Dell Networking Z9500 Reference guide

Category
Software
Type
Reference guide
Dell Networking Configuration Guide for the
Z9500 Switch
9.7(0.0)
March 2015
Rev. A00
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
NOTE: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein
may be trademarks of their respective companies.
Chapter 1: About this Guide......................................................................................................... 27
Audience.............................................................................................................................................................................. 27
Conventions........................................................................................................................................................................ 27
Related Documents...........................................................................................................................................................27
Chapter 2: Configuration Fundamentals...................................................................................... 28
Accessing the Command Line........................................................................................................................................ 28
CLI Modes........................................................................................................................................................................... 28
Navigating CLI Modes................................................................................................................................................ 29
The do Command...............................................................................................................................................................31
Undoing Commands..........................................................................................................................................................32
Obtaining Help....................................................................................................................................................................33
Entering and Editing Commands................................................................................................................................... 33
Command History..............................................................................................................................................................34
Filtering show Command Outputs.................................................................................................................................34
Multiple Users in Configuration Mode..........................................................................................................................36
Chapter 3: Getting Started..........................................................................................................37
Console Access.................................................................................................................................................................. 37
Serial Console............................................................................................................................................................... 38
Default Configuration....................................................................................................................................................... 39
Configuring a Host Name................................................................................................................................................ 39
Accessing the System Remotely................................................................................................................................... 39
Configure the Management Port IP Address....................................................................................................... 39
Configure a Management Route..............................................................................................................................40
Configuring a Username and Password................................................................................................................. 40
Configuring the Enable Password................................................................................................................................. 40
Manage Configuration Files............................................................................................................................................. 41
File Storage....................................................................................................................................................................41
Copy Files to and from the System......................................................................................................................... 41
Save the Running-Configuration............................................................................................................................. 42
Configure the Overload Bit for a Startup Scenario.............................................................................................43
Viewing Files................................................................................................................................................................. 43
Changes in Configuration Files.................................................................................................................................44
Enabling Software Features on Devices Using a Command Option..................................................................... 44
View Command History................................................................................................................................................... 45
Upgrading the Dell Networking OS...............................................................................................................................45
Using Hashes to Validate Software Images........................................................................................................45
Chapter 4: Switch Management...................................................................................................47
Configuring Privilege Levels............................................................................................................................................47
Removing a Command from EXEC Mode..............................................................................................................48
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 48
Allowing Access to CONFIGURATION Mode Commands................................................................................. 48
Contents
Contents 3
Allowing Access to the Following Modes.............................................................................................................. 48
Applying a Privilege Level to a Username............................................................................................................. 50
Applying a Privilege Level to a Terminal Line....................................................................................................... 50
Configuring Logging......................................................................................................................................................... 50
Audit and Security Logs.............................................................................................................................................50
Configuring Logging Format .............................................................................................................................52
Setting Up a Secure Connection to a Syslog Server................................................................................ 53
Log Messages in the Internal Buffer............................................................................................................................ 54
Disabling System Logging............................................................................................................................................... 54
Sending System Messages to a Syslog Server.......................................................................................................... 54
Configuring a UNIX System as a Syslog Server...................................................................................................55
Display the Logging Buffer and the Logging Configuration....................................................................................55
Changing System Logging Settings..............................................................................................................................55
Configuring a UNIX Logging Facility Level..................................................................................................................56
Synchronizing Log Messages......................................................................................................................................... 57
Enabling Timestamp on Syslog Messages...................................................................................................................57
File Transfer Services.......................................................................................................................................................58
Enabling the FTP Server............................................................................................................................................58
Configuring FTP Server Parameters...................................................................................................................... 59
Configuring FTP Client Parameters........................................................................................................................59
Terminal Lines.................................................................................................................................................................... 59
Denying and Permitting Access to a Terminal Line.............................................................................................60
Configuring Login Authentication for Terminal Lines......................................................................................... 60
Setting Time Out of EXEC Privilege Mode..................................................................................................................61
Using Telnet to Access Another Network Device......................................................................................................61
Lock CONFIGURATION Mode....................................................................................................................................... 62
Recovering from a Forgotten Password on the Z9500...........................................................................................63
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration.............................63
Recovering from a Failed Start on the Z9500........................................................................................................... 63
Restoring Factory-Default Settings..............................................................................................................................64
Restoring Factory-Default Boot Environment Variables....................................................................................64
Chapter 5: 802.1X........................................................................................................................67
The Port-Authentication Process................................................................................................................................. 69
EAP over RADIUS........................................................................................................................................................69
Configuring 802.1X............................................................................................................................................................70
Important Points to Remember..................................................................................................................................... 70
Enabling 802.1X...................................................................................................................................................................71
Configuring Request Identity Re-Transmissions........................................................................................................72
Configuring a Quiet Period after a Failed Authentication..................................................................................73
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 73
Re-Authenticating a Port.................................................................................................................................................74
Configuring Timeouts....................................................................................................................................................... 75
Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................76
Guest and Authentication-Fail VLANs..........................................................................................................................77
Configuring a Guest VLAN........................................................................................................................................ 77
Configuring an Authentication-Fail VLAN..............................................................................................................77
Chapter 6: Access Control Lists (ACLs).......................................................................................79
4
Contents
IP Access Control Lists (ACLs)..................................................................................................................................... 80
CAM Usage................................................................................................................................................................... 80
Implementing ACLs .....................................................................................................................................................81
IP Fragment Handling.......................................................................................................................................................82
IP Fragments ACL Examples.....................................................................................................................................82
Layer 4 ACL Rules Examples.................................................................................................................................... 83
Configure a Standard IP ACL......................................................................................................................................... 84
Configuring a Standard IP ACL Filter..................................................................................................................... 84
Configure an Extended IP ACL...................................................................................................................................... 85
Configuring Filters with a Sequence Number.......................................................................................................85
Configuring Filters Without a Sequence Number................................................................................................86
Configure Layer 2 and Layer 3 ACLs............................................................................................................................87
Using ACL VLAN Groups.................................................................................................................................................88
Guidelines for Configuring ACL VLAN Groups..................................................................................................... 88
Configuring an ACL VLAN Group............................................................................................................................ 88
Allocating ACL VLAN CAM....................................................................................................................................... 89
Applying an IP ACL to an Interface...............................................................................................................................90
Configure Ingress ACLs............................................................................................................................................. 90
Configure Egress ACLs...............................................................................................................................................91
Applying Egress Layer 3 ACLs (Control-Plane)....................................................................................................91
Counting ACL Hits.......................................................................................................................................................92
IP Prefix Lists..................................................................................................................................................................... 92
Configuration Task List for Prefix Lists................................................................................................................. 93
ACL Resequencing............................................................................................................................................................96
Resequencing an ACL or Prefix List....................................................................................................................... 96
Route Maps.........................................................................................................................................................................97
Important Points to Remember..................................................................................................................................... 98
Configuration Task List for Route Maps................................................................................................................98
Configuring Match Routes...................................................................................................................................... 100
Configuring Set Conditions...................................................................................................................................... 101
Configure a Route Map for Route Redistribution.............................................................................................. 102
Configure a Route Map for Route Tagging......................................................................................................... 102
Continue Clause......................................................................................................................................................... 103
Chapter 7: Bare Metal Provisioning (BMP).................................................................................104
Chapter 8: Bidirectional Forwarding Detection (BFD)................................................................ 105
How BFD Works...............................................................................................................................................................105
BFD Packet Format...................................................................................................................................................106
BFD Sessions.............................................................................................................................................................. 107
BFD Three-Way Handshake....................................................................................................................................108
Session State Changes.............................................................................................................................................109
Important Points to Remember....................................................................................................................................109
Configure BFD..................................................................................................................................................................109
Configure BFD for Static Routes............................................................................................................................110
Configure BFD for OSPF........................................................................................................................................... 111
Configure BFD for OSPFv3......................................................................................................................................113
Configure BFD for IS-IS............................................................................................................................................115
Configure BFD for BGP.............................................................................................................................................117
Contents
5
Configure BFD for VRRP......................................................................................................................................... 122
Configuring Protocol Liveness................................................................................................................................125
Chapter 9: Border Gateway Protocol IPv4 (BGPv4)....................................................................126
Autonomous Systems (AS)........................................................................................................................................... 126
Sessions and Peers..........................................................................................................................................................128
Establish a Session.................................................................................................................................................... 128
Route Reflectors..............................................................................................................................................................129
BGP Attributes................................................................................................................................................................. 130
Best Path Selection Criteria....................................................................................................................................130
Weight.......................................................................................................................................................................... 132
Local Preference........................................................................................................................................................ 132
Multi-Exit Discriminators (MEDs).......................................................................................................................... 133
Origin.............................................................................................................................................................................134
AS Path........................................................................................................................................................................ 134
Next Hop......................................................................................................................................................................135
Multiprotocol BGP...........................................................................................................................................................135
Implement BGP ............................................................................................................................................................... 135
Advertise IGP Cost as MED for Redistributed Routes..................................................................................... 136
Ignore Router-ID for Some Best-Path Calculations.......................................................................................... 136
Four-Byte AS Numbers............................................................................................................................................ 136
AS4 Number Representation...................................................................................................................................137
AS Number Migration............................................................................................................................................... 138
BGP4 Management Information Base (MIB)...................................................................................................... 139
Important Points to Remember..............................................................................................................................140
Configuration Information..............................................................................................................................................140
BGP Configuration........................................................................................................................................................... 141
Enabling BGP............................................................................................................................................................... 141
Configuring AS4 Number Representations..........................................................................................................144
Configuring Peer Groups..........................................................................................................................................146
Configuring BGP Fast Fail-Over.............................................................................................................................148
Configuring Passive Peering................................................................................................................................... 149
Maintaining Existing AS Numbers During an AS Migration............................................................................. 150
Allowing an AS Number to Appear in its Own AS Path.....................................................................................151
Enabling Neighbor Graceful Restart...................................................................................................................... 151
Filtering on an AS-Path Attribute.......................................................................................................................... 152
Regular Expressions as Filters................................................................................................................................ 153
Redistributing Routes............................................................................................................................................... 154
Enabling Additional Paths........................................................................................................................................ 155
Configuring IP Community Lists.............................................................................................................................155
Configuring an IP Extended Community List...................................................................................................... 156
Filtering Routes with Community Lists.................................................................................................................157
Manipulating the COMMUNITY Attribute............................................................................................................157
Changing MED Attributes........................................................................................................................................159
Changing the LOCAL_PREFERENCE Attribute.................................................................................................159
Changing the NEXT_HOP Attribute..................................................................................................................... 160
Changing the WEIGHT Attribute........................................................................................................................... 160
Enabling Multipath.....................................................................................................................................................160
Filtering BGP Routes................................................................................................................................................. 161
Filtering BGP Routes Using Route Maps............................................................................................................. 162
6
Contents
Filtering BGP Routes Using AS-PATH Information........................................................................................... 162
Configuring BGP Route Reflectors........................................................................................................................163
Aggregating Routes...................................................................................................................................................163
Configuring BGP Confederations...........................................................................................................................164
Enabling Route Flap Dampening.............................................................................................................................164
Changing BGP Timers...............................................................................................................................................166
Enabling BGP Neighbor Soft-Reconfiguration....................................................................................................167
Route Map Continue................................................................................................................................................. 168
Enabling MBGP Configurations....................................................................................................................................168
BGP Regular Expression Optimization....................................................................................................................... 169
Debugging BGP................................................................................................................................................................169
Storing Last and Bad PDUs..................................................................................................................................... 170
Capturing PDUs..........................................................................................................................................................170
PDU Counters............................................................................................................................................................. 172
Sample Configurations....................................................................................................................................................172
Chapter 10: Content Addressable Memory (CAM)...................................................................... 180
CAM Allocation.................................................................................................................................................................180
Test CAM Usage...............................................................................................................................................................181
View CAM-ACL Settings................................................................................................................................................182
View CAM Usage............................................................................................................................................................. 183
Return to the Default CAM Configuration.................................................................................................................183
CAM Optimization........................................................................................................................................................... 184
Applications for CAM Profiling..................................................................................................................................... 184
Unified Forwarding Table (UFT) Modes.................................................................................................................... 185
Configuring UFT Modes........................................................................................................................................... 185
Chapter 11: Control Plane Policing (CoPP)................................................................................. 186
Z9500 CoPP Implementation....................................................................................................................................... 186
CoPP Example.................................................................................................................................................................. 187
Configure Control Plane Policing.................................................................................................................................189
Configuring CoPP for Protocols.............................................................................................................................189
Examples of Configuring CoPP for Protocols.....................................................................................................189
Configuring CoPP for CPU Queues...................................................................................................................... 190
Examples of Configuring CoPP for CPU Queues................................................................................................191
Displaying CoPP Configuration...............................................................................................................................192
Troubleshooting CoPP Operation................................................................................................................................ 194
Chapter 12: Data Center Bridging (DCB).................................................................................... 201
Ethernet Enhancements in Data Center Bridging....................................................................................................201
Priority-Based Flow Control................................................................................................................................... 202
Enhanced Transmission Selection.........................................................................................................................203
Data Center Bridging Exchange Protocol (DCBx)............................................................................................204
Data Center Bridging in a Traffic Flow................................................................................................................ 204
Enabling Data Center Bridging.................................................................................................................................... 205
QoS dot1p Traffic Classification and Queue Assignment......................................................................................205
SNMP Support for PFC and Buffer Statistics Tracking........................................................................................206
DCB Maps and its Attributes....................................................................................................................................... 206
Data Center Bridging: Default Configuration...........................................................................................................209
Contents
7
Configuring PFC and ETS in a DCB Map.................................................................................................................. 209
Configuring Priority-Based Flow Control................................................................................................................... 212
Configuring Lossless Queues.................................................................................................................................. 212
Configure Enhanced Transmission Selection............................................................................................................ 213
ETS Prerequisites and Restrictions....................................................................................................................... 213
Creating an ETS Priority Group..............................................................................................................................213
ETS Operation with DCBx....................................................................................................................................... 214
Configuring Bandwidth Allocation for DCBx CIN............................................................................................... 215
Applying the DCB Policies on Linecard.......................................................................................................................215
Applying DCB Policies on SFM Ports..........................................................................................................................216
Configure a DCBx Operation........................................................................................................................................ 216
DCBx Operation......................................................................................................................................................... 216
DCBx Port Roles........................................................................................................................................................ 216
DCB Configuration Exchange................................................................................................................................. 218
Configuration Source Election................................................................................................................................ 218
Propagation of DCB Information............................................................................................................................218
Auto-Detection and Manual Configuration of the DCBx Version.................................................................. 219
Behavior of Tagged Packets................................................................................................................................... 219
Configuration Example for DSCP and PFC Priorities........................................................................................219
DCBx Example............................................................................................................................................................220
DCBx Prerequisites and Restrictions.................................................................................................................... 221
Configuring DCBx...................................................................................................................................................... 221
Verifying the DCB Configuration.................................................................................................................................224
Generation of PFC for a Priority for Untagged Packets....................................................................................... 234
Operations on Untagged Packets............................................................................................................................... 234
Performing PFC Using DSCP Bits Instead of 802.1p Bits.....................................................................................234
PFC and ETS Configuration Examples.......................................................................................................................235
Using PFC and ETS to Manage Data Center Traffic............................................................................................. 235
Using PFC and ETS to Manage Converged Ethernet Traffic.........................................................................237
Hierarchical Scheduling in ETS Output Policies.................................................................................................237
Priority-Based Flow Control Using Dynamic Buffer Method................................................................................238
Configuring the Dynamic Buffer Method..................................................................................................................239
Sample Configurations...................................................................................................................................................240
Chapter 13: Debugging and Diagnostics..................................................................................... 244
Offline Diagnostics..........................................................................................................................................................244
Running Offline Diagnostics....................................................................................................................................244
Examples of Running Offline Diagnostics............................................................................................................245
TRACE Logs..................................................................................................................................................................... 252
Auto Save on Reload, Crash, or Rollover............................................................................................................ 252
Last Restart Reason.......................................................................................................................................................253
show hardware Commands.......................................................................................................................................... 253
Environmental Monitoring.............................................................................................................................................254
Display Power Supply Status..................................................................................................................................254
Display Fan Status.................................................................................................................................................... 255
Display Transceiver Type........................................................................................................................................ 256
Recognize an Over-Temperature Condition.......................................................................................................257
Troubleshoot an Over-Temperature Condition..................................................................................................258
Troubleshooting Packet Loss.......................................................................................................................................259
Displaying Drop Counters........................................................................................................................................260
8
Contents
Displaying Dataplane Statistics...............................................................................................................................261
Displaying Line-Card Counters.............................................................................................................................. 262
Accessing Application Core Dumps............................................................................................................................ 263
Mini Core Dumps.............................................................................................................................................................263
Full Kernel Core Dumps................................................................................................................................................. 264
Enabling TCP Dumps......................................................................................................................................................264
Chapter 14: Dynamic Host Configuration Protocol (DHCP)........................................................ 265
DHCP Packet Format and Options.............................................................................................................................265
Assign an IP Address using DHCP.............................................................................................................................. 266
Implementation Information..........................................................................................................................................267
Configure the System to be a DHCP Server............................................................................................................268
Configuring the Server for Automatic Address Allocation..............................................................................268
Specifying a Default Gateway................................................................................................................................269
Configure a Method of Hostname Resolution....................................................................................................270
Using DNS for Address Resolution....................................................................................................................... 270
Using NetBIOS WINS for Address Resolution....................................................................................................270
Creating Manual Binding Entries........................................................................................................................... 270
Debugging the DHCP Server...................................................................................................................................271
Using DHCP Clear Commands................................................................................................................................ 271
Configure the System to be a Relay Agent............................................................................................................... 271
Configure the System to be a DHCP Client............................................................................................................. 273
DHCP Client on a Management Interface...........................................................................................................273
DHCP Client Operation with Other Features..................................................................................................... 273
Configure Secure DHCP................................................................................................................................................274
Option 82.....................................................................................................................................................................274
DHCP Snooping......................................................................................................................................................... 275
Drop DHCP Packets on Snooped VLANs Only.................................................................................................. 278
Dynamic ARP Inspection..........................................................................................................................................278
Configuring Dynamic ARP Inspection...................................................................................................................279
Source Address Validation............................................................................................................................................280
Enabling IP Source Address Validation................................................................................................................ 280
DHCP MAC Source Address Validation...............................................................................................................280
Enabling IP+MAC Source Address Validation.................................................................................................... 280
Viewing the Number of SAV Dropped Packets.................................................................................................. 281
Clearing the Number of SAV Dropped Packets..................................................................................................281
Chapter 15: Equal Cost Multi-Path (ECMP)............................................................................... 282
ECMP for Flow-Based Affinity.................................................................................................................................... 282
Enabling Deterministic ECMP Next Hop............................................................................................................. 282
Configuring the Hash Algorithm Seed..................................................................................................................282
Link Bundle Monitoring..................................................................................................................................................283
Managing ECMP Group Paths............................................................................................................................... 283
Creating an ECMP Group Bundle..........................................................................................................................283
Modifying the ECMP Group Threshold................................................................................................................284
ECMP Support in L3 Host and LPM Tables............................................................................................................. 284
Chapter 16: FCoE Transit...........................................................................................................286
Fibre Channel over Ethernet........................................................................................................................................286
Contents
9
Ensure Robustness in a Converged Ethernet Network.........................................................................................286
FIP Snooping on Ethernet Bridges..............................................................................................................................287
Using FIP Snooping........................................................................................................................................................ 289
FIP Snooping Prerequisites.....................................................................................................................................289
Important Points to Remember............................................................................................................................. 289
Enabling the FCoE Transit Feature.......................................................................................................................290
Enable FIP Snooping on VLANs.............................................................................................................................290
Configure the FC-MAP Value................................................................................................................................. 291
Configure a Port for a Bridge-to-Bridge Link..................................................................................................... 291
Configure a Port for a Bridge-to-FCF Link..........................................................................................................291
Impact on Other Software Features..................................................................................................................... 291
FIP Snooping Restrictions........................................................................................................................................291
Configuring FIP Snooping....................................................................................................................................... 292
FCoE Transit Configuration Example......................................................................................................................... 293
Displaying FIP Snooping Information..........................................................................................................................294
Chapter 17: Enabling FIPS Cryptography................................................................................... 300
Configuration Tasks....................................................................................................................................................... 300
Preparing the System.................................................................................................................................................... 300
Enabling FIPS Mode........................................................................................................................................................ 301
Generating Host-Keys.................................................................................................................................................... 301
Monitoring FIPS Mode Status...................................................................................................................................... 301
Disabling FIPS Mode...................................................................................................................................................... 302
Chapter 18: Flex Hash................................................................................................................303
Flex Hash Capability Overview.................................................................................................................................... 303
Configuring the Flex Hash Mechanism......................................................................................................................303
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 304
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 304
Chapter 19: Force10 Resilient Ring Protocol (FRRP)................................................................. 306
Protocol Overview..........................................................................................................................................................306
Ring Status................................................................................................................................................................. 307
Multiple FRRP Rings.................................................................................................................................................307
Important FRRP Points............................................................................................................................................308
Important FRRP Concepts......................................................................................................................................308
Implementing FRRP........................................................................................................................................................309
FRRP Configuration....................................................................................................................................................... 309
Creating the FRRP Group.......................................................................................................................................309
Configuring the Control VLAN................................................................................................................................310
Configuring and Adding the Member VLANs.......................................................................................................311
Setting the FRRP Timers..........................................................................................................................................311
Clearing the FRRP Counters...................................................................................................................................312
Viewing the FRRP Configuration........................................................................................................................... 312
Viewing the FRRP Information............................................................................................................................... 312
Troubleshooting FRRP....................................................................................................................................................312
Sample Configuration and Topology........................................................................................................................... 313
Chapter 20: GARP VLAN Registration Protocol (GVRP)............................................................. 315
10
Contents
Configure GVRP...............................................................................................................................................................316
Enabling GVRP Globally..................................................................................................................................................316
Enabling GVRP on a Layer 2 Interface....................................................................................................................... 317
Configure GVRP Registration....................................................................................................................................... 317
Configure a GARP Timer................................................................................................................................................318
Chapter 21: Internet Group Management Protocol (IGMP)......................................................... 319
IGMP Protocol Overview............................................................................................................................................... 319
IGMP Version 2.......................................................................................................................................................... 319
IGMP Version 3...........................................................................................................................................................321
Configure IGMP...............................................................................................................................................................323
Viewing IGMP Enabled Interfaces...............................................................................................................................324
Selecting an IGMP Version........................................................................................................................................... 324
Viewing IGMP Groups....................................................................................................................................................325
Adjusting Timers..............................................................................................................................................................325
Adjusting Query and Response Timers................................................................................................................ 325
Adjusting the IGMP Querier Timeout Value........................................................................................................326
Configuring a Static IGMP Group............................................................................................................................... 326
Enabling IGMP Immediate-Leave................................................................................................................................ 326
IGMP Snooping................................................................................................................................................................327
Configuring IGMP Snooping................................................................................................................................... 327
Removing a Group-Port Association.................................................................................................................... 327
Disabling Multicast Flooding...................................................................................................................................328
Specifying a Port as Connected to a Multicast Router................................................................................... 328
Configuring the Switch as Querier........................................................................................................................328
Fast Convergence after MSTP Topology Changes................................................................................................329
Designating a Multicast Router Interface................................................................................................................. 329
Chapter 22: Interfaces.............................................................................................................. 330
Port Numbering Convention......................................................................................................................................... 331
Interface Types................................................................................................................................................................ 331
View Basic Interface Information................................................................................................................................332
Enabling a Physical Interface....................................................................................................................................... 333
Physical Interfaces..........................................................................................................................................................333
Port Pipes....................................................................................................................................................................334
Network Processing Units (NPUs)....................................................................................................................... 334
Configuration Task List for Physical Interfaces.................................................................................................334
Overview of Layer Modes....................................................................................................................................... 334
Configuring Layer 2 (Data Link) Mode................................................................................................................ 335
Configuring Layer 2 (Interface) Mode.................................................................................................................335
Configuring Layer 3 (Network) Mode..................................................................................................................335
Configuring Layer 3 (Interface) Mode.................................................................................................................336
Egress Interface Selection (EIS).................................................................................................................................336
Configuring EIS.......................................................................................................................................................... 337
Management Interfaces.................................................................................................................................................337
Configuring a Dedicated Management Interface ............................................................................................. 337
Configuring a Management Interface on an Ethernet Port............................................................................338
VLAN Interfaces..............................................................................................................................................................339
Loopback Interfaces.......................................................................................................................................................340
Contents
11
Null Interfaces..................................................................................................................................................................340
Port Channel Interfaces................................................................................................................................................ 340
Port Channel Definition and Standards................................................................................................................ 341
Port Channel Benefits...............................................................................................................................................341
Port Channel Implementation................................................................................................................................. 341
10/40 Gbps Interfaces in Port Channels..............................................................................................................341
Configuration Tasks for Port Channel Interfaces..............................................................................................342
Creating a Port Channel.......................................................................................................................................... 342
Adding a Physical Interface to a Port Channel.................................................................................................. 342
Reassigning an Interface to a New Port Channel............................................................................................. 344
Configuring the Minimum Oper Up Links in a Port Channel...........................................................................344
Adding or Removing a Port Channel from a VLAN........................................................................................... 345
Assigning an IP Address to a Port Channel........................................................................................................ 345
Deleting or Disabling a Port Channel....................................................................................................................345
Load Balancing Through Port Channels.............................................................................................................. 346
Load-Balancing Methods.........................................................................................................................................346
Changing the Hash Algorithm................................................................................................................................ 346
Bulk Configuration...........................................................................................................................................................347
Interface Range......................................................................................................................................................... 347
Bulk Configuration Examples..................................................................................................................................347
Defining Interface Range Macros............................................................................................................................... 349
Define the Interface Range.....................................................................................................................................349
Choosing an Interface-Range Macro................................................................................................................... 349
Monitoring and Maintaining Interfaces......................................................................................................................350
Displaying Traffic Statistics on HiGig Ports.............................................................................................................. 351
Link Bundle Monitoring...................................................................................................................................................351
Monitoring HiGig Link Bundles..................................................................................................................................... 351
Enabling HiGig Link-Bundle Monitoring............................................................................................................... 353
Fanning out 40G Ports Dynamically........................................................................................................................... 353
Splitting QSFP Ports to SFP+ Ports..........................................................................................................................353
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port........................................................................ 354
Link Dampening............................................................................................................................................................... 358
Enabling Link Dampening........................................................................................................................................ 358
Using Ethernet Pause Frames for Flow Control......................................................................................................360
Enabling Pause Frames............................................................................................................................................360
Configure the MTU Size on an Interface...................................................................................................................361
Auto-Negotiation on Ethernet Interfaces..................................................................................................................361
Set Auto-Negotiation Options............................................................................................................................... 362
View Advanced Interface Information....................................................................................................................... 362
Configuring the Interface Sampling Size.............................................................................................................363
Dynamic Counters...........................................................................................................................................................364
Clearing Interface Counters................................................................................................................................... 364
Chapter 23: Internet Protocol Security (IPSec).........................................................................366
Configuring IPSec ..........................................................................................................................................................366
Chapter 24: IPv4 Routing.......................................................................................................... 368
IP Addresses.....................................................................................................................................................................369
Configuration Tasks for IP Addresses........................................................................................................................369
12
Contents
Assigning IP Addresses to an Interface.....................................................................................................................369
Configuring Static Routes.............................................................................................................................................370
Configure Static Routes for the Management Interface....................................................................................... 371
Enabling Directed Broadcast.........................................................................................................................................371
Resolution of Host Names............................................................................................................................................ 372
Enabling Dynamic Resolution of Host Names.......................................................................................................... 372
Specifying the Local System Domain and a List of Domains................................................................................372
Configuring DNS with Traceroute...............................................................................................................................373
ARP.....................................................................................................................................................................................373
Configuration Tasks for ARP........................................................................................................................................374
Configuring Static ARP Entries....................................................................................................................................374
Enabling Proxy ARP........................................................................................................................................................ 374
Clearing ARP Cache....................................................................................................................................................... 374
ARP Learning via Gratuitous ARP...............................................................................................................................375
Enabling ARP Learning via Gratuitous ARP.............................................................................................................. 375
ARP Learning via ARP Request................................................................................................................................... 375
Configuring ARP Retries................................................................................................................................................376
ICMP...................................................................................................................................................................................377
Configuration Tasks for ICMP......................................................................................................................................377
Enabling ICMP Unreachable Messages......................................................................................................................377
UDP Helper....................................................................................................................................................................... 377
Enabling UDP Helper...................................................................................................................................................... 378
Configuring a Broadcast Address................................................................................................................................378
Configurations Using UDP Helper...............................................................................................................................379
UDP Helper with Broadcast-All Addresses............................................................................................................... 379
UDP Helper with Subnet Broadcast Addresses...................................................................................................... 380
UDP Helper with Configured Broadcast Addresses............................................................................................... 380
UDP Helper with No Configured Broadcast Addresses......................................................................................... 381
Troubleshooting UDP Helper........................................................................................................................................ 381
Chapter 25: IPv6 Routing.......................................................................................................... 382
Protocol Overview.......................................................................................................................................................... 382
Extended Address Space........................................................................................................................................ 382
Stateless Autoconfiguration................................................................................................................................... 382
IPv6 Headers..............................................................................................................................................................383
IPv6 Header Fields.................................................................................................................................................... 384
Extension Header Fields.......................................................................................................................................... 385
IPv6 Addressing.........................................................................................................................................................386
IPv6 Implementation on the Dell Networking OS....................................................................................................387
Configuring the LPM Table for IPv6 Extended Prefixes....................................................................................... 388
ICMPv6..............................................................................................................................................................................389
Path MTU Discovery......................................................................................................................................................389
IPv6 Neighbor Discovery...............................................................................................................................................390
IPv6 Neighbor Discovery of MTU Packets......................................................................................................... 390
Configuring the IPv6 Recursive DNS Server..................................................................................................... 390
Secure Shell (SSH) Over an IPv6 Transport............................................................................................................392
Configuration Tasks for IPv6....................................................................................................................................... 392
Adjusting Your CAM Profile.................................................................................................................................... 393
Assigning an IPv6 Address to an Interface......................................................................................................... 393
Assigning a Static IPv6 Route................................................................................................................................394
Contents
13
Configuring Telnet with IPv6................................................................................................................................. 394
SNMP over IPv6........................................................................................................................................................394
Displaying IPv6 Information.................................................................................................................................... 395
Displaying an IPv6 Configuration.......................................................................................................................... 395
Displaying IPv6 Routes............................................................................................................................................ 396
Displaying the Running Configuration for an Interface.................................................................................... 397
Clearing IPv6 Routes................................................................................................................................................397
Chapter 26: iSCSI Optimization.................................................................................................398
iSCSI Optimization Overview....................................................................................................................................... 398
Default iSCSI Optimization Values..............................................................................................................................399
iSCSI Optimization Prerequisites................................................................................................................................ 400
Configuring iSCSI Optimization...................................................................................................................................400
Displaying iSCSI Optimization Information............................................................................................................... 402
Enable and Disable iSCSI Optimization......................................................................................................................403
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer................................................................ 403
Monitoring iSCSI Traffic Flows....................................................................................................................................404
Information Monitored in iSCSI Traffic Flows..........................................................................................................404
Detection and Auto-Configuration for Dell EqualLogic Arrays............................................................................ 404
Configuring Detection and Ports for Dell Compellent Arrays.............................................................................. 405
Application of Quality of Service to iSCSI Traffic Flows.......................................................................................405
Chapter 27: Intermediate System to Intermediate System.........................................................407
IS-IS Protocol Overview................................................................................................................................................407
IS-IS Addressing.............................................................................................................................................................. 407
Multi-Topology IS-IS...................................................................................................................................................... 408
Transition Mode.........................................................................................................................................................408
Interface Support......................................................................................................................................................409
Adjacencies.................................................................................................................................................................409
Graceful Restart..............................................................................................................................................................409
Timers.......................................................................................................................................................................... 409
Implementation Information......................................................................................................................................... 409
Configuration Information..............................................................................................................................................410
Configuration Tasks for IS-IS..................................................................................................................................410
Configuring the Distance of a Route.....................................................................................................................417
Changing the IS-Type............................................................................................................................................... 418
Redistributing IPv4 Routes..................................................................................................................................... 420
Redistributing IPv6 Routes......................................................................................................................................421
Configuring Authentication Passwords................................................................................................................ 421
Setting the Overload Bit..........................................................................................................................................422
Debugging IS-IS.........................................................................................................................................................422
IS-IS Metric Styles..........................................................................................................................................................423
Configure Metric Values................................................................................................................................................423
Maximum Values in the Routing Table.................................................................................................................424
Change the IS-IS Metric Style in One Level Only............................................................................................. 424
Leaks from One Level to Another......................................................................................................................... 425
Sample Configurations...................................................................................................................................................426
Chapter 28: Link Aggregation Control Protocol (LACP)............................................................. 429
14
Contents
Introduction to Dynamic LAGs and LACP.................................................................................................................429
Important Points to Remember............................................................................................................................. 429
LACP Modes...............................................................................................................................................................430
Configuring LACP Commands................................................................................................................................430
LACP Configuration Tasks............................................................................................................................................430
Creating a LAG........................................................................................................................................................... 431
Configuring the LAG Interfaces as Dynamic....................................................................................................... 431
Setting the LACP Long Timeout........................................................................................................................... 432
Monitoring and Debugging LACP.......................................................................................................................... 432
Shared LAG State Tracking..........................................................................................................................................432
Configuring Shared LAG State Tracking............................................................................................................. 433
Important Points about Shared LAG State Tracking........................................................................................434
LACP Basic Configuration Example............................................................................................................................435
Configure a LAG on ALPHA....................................................................................................................................435
Chapter 29: Layer 2................................................................................................................... 443
Manage the MAC Address Table.................................................................................................................................443
Clearing the MAC Address Table.......................................................................................................................... 443
Setting the Aging Time for Dynamic Entries...................................................................................................... 443
Configuring a Static MAC Address....................................................................................................................... 444
Displaying the MAC Address Table.......................................................................................................................444
MAC Learning Limit........................................................................................................................................................ 444
Setting the MAC Learning Limit............................................................................................................................ 444
mac learning-limit Dynamic.....................................................................................................................................445
mac learning-limit mac-address-sticky................................................................................................................ 445
mac learning-limit station-move............................................................................................................................ 445
mac learning-limit no-station-move......................................................................................................................445
Learning Limit Violation Actions............................................................................................................................ 446
Setting Station Move Violation Actions...............................................................................................................446
Recovering from Learning Limit and Station Move Violations....................................................................... 447
NIC Teaming.....................................................................................................................................................................447
Configure Redundant Pairs...........................................................................................................................................448
Far-End Failure Detection..............................................................................................................................................451
FEFD State Changes.................................................................................................................................................451
Configuring FEFD......................................................................................................................................................452
Enabling FEFD on an Interface.............................................................................................................................. 453
Debugging FEFD........................................................................................................................................................454
Chapter 30: Link Layer Discovery Protocol (LLDP).................................................................... 455
802.1AB (LLDP) Overview............................................................................................................................................455
Protocol Data Units.................................................................................................................................................. 455
Optional TLVs.................................................................................................................................................................. 456
Management TLVs....................................................................................................................................................456
TIA-1057 (LLDP-MED) Overview............................................................................................................................... 458
TIA Organizationally Specific TLVs.......................................................................................................................458
Configure LLDP............................................................................................................................................................... 462
CONFIGURATION versus INTERFACE Configurations......................................................................................... 462
Enabling LLDP..................................................................................................................................................................463
Disabling and Undoing LLDP...................................................................................................................................463
Contents
15
Enabling LLDP on Management Ports....................................................................................................................... 463
Disabling and Undoing LLDP on Management Ports........................................................................................464
Advertising TLVs............................................................................................................................................................. 464
Viewing the LLDP Configuration.................................................................................................................................465
Viewing Information Advertised by Adjacent LLDP Agents................................................................................. 465
Configuring LLDPDU Intervals.....................................................................................................................................466
Configuring Transmit and Receive Mode.................................................................................................................. 467
Configuring a Time to Live............................................................................................................................................468
Debugging LLDP..............................................................................................................................................................468
Relevant Management Objects................................................................................................................................... 469
Chapter 31: Microsoft Network Load Balancing..........................................................................474
NLB Unicast and Multicast Modes............................................................................................................................. 474
NLB Benefits.................................................................................................................................................................... 475
NLB Restrictions............................................................................................................................................................. 475
NLB VLAN Flooding........................................................................................................................................................475
Configuring NLB on a Switch.......................................................................................................................................476
.......................................................................................................................................................................................476
Chapter 32: Multicast Source Discovery Protocol (MSDP).........................................................477
Anycast RP....................................................................................................................................................................... 478
Implementation Information..........................................................................................................................................479
Configure Multicast Source Discovery Protocol..................................................................................................... 479
Related Configuration Tasks...................................................................................................................................479
Enable MSDP................................................................................................................................................................... 483
Manage the Source-Active Cache..............................................................................................................................484
Viewing the Source-Active Cache........................................................................................................................ 484
Limiting the Source-Active Cache........................................................................................................................ 484
Clearing the Source-Active Cache....................................................................................................................... 485
Enabling the Rejected Source-Active Cache..................................................................................................... 485
Accept Source-Active Messages that Fail the RFP Check.................................................................................. 485
Specifying Source-Active Messages..........................................................................................................................489
Limiting the Source-Active Messages from a Peer................................................................................................490
Preventing MSDP from Caching a Local Source.................................................................................................... 490
Preventing MSDP from Caching a Remote Source................................................................................................ 491
Preventing MSDP from Advertising a Local Source............................................................................................... 491
Logging Changes in Peership States..........................................................................................................................492
Terminating a Peership..................................................................................................................................................492
Clearing Peer Statistics................................................................................................................................................. 493
Debugging MSDP............................................................................................................................................................493
MSDP with Anycast RP.................................................................................................................................................493
Configuring Anycast RP................................................................................................................................................ 494
Reducing Source-Active Message Flooding.......................................................................................................495
Specifying the RP Address Used in SA Messages............................................................................................495
MSDP Sample Configurations......................................................................................................................................497
Chapter 33: Multiple Spanning Tree Protocol (MSTP)............................................................... 500
Spanning Tree Variations...............................................................................................................................................501
Implementation Information.................................................................................................................................... 501
16
Contents
Configure Multiple Spanning Tree Protocol..............................................................................................................501
Related Configuration Tasks...................................................................................................................................501
Enable Multiple Spanning Tree Globally.................................................................................................................... 502
Adding and Removing Interfaces................................................................................................................................ 502
Creating Multiple Spanning Tree Instances..............................................................................................................502
Influencing MSTP Root Selection...............................................................................................................................503
Interoperate with Non-Dell Bridges............................................................................................................................504
Changing the Region Name or Revision....................................................................................................................504
Modifying Global Parameters.......................................................................................................................................504
Modifying the Interface Parameters..........................................................................................................................505
Configuring an EdgePort.............................................................................................................................................. 506
Flush MAC Addresses after a Topology Change.....................................................................................................507
MSTP Sample Configurations...................................................................................................................................... 507
Debugging and Verifying MSTP Configurations.......................................................................................................510
Chapter 34: Multicast Features..................................................................................................512
Enabling IP Multicast...................................................................................................................................................... 512
Multicast with ECMP......................................................................................................................................................512
Implementation Information.......................................................................................................................................... 513
First Packet Forwarding for Lossless Multicast.......................................................................................................514
Multicast Policies.............................................................................................................................................................514
IPv4 Multicast Policies..............................................................................................................................................514
Chapter 35: Open Shortest Path First (OSPFv2 and OSPFv3)....................................................521
Protocol Overview...........................................................................................................................................................521
Autonomous System (AS) Areas............................................................................................................................521
Area Types..................................................................................................................................................................522
Networks and Neighbors.........................................................................................................................................523
Router Types..............................................................................................................................................................523
Designated and Backup Designated Routers..................................................................................................... 524
Link-State Advertisements (LSAs).......................................................................................................................524
Virtual Links................................................................................................................................................................525
Router Priority and Cost......................................................................................................................................... 526
OSPF Implementation....................................................................................................................................................526
Fast Convergence (OSPFv2, IPv4 Only).............................................................................................................527
Multi-Process OSPFv2 (IPv4 only).......................................................................................................................527
RFC-2328 Compliant OSPF Flooding...................................................................................................................527
OSPF ACK Packing...................................................................................................................................................528
Setting OSPF Adjacency with Cisco Routers.................................................................................................... 528
Configuration Information.............................................................................................................................................529
Configuration Task List for OSPFv2 (OSPF for IPv4).....................................................................................529
Sample Configurations for OSPFv2............................................................................................................................ 541
Configuration Task List for OSPFv3 (OSPF for IPv6).......................................................................................... 542
Enabling IPv6 Unicast Routing...............................................................................................................................542
Assigning IPv6 Addresses on an Interface..........................................................................................................543
Assigning Area ID on an Interface.........................................................................................................................543
Assigning OSPFv3 Process ID and Router ID Globally.....................................................................................543
Configuring Stub Areas............................................................................................................................................544
Configuring Passive-Interface............................................................................................................................... 544
Contents
17
Redistributing Routes...............................................................................................................................................544
Configuring a Default Route...................................................................................................................................545
OSPFv3 Authentication Using IPsec....................................................................................................................545
Troubleshooting OSPFv3.........................................................................................................................................551
Chapter 36: Pay As You Grow ................................................................................................... 552
Installing a License..........................................................................................................................................................552
Displaying License Information.................................................................................................................................... 554
Chapter 37: PIM Sparse-Mode (PIM-SM).................................................................................. 556
Implementation Information......................................................................................................................................... 556
Protocol Overview..........................................................................................................................................................556
Requesting Multicast Traffic..................................................................................................................................556
Refuse Multicast Traffic..........................................................................................................................................557
Send Multicast Traffic............................................................................................................................................. 557
Configuring PIM-SM...................................................................................................................................................... 557
Related Configuration Tasks.................................................................................................................................. 558
Enable PIM-SM............................................................................................................................................................... 558
Configuring S,G Expiry Timers.....................................................................................................................................559
Configuring a Static Rendezvous Point.................................................................................................................... 560
Overriding Bootstrap Router Updates.................................................................................................................560
Configuring a Designated Router................................................................................................................................560
Creating Multicast Boundaries and Domains............................................................................................................ 561
Enabling PIM-SM Graceful Restart.............................................................................................................................561
Chapter 38: PIM Source-Specific Mode (PIM-SSM).................................................................. 562
Implementation Information......................................................................................................................................... 562
Configure PIM-SMM......................................................................................................................................................562
Enabling PIM-SSM..........................................................................................................................................................563
Use PIM-SSM with IGMP Version 2 Hosts.............................................................................................................. 563
Chapter 39: Policy-based Routing (PBR)...................................................................................565
Overview...........................................................................................................................................................................565
Implementing Policy-based Routing with Dell Networking OS............................................................................ 567
Configuration Task List for Policy-based Routing.................................................................................................. 567
Sample Configuration......................................................................................................................................................571
Chapter 40: Port Monitoring......................................................................................................574
Local Port Monitoring.................................................................................................................................................... 574
Important Points to Remember............................................................................................................................. 574
Examples of Port Monitoring..................................................................................................................................574
Configuring Port Monitoring...................................................................................................................................576
Remote Port Mirroring...................................................................................................................................................577
Remote Port Mirroring Example............................................................................................................................ 577
Configuring Remote Port Mirroring...................................................................................................................... 578
Displaying a Remote-Port Mirroring Configuration...........................................................................................579
Configuring Remote Port Monitoring...................................................................................................................579
Encapsulated Remote-Port Monitoring.....................................................................................................................582
18
Contents
Chapter 41: Private VLANs (PVLAN)..........................................................................................584
Private VLAN Concepts................................................................................................................................................ 584
Using the Private VLAN Commands.......................................................................................................................... 585
Configuration Task List................................................................................................................................................. 586
Creating PVLAN ports............................................................................................................................................. 586
Creating a Primary VLAN........................................................................................................................................ 587
Creating a Community VLAN................................................................................................................................. 587
Creating an Isolated VLAN......................................................................................................................................588
Private VLAN Configuration Example........................................................................................................................589
Inspecting the Private VLAN Configuration.............................................................................................................590
Chapter 42: Per-VLAN Spanning Tree Plus (PVST+)..................................................................592
Protocol Overview..........................................................................................................................................................592
Implementation Information......................................................................................................................................... 593
Configure Per-VLAN Spanning Tree Plus................................................................................................................. 593
Enabling PVST+...............................................................................................................................................................594
Disabling PVST+..............................................................................................................................................................594
Influencing PVST+ Root Selection............................................................................................................................. 594
Modifying Global PVST+ Parameters........................................................................................................................ 596
Modifying Interface PVST+ Parameters................................................................................................................... 596
Configuring an EdgePort...............................................................................................................................................597
PVST+ in Multi-Vendor Networks.............................................................................................................................. 598
Enabling PVST+ Extend System ID............................................................................................................................ 598
PVST+ Sample Configurations.................................................................................................................................... 599
Chapter 43: Quality of Service (QoS).........................................................................................601
Implementation Information......................................................................................................................................... 602
Port-Based QoS Configurations..................................................................................................................................602
Setting dot1p Priorities for Incoming Traffic......................................................................................................602
Honoring dot1p Priorities on Ingress Traffic.......................................................................................................603
Configuring Port-Based Rate Policing................................................................................................................. 603
Configuring Port-Based Rate Shaping.................................................................................................................604
Policy-Based QoS Configurations...............................................................................................................................605
Classify Traffic...........................................................................................................................................................605
Create a QoS Policy................................................................................................................................................. 609
Create Policy Maps................................................................................................................................................... 612
DSCP Color Maps............................................................................................................................................................615
Creating a DSCP Color Map...............................................................................................................................615
Displaying DSCP Color Maps.................................................................................................................................. 616
Displaying a DSCP Color Policy Configuration ...................................................................................................617
Enabling QoS Rate Adjustment.................................................................................................................................... 617
Enabling Strict-Priority Queueing................................................................................................................................ 618
Weighted Random Early Detection............................................................................................................................. 618
Creating WRED Profiles........................................................................................................................................... 619
Applying a WRED Profile to Traffic....................................................................................................................... 619
Displaying Default and Configured WRED Profiles............................................................................................619
Displaying WRED Drop Statistics.......................................................................................................................... 620
Explicit Congestion Notification..................................................................................................................................620
Contents
19
ECN Packet Classification...................................................................................................................................... 620
Example: Color-marking non-ECN Packets in One Traffic Class...................................................................621
Example: Color-marking non-ECN Packets in Different Traffic Classes......................................................621
Using A Configurable Weight for WRED and ECN................................................................................................. 622
Benefits of Using a Configurable Weight for WRED with ECN..................................................................... 622
Setting Average Queue Size using a Weight......................................................................................................623
Global Service-Pools for WRED with ECN......................................................................................................... 623
Configuring a Weight for WRED and ECN Operation...................................................................................... 624
Pre-Calculating Available QoS CAM Space..............................................................................................................625
SNMP Support for Buffer Statistics Tracking.........................................................................................................626
Chapter 44: Routing Information Protocol (RIP)........................................................................627
Protocol Overview.......................................................................................................................................................... 627
RIPv1.............................................................................................................................................................................627
RIPv2............................................................................................................................................................................627
Implementation Information..........................................................................................................................................627
Configuration Information.............................................................................................................................................628
Configuration Task List............................................................................................................................................628
RIP Configuration Example..................................................................................................................................... 633
Chapter 45: Remote Monitoring (RMON).................................................................................. 639
Implementation Information......................................................................................................................................... 639
Fault Recovery.................................................................................................................................................................639
Setting the RMON Alarm........................................................................................................................................ 639
Configuring an RMON Event................................................................................................................................. 640
Configuring RMON Collection Statistics..............................................................................................................641
Configuring the RMON Collection History.......................................................................................................... 641
Chapter 46: Rapid Spanning Tree Protocol (RSTP)....................................................................643
Protocol Overview..........................................................................................................................................................643
Configuring Rapid Spanning Tree............................................................................................................................... 643
Important Points to Remember...................................................................................................................................644
RSTP and VLT............................................................................................................................................................644
Configuring Interfaces for Layer 2 Mode..................................................................................................................644
Enabling Rapid Spanning Tree Protocol Globally.................................................................................................... 645
Adding and Removing Interfaces................................................................................................................................ 647
Modifying Global Parameters....................................................................................................................................... 647
Enabling SNMP Traps for Root Elections and Topology Changes................................................................648
Modifying Interface Parameters..................................................................................................................................648
Influencing RSTP Root Selection................................................................................................................................648
Configuring an EdgePort...............................................................................................................................................649
Configuring Fast Hellos for Link State Detection...................................................................................................650
Chapter 47: Security..................................................................................................................651
Role-Based Access Control...........................................................................................................................................651
Overview of RBAC.................................................................................................................................................... 651
User Roles...................................................................................................................................................................653
AAA Authentication and Authorization for Roles.............................................................................................. 656
Role Accounting........................................................................................................................................................ 659
20
Contents
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407
  • Page 408 408
  • Page 409 409
  • Page 410 410
  • Page 411 411
  • Page 412 412
  • Page 413 413
  • Page 414 414
  • Page 415 415
  • Page 416 416
  • Page 417 417
  • Page 418 418
  • Page 419 419
  • Page 420 420
  • Page 421 421
  • Page 422 422
  • Page 423 423
  • Page 424 424
  • Page 425 425
  • Page 426 426
  • Page 427 427
  • Page 428 428
  • Page 429 429
  • Page 430 430
  • Page 431 431
  • Page 432 432
  • Page 433 433
  • Page 434 434
  • Page 435 435
  • Page 436 436
  • Page 437 437
  • Page 438 438
  • Page 439 439
  • Page 440 440
  • Page 441 441
  • Page 442 442
  • Page 443 443
  • Page 444 444
  • Page 445 445
  • Page 446 446
  • Page 447 447
  • Page 448 448
  • Page 449 449
  • Page 450 450
  • Page 451 451
  • Page 452 452
  • Page 453 453
  • Page 454 454
  • Page 455 455
  • Page 456 456
  • Page 457 457
  • Page 458 458
  • Page 459 459
  • Page 460 460
  • Page 461 461
  • Page 462 462
  • Page 463 463
  • Page 464 464
  • Page 465 465
  • Page 466 466
  • Page 467 467
  • Page 468 468
  • Page 469 469
  • Page 470 470
  • Page 471 471
  • Page 472 472
  • Page 473 473
  • Page 474 474
  • Page 475 475
  • Page 476 476
  • Page 477 477
  • Page 478 478
  • Page 479 479
  • Page 480 480
  • Page 481 481
  • Page 482 482
  • Page 483 483
  • Page 484 484
  • Page 485 485
  • Page 486 486
  • Page 487 487
  • Page 488 488
  • Page 489 489
  • Page 490 490
  • Page 491 491
  • Page 492 492
  • Page 493 493
  • Page 494 494
  • Page 495 495
  • Page 496 496
  • Page 497 497
  • Page 498 498
  • Page 499 499
  • Page 500 500
  • Page 501 501
  • Page 502 502
  • Page 503 503
  • Page 504 504
  • Page 505 505
  • Page 506 506
  • Page 507 507
  • Page 508 508
  • Page 509 509
  • Page 510 510
  • Page 511 511
  • Page 512 512
  • Page 513 513
  • Page 514 514
  • Page 515 515
  • Page 516 516
  • Page 517 517
  • Page 518 518
  • Page 519 519
  • Page 520 520
  • Page 521 521
  • Page 522 522
  • Page 523 523
  • Page 524 524
  • Page 525 525
  • Page 526 526
  • Page 527 527
  • Page 528 528
  • Page 529 529
  • Page 530 530
  • Page 531 531
  • Page 532 532
  • Page 533 533
  • Page 534 534
  • Page 535 535
  • Page 536 536
  • Page 537 537
  • Page 538 538
  • Page 539 539
  • Page 540 540
  • Page 541 541
  • Page 542 542
  • Page 543 543
  • Page 544 544
  • Page 545 545
  • Page 546 546
  • Page 547 547
  • Page 548 548
  • Page 549 549
  • Page 550 550
  • Page 551 551
  • Page 552 552
  • Page 553 553
  • Page 554 554
  • Page 555 555
  • Page 556 556
  • Page 557 557
  • Page 558 558
  • Page 559 559
  • Page 560 560
  • Page 561 561
  • Page 562 562
  • Page 563 563
  • Page 564 564
  • Page 565 565
  • Page 566 566
  • Page 567 567
  • Page 568 568
  • Page 569 569
  • Page 570 570
  • Page 571 571
  • Page 572 572
  • Page 573 573
  • Page 574 574
  • Page 575 575
  • Page 576 576
  • Page 577 577
  • Page 578 578
  • Page 579 579
  • Page 580 580
  • Page 581 581
  • Page 582 582
  • Page 583 583
  • Page 584 584
  • Page 585 585
  • Page 586 586
  • Page 587 587
  • Page 588 588
  • Page 589 589
  • Page 590 590
  • Page 591 591
  • Page 592 592
  • Page 593 593
  • Page 594 594
  • Page 595 595
  • Page 596 596
  • Page 597 597
  • Page 598 598
  • Page 599 599
  • Page 600 600
  • Page 601 601
  • Page 602 602
  • Page 603 603
  • Page 604 604
  • Page 605 605
  • Page 606 606
  • Page 607 607
  • Page 608 608
  • Page 609 609
  • Page 610 610
  • Page 611 611
  • Page 612 612
  • Page 613 613
  • Page 614 614
  • Page 615 615
  • Page 616 616
  • Page 617 617
  • Page 618 618
  • Page 619 619
  • Page 620 620
  • Page 621 621
  • Page 622 622
  • Page 623 623
  • Page 624 624
  • Page 625 625
  • Page 626 626
  • Page 627 627
  • Page 628 628
  • Page 629 629
  • Page 630 630
  • Page 631 631
  • Page 632 632
  • Page 633 633
  • Page 634 634
  • Page 635 635
  • Page 636 636
  • Page 637 637
  • Page 638 638
  • Page 639 639
  • Page 640 640
  • Page 641 641
  • Page 642 642
  • Page 643 643
  • Page 644 644
  • Page 645 645
  • Page 646 646
  • Page 647 647
  • Page 648 648
  • Page 649 649
  • Page 650 650
  • Page 651 651
  • Page 652 652
  • Page 653 653
  • Page 654 654
  • Page 655 655
  • Page 656 656
  • Page 657 657
  • Page 658 658
  • Page 659 659
  • Page 660 660
  • Page 661 661
  • Page 662 662
  • Page 663 663
  • Page 664 664
  • Page 665 665
  • Page 666 666
  • Page 667 667
  • Page 668 668
  • Page 669 669
  • Page 670 670
  • Page 671 671
  • Page 672 672
  • Page 673 673
  • Page 674 674
  • Page 675 675
  • Page 676 676
  • Page 677 677
  • Page 678 678
  • Page 679 679
  • Page 680 680
  • Page 681 681
  • Page 682 682
  • Page 683 683
  • Page 684 684
  • Page 685 685
  • Page 686 686
  • Page 687 687
  • Page 688 688
  • Page 689 689
  • Page 690 690
  • Page 691 691
  • Page 692 692
  • Page 693 693
  • Page 694 694
  • Page 695 695
  • Page 696 696
  • Page 697 697
  • Page 698 698
  • Page 699 699
  • Page 700 700
  • Page 701 701
  • Page 702 702
  • Page 703 703
  • Page 704 704
  • Page 705 705
  • Page 706 706
  • Page 707 707
  • Page 708 708
  • Page 709 709
  • Page 710 710
  • Page 711 711
  • Page 712 712
  • Page 713 713
  • Page 714 714
  • Page 715 715
  • Page 716 716
  • Page 717 717
  • Page 718 718
  • Page 719 719
  • Page 720 720
  • Page 721 721
  • Page 722 722
  • Page 723 723
  • Page 724 724
  • Page 725 725
  • Page 726 726
  • Page 727 727
  • Page 728 728
  • Page 729 729
  • Page 730 730
  • Page 731 731
  • Page 732 732
  • Page 733 733
  • Page 734 734
  • Page 735 735
  • Page 736 736
  • Page 737 737
  • Page 738 738
  • Page 739 739
  • Page 740 740
  • Page 741 741
  • Page 742 742
  • Page 743 743
  • Page 744 744
  • Page 745 745
  • Page 746 746
  • Page 747 747
  • Page 748 748
  • Page 749 749
  • Page 750 750
  • Page 751 751
  • Page 752 752
  • Page 753 753
  • Page 754 754
  • Page 755 755
  • Page 756 756
  • Page 757 757
  • Page 758 758
  • Page 759 759
  • Page 760 760
  • Page 761 761
  • Page 762 762
  • Page 763 763
  • Page 764 764
  • Page 765 765
  • Page 766 766
  • Page 767 767
  • Page 768 768
  • Page 769 769
  • Page 770 770
  • Page 771 771
  • Page 772 772
  • Page 773 773
  • Page 774 774
  • Page 775 775
  • Page 776 776
  • Page 777 777
  • Page 778 778
  • Page 779 779
  • Page 780 780
  • Page 781 781
  • Page 782 782
  • Page 783 783
  • Page 784 784
  • Page 785 785
  • Page 786 786
  • Page 787 787
  • Page 788 788
  • Page 789 789
  • Page 790 790
  • Page 791 791
  • Page 792 792
  • Page 793 793
  • Page 794 794
  • Page 795 795
  • Page 796 796
  • Page 797 797
  • Page 798 798
  • Page 799 799
  • Page 800 800
  • Page 801 801
  • Page 802 802
  • Page 803 803
  • Page 804 804
  • Page 805 805
  • Page 806 806
  • Page 807 807
  • Page 808 808
  • Page 809 809
  • Page 810 810
  • Page 811 811
  • Page 812 812
  • Page 813 813
  • Page 814 814
  • Page 815 815
  • Page 816 816
  • Page 817 817
  • Page 818 818
  • Page 819 819
  • Page 820 820
  • Page 821 821
  • Page 822 822
  • Page 823 823
  • Page 824 824
  • Page 825 825
  • Page 826 826
  • Page 827 827
  • Page 828 828
  • Page 829 829
  • Page 830 830
  • Page 831 831
  • Page 832 832
  • Page 833 833
  • Page 834 834
  • Page 835 835
  • Page 836 836
  • Page 837 837
  • Page 838 838
  • Page 839 839
  • Page 840 840
  • Page 841 841
  • Page 842 842
  • Page 843 843
  • Page 844 844
  • Page 845 845
  • Page 846 846
  • Page 847 847
  • Page 848 848
  • Page 849 849
  • Page 850 850
  • Page 851 851
  • Page 852 852
  • Page 853 853
  • Page 854 854
  • Page 855 855
  • Page 856 856
  • Page 857 857
  • Page 858 858
  • Page 859 859
  • Page 860 860
  • Page 861 861
  • Page 862 862
  • Page 863 863
  • Page 864 864
  • Page 865 865
  • Page 866 866

Dell Networking Z9500 Reference guide

Category
Software
Type
Reference guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI