by Adjacent LLDP Agents................................................................................. 465
Configuring LLDPDU Intervals.....................................................................................................................................466
Configuring Transmit and Receive Mode.................................................................................................................. 467
Configuring a Time to Live............................................................................................................................................468
Debugging LLDP..............................................................................................................................................................468
Relevant Management Objects................................................................................................................................... 469
Chapter 31: Microsoft Network Load Balancing..........................................................................474
NLB Unicast and Multicast Modes............................................................................................................................. 474
NLB Benefits.................................................................................................................................................................... 475
NLB Restrictions............................................................................................................................................................. 475
NLB VLAN Flooding........................................................................................................................................................475
Configuring NLB on a Switch.......................................................................................................................................476
.......................................................................................................................................................................................476
Chapter 32: Multicast Source Discovery Protocol (MSDP).........................................................477
Anycast RP....................................................................................................................................................................... 478
Implementation Information..........................................................................................................................................479
Configure Multicast Source Discovery Protocol..................................................................................................... 479
Related Configuration Tasks...................................................................................................................................479
Enable MSDP................................................................................................................................................................... 483
Manage the Source-Active Cache..............................................................................................................................484
Viewing the Source-Active Cache........................................................................................................................ 484
Limiting the Source-Active Cache........................................................................................................................ 484
Clearing the Source-Active Cache....................................................................................................................... 485
Enabling the Rejected Source-Active Cache..................................................................................................... 485
Accept Source-Active Messages that Fail the RFP Check.................................................................................. 485
Specifying Source-Active Messages..........................................................................................................................489
Limiting the Source-Active Messages from a Peer................................................................................................490
Preventing MSDP from Caching a Local Source.................................................................................................... 490
Preventing MSDP from Caching a Remote Source................................................................................................ 491
Preventing MSDP from Advertising a Local Source............................................................................................... 491
Logging Changes in Peership States..........................................................................................................................492
Terminating a Peership..................................................................................................................................................492
Clearing Peer Statistics................................................................................................................................................. 493
Debugging MSDP............................................................................................................................................................493
MSDP with Anycast RP.................................................................................................................................................493
Configuring Anycast RP................................................................................................................................................ 494
Reducing Source-Active Message Flooding.......................................................................................................495
Specifying the RP Address Used in SA Messages............................................................................................495
MSDP Sample Configurations......................................................................................................................................497
Chapter 33: Multiple Spanning Tree Protocol (MSTP)............................................................... 500
Spanning Tree Variations...............................................................................................................................................501
Implementation Information.................................................................................................................................... 501
16
Contents
Configure Multiple Spanning Tree Protocol..............................................................................................................501
Related Configuration Tasks...................................................................................................................................501
Enable Multiple Spanning Tree Globally.................................................................................................................... 502
Adding and Removing Interfaces................................................................................................................................ 502
Creating Multiple Spanning Tree Instances..............................................................................................................502
Influencing MSTP Root Selection...............................................................................................................................503
Interoperate with Non-Dell Bridges............................................................................................................................504
Changing the Region Name or Revision....................................................................................................................504
Modifying Global Parameters.......................................................................................................................................504
Modifying the Interface Parameters..........................................................................................................................505
Configuring an EdgePort.............................................................................................................................................. 506
Flush MAC Addresses after a Topology Change.....................................................................................................507
MSTP Sample Configurations...................................................................................................................................... 507
Debugging and Verifying MSTP Configurations.......................................................................................................510
Chapter 34: Multicast Features..................................................................................................512
Enabling IP Multicast...................................................................................................................................................... 512
Multicast with ECMP......................................................................................................................................................512
Implementation Information.......................................................................................................................................... 513
First Packet Forwarding for Lossless Multicast.......................................................................................................514
Multicast Policies.............................................................................................................................................................514
IPv4 Multicast Policies..............................................................................................................................................514
Chapter 35: Open Shortest Path First (OSPFv2 and OSPFv3)....................................................521
Protocol Overview...........................................................................................................................................................521
Autonomous System (AS) Areas............................................................................................................................521
Area Types..................................................................................................................................................................522
Networks and Neighbors.........................................................................................................................................523
Router Types..............................................................................................................................................................523
Designated and Backup Designated Routers..................................................................................................... 524
Link-State Advertisements (LSAs).......................................................................................................................524
Virtual Links................................................................................................................................................................525
Router Priority and Cost......................................................................................................................................... 526
OSPF Implementation....................................................................................................................................................526
Fast Convergence (OSPFv2, IPv4 Only).............................................................................................................527
Multi-Process OSPFv2 (IPv4 only).......................................................................................................................527
RFC-2328 Compliant OSPF Flooding...................................................................................................................527
OSPF ACK Packing...................................................................................................................................................528
Setting OSPF Adjacency with Cisco Routers.................................................................................................... 528
Configuration Information.............................................................................................................................................529
Configuration Task List for OSPFv2 (OSPF for IPv4).....................................................................................529
Sample Configurations for OSPFv2............................................................................................................................ 541
Configuration Task List for OSPFv3 (OSPF for IPv6).......................................................................................... 542
Enabling IPv6 Unicast Routing...............................................................................................................................542
Assigning IPv6 Addresses on an Interface..........................................................................................................543
Assigning Area ID on an Interface.........................................................................................................................543
Assigning OSPFv3 Process ID and Router ID Globally.....................................................................................543
Configuring Stub Areas............................................................................................................................................544
Configuring Passive-Interface............................................................................................................................... 544
Contents
17
Redistributing Routes...............................................................................................................................................544
Configuring a Default Route...................................................................................................................................545
OSPFv3 Authentication Using IPsec....................................................................................................................545
Troubleshooting OSPFv3.........................................................................................................................................551
Chapter 36: Pay As You Grow ................................................................................................... 552
Installing a License..........................................................................................................................................................552
Displaying License Information.................................................................................................................................... 554
Chapter 37: PIM Sparse-Mode (PIM-SM).................................................................................. 556
Implementation Information......................................................................................................................................... 556
Protocol Overview..........................................................................................................................................................556
Requesting Multicast Traffic..................................................................................................................................556
Refuse Multicast Traffic..........................................................................................................................................557
Send Multicast Traffic............................................................................................................................................. 557
Configuring PIM-SM...................................................................................................................................................... 557
Related Configuration Tasks.................................................................................................................................. 558
Enable PIM-SM............................................................................................................................................................... 558
Configuring S,G Expiry Timers.....................................................................................................................................559
Configuring a Static Rendezvous Point.................................................................................................................... 560
Overriding Bootstrap Router Updates.................................................................................................................560
Configuring a Designated Router................................................................................................................................560
Creating Multicast Boundaries and Domains............................................................................................................ 561
Enabling PIM-SM Graceful Restart.............................................................................................................................561
Chapter 38: PIM Source-Specific Mode (PIM-SSM).................................................................. 562
Implementation Information......................................................................................................................................... 562
Configure PIM-SMM......................................................................................................................................................562
Enabling PIM-SSM..........................................................................................................................................................563
Use PIM-SSM with IGMP Version 2 Hosts.............................................................................................................. 563
Chapter 39: Policy-based Routing (PBR)...................................................................................565
Overview...........................................................................................................................................................................565
Implementing Policy-based Routing with Dell Networking OS............................................................................ 567
Configuration Task List for Policy-based Routing.................................................................................................. 567
Sample Configuration......................................................................................................................................................571
Chapter 40: Port Monitoring......................................................................................................574
Local Port Monitoring.................................................................................................................................................... 574
Important Points to Remember............................................................................................................................. 574
Examples of Port Monitoring..................................................................................................................................574
Configuring Port Monitoring...................................................................................................................................576
Remote Port Mirroring...................................................................................................................................................577
Remote Port Mirroring Example............................................................................................................................ 577
Configuring Remote Port Mirroring...................................................................................................................... 578
Displaying a Remote-Port Mirroring Configuration...........................................................................................579
Configuring Remote Port Monitoring...................................................................................................................579
Encapsulated Remote-Port Monitoring.....................................................................................................................582
18
Contents
Chapter 41: Private VLANs (PVLAN)..........................................................................................584
Private VLAN Concepts................................................................................................................................................ 584
Using the Private VLAN Commands.......................................................................................................................... 585
Configuration Task List................................................................................................................................................. 586
Creating PVLAN ports............................................................................................................................................. 586
Creating a Primary VLAN........................................................................................................................................ 587
Creating a Community VLAN................................................................................................................................. 587
Creating an Isolated VLAN......................................................................................................................................588
Private VLAN Configuration Example........................................................................................................................589
Inspecting the Private VLAN Configuration.............................................................................................................590
Chapter 42: Per-VLAN Spanning Tree Plus (PVST+)..................................................................592
Protocol Overview..........................................................................................................................................................592
Implementation Information......................................................................................................................................... 593
Configure Per-VLAN Spanning Tree Plus................................................................................................................. 593
Enabling PVST+...............................................................................................................................................................594
Disabling PVST+..............................................................................................................................................................594
Influencing PVST+ Root Selection............................................................................................................................. 594
Modifying Global PVST+ Parameters........................................................................................................................ 596
Modifying Interface PVST+ Parameters................................................................................................................... 596
Configuring an EdgePort...............................................................................................................................................597
PVST+ in Multi-Vendor Networks.............................................................................................................................. 598
Enabling PVST+ Extend System ID............................................................................................................................ 598
PVST+ Sample Configurations.................................................................................................................................... 599
Chapter 43: Quality of Service (QoS).........................................................................................601
Implementation Information......................................................................................................................................... 602
Port-Based QoS Configurations..................................................................................................................................602
Setting dot1p Priorities for Incoming Traffic......................................................................................................602
Honoring dot1p Priorities on Ingress Traffic.......................................................................................................603
Configuring Port-Based Rate Policing................................................................................................................. 603
Configuring Port-Based Rate Shaping.................................................................................................................604
Policy-Based QoS Configurations...............................................................................................................................605
Classify Traffic...........................................................................................................................................................605
Create a QoS Policy................................................................................................................................................. 609
Create Policy Maps................................................................................................................................................... 612
DSCP Color Maps............................................................................................................................................................615
Creating a DSCP Color Map...............................................................................................................................615
Displaying DSCP Color Maps.................................................................................................................................. 616
Displaying a DSCP Color Policy Configuration ...................................................................................................617
Enabling QoS Rate Adjustment.................................................................................................................................... 617
Enabling Strict-Priority Queueing................................................................................................................................ 618
Weighted Random Early Detection............................................................................................................................. 618
Creating WRED Profiles........................................................................................................................................... 619
Applying a WRED Profile to Traffic....................................................................................................................... 619
Displaying Default and Configured WRED Profiles............................................................................................619
Displaying WRED Drop Statistics.......................................................................................................................... 620
Explicit Congestion Notification..................................................................................................................................620
Contents
19
ECN Packet Classification...................................................................................................................................... 620
Example: Color-marking non-ECN Packets in One Traffic Class...................................................................621
Example: Color-marking non-ECN Packets in Different Traffic Classes......................................................621
Using A Configurable Weight for WRED and ECN................................................................................................. 622
Benefits of Using a Configurable Weight for WRED with ECN..................................................................... 622
Setting Average Queue Size using a Weight......................................................................................................623
Global Service-Pools for WRED with ECN......................................................................................................... 623
Configuring a Weight for WRED and ECN Operation...................................................................................... 624
Pre-Calculating Available QoS CAM Space..............................................................................................................625
SNMP Support for Buffer Statistics Tracking.........................................................................................................626
Chapter 44: Routing Information Protocol (RIP)........................................................................627
Protocol Overview.......................................................................................................................................................... 627
RIPv1.............................................................................................................................................................................627
RIPv2............................................................................................................................................................................627
Implementation Information..........................................................................................................................................627
Configuration Information.............................................................................................................................................628
Configuration Task List............................................................................................................................................628
RIP Configuration Example..................................................................................................................................... 633
Chapter 45: Remote Monitoring (RMON).................................................................................. 639
Implementation Information......................................................................................................................................... 639
Fault Recovery.................................................................................................................................................................639
Setting the RMON Alarm........................................................................................................................................ 639
Configuring an RMON Event................................................................................................................................. 640
Configuring RMON Collection Statistics..............................................................................................................641
Configuring the RMON Collection History.......................................................................................................... 641
Chapter 46: Rapid Spanning Tree Protocol (RSTP)....................................................................643
Protocol Overview..........................................................................................................................................................643
Configuring Rapid Spanning Tree............................................................................................................................... 643
Important Points to Remember...................................................................................................................................644
RSTP and VLT............................................................................................................................................................644
Configuring Interfaces for Layer 2 Mode..................................................................................................................644
Enabling Rapid Spanning Tree Protocol Globally.................................................................................................... 645
Adding and Removing Interfaces................................................................................................................................ 647
Modifying Global Parameters....................................................................................................................................... 647
Enabling SNMP Traps for Root Elections and Topology Changes................................................................648
Modifying Interface Parameters..................................................................................................................................648
Influencing RSTP Root Selection................................................................................................................................648
Configuring an EdgePort...............................................................................................................................................649
Configuring Fast Hellos for Link State Detection...................................................................................................650
Chapter 47: Security..................................................................................................................651
Role-Based Access Control...........................................................................................................................................651
Overview of RBAC.................................................................................................................................................... 651
User Roles...................................................................................................................................................................653
AAA Authentication and Authorization for Roles.............................................................................................. 656
Role Accounting........................................................................................................................................................ 659
20
Contents
/