Force10 Z9000

Dell Force10 Z9000 Administrator Guide

  • Hello! I am an AI chatbot trained to assist you with the Dell Force10 Z9000 Administrator Guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the Z9000
System
9.5(0.1)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 07
Rev. A00
Contents
1 About this Guide..................................................................................................31
Audience.............................................................................................................................................. 31
Conventions.........................................................................................................................................31
Related Documents.............................................................................................................................31
2 Configuration Fundamentals........................................................................... 32
Accessing the Command Line............................................................................................................32
CLI Modes............................................................................................................................................32
Navigating CLI Modes................................................................................................................... 34
The do Command............................................................................................................................... 37
Undoing Commands...........................................................................................................................38
Obtaining Help.................................................................................................................................... 39
Entering and Editing Commands....................................................................................................... 39
Command History.............................................................................................................................. 40
Filtering show Command Outputs.....................................................................................................40
Multiple Users in Configuration Mode............................................................................................... 42
3 Data Center Bridging (DCB)..............................................................................43
SNMP Support for PFC and Buffer Statistics Tracking.......................................................................43
4 Getting Started................................................................................................... 44
Console Access...................................................................................................................................44
Serial Console................................................................................................................................44
Accessing the CLI Interface and Running Scripts Using SSH............................................................45
Z9000 ........................................................................................................................................... 45
Entering CLI commands Using an SSH Connection................................................................... 46
Executing Local CLI Scripts Using an SSH Connection...............................................................46
Default Configuration......................................................................................................................... 47
Configuring a Host Name...................................................................................................................47
Accessing the System Remotely.........................................................................................................47
Accessing the Z-Series and Remotely..........................................................................................47
Configure the Management Port IP Address............................................................................... 47
Configure a Management Route..................................................................................................48
Configuring a Username and Password.......................................................................................48
Configuring the Enable Password......................................................................................................48
Configuration File Management.........................................................................................................49
Copy Files to and from the System.............................................................................................. 49
Save the Running-Configuration..................................................................................................50
Configure the Overload Bit for a Startup Scenario...................................................................... 51
Viewing Files...................................................................................................................................51
Managing the File System................................................................................................................... 52
Enabling Software Features on Devices Using a Command Option................................................ 53
View Command History......................................................................................................................54
Upgrading Dell Networking OS.......................................................................................................... 54
Using HTTP for File Transfers............................................................................................................. 55
Using Hashes to Validate Software Images........................................................................................55
5 Management........................................................................................................57
Configuring Privilege Levels................................................................................................................57
Creating a Custom Privilege Level................................................................................................57
Removing a Command from EXEC Mode....................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 57
Allowing Access to CONFIGURATION Mode Commands.......................................................... 58
Allowing Access to the Following Modes.................................................................................... 58
Applying a Privilege Level to a Username.................................................................................... 60
Applying a Privilege Level to a Terminal Line...............................................................................60
Configuring Logging...........................................................................................................................60
Audit and Security Logs.................................................................................................................61
Configuring Logging Format ...................................................................................................... 62
Setting Up a Secure Connection to a Syslog Server....................................................................63
Log Messages in the Internal Buffer...................................................................................................64
Configuration Task List for System Log Management................................................................ 64
Disabling System Logging.................................................................................................................. 64
Sending System Messages to a Syslog Server....................................................................................65
Configuring a UNIX System as a Syslog Server............................................................................65
Changing System Logging Settings....................................................................................................65
Display the Logging Buffer and the Logging Configuration............................................................. 66
Configuring a UNIX Logging Facility Level.........................................................................................67
Synchronizing Log Messages............................................................................................................. 68
Enabling Timestamp on Syslog Messages......................................................................................... 68
File Transfer Services.......................................................................................................................... 69
Configuration Task List for File Transfer Services........................................................................69
Enabling the FTP Server................................................................................................................ 69
Configuring FTP Server Parameters............................................................................................. 70
Configuring FTP Client Parameters..............................................................................................70
Terminal Lines......................................................................................................................................71
Denying and Permitting Access to a Terminal Line......................................................................71
Configuring Login Authentication for Terminal Lines..................................................................72
Setting Time Out of EXEC Privilege Mode..........................................................................................73
Using Telnet to get to Another Network Device................................................................................73
Lock CONFIGURATION Mode............................................................................................................74
Viewing the Configuration Lock Status........................................................................................ 74
Recovering from a Forgotten Password on the Z9000 System........................................................75
Recovering from a Forgotten Enable Password on the Z9000.................................................. 76
Recovering from a Failed Start on the Z9000 System.......................................................................77
Restoring the Factory Default Settings...............................................................................................78
Z9000MXL Switch......................................................................................................................... 78
Important Points to Remember....................................................................................................78
Restoring Factory Default Environment Variables....................................................................... 78
6 802.1X................................................................................................................... 81
The Port-Authentication Process.......................................................................................................82
EAP over RADIUS...........................................................................................................................84
Configuring 802.1X............................................................................................................................. 84
Related Configuration Tasks.........................................................................................................84
Important Points to Remember..........................................................................................................85
Enabling 802.1X...................................................................................................................................85
Configuring Request Identity Re-Transmissions............................................................................... 87
Configuring a Quiet Period after a Failed Authentication........................................................... 87
Forcibly Authorizing or Unauthorizing a Port....................................................................................88
Re-Authenticating a Port....................................................................................................................89
Configuring Timeouts.........................................................................................................................90
Configuring Dynamic VLAN Assignment with Port Authentication.................................................. 91
Guest and Authentication-Fail VLANs................................................................................................92
Configuring a Guest VLAN............................................................................................................93
Configuring an Authentication-Fail VLAN....................................................................................93
7 Access Control Lists (ACLs)...............................................................................95
IP Access Control Lists (ACLs)............................................................................................................ 96
CAM Usage....................................................................................................................................96
Implementing ACLs on Dell Networking OS............................................................................... 98
IP Fragment Handling......................................................................................................................... 99
IP Fragments ACL Examples......................................................................................................... 99
Layer 4 ACL Rules Examples.......................................................................................................100
Configure a Standard IP ACL............................................................................................................ 101
Configuring a Standard IP ACL Filter..........................................................................................102
Configure an Extended IP ACL......................................................................................................... 103
Configuring Filters with a Sequence Number............................................................................103
Configuring Filters Without a Sequence Number......................................................................104
Configure Layer 2 and Layer 3 ACLs................................................................................................ 105
Assign an IP ACL to an Interface...................................................................................................... 106
Applying an IP ACL............................................................................................................................106
Counting ACL Hits.......................................................................................................................107
Configure Ingress ACLs.....................................................................................................................107
Configure Egress ACLs..................................................................................................................... 108
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................... 109
IP Prefix Lists......................................................................................................................................109
Implementation Information.......................................................................................................110
Configuration Task List for Prefix Lists........................................................................................110
ACL Resequencing............................................................................................................................ 114
Resequencing an ACL or Prefix List............................................................................................ 115
Route Maps........................................................................................................................................ 116
Implementation Information.......................................................................................................116
Important Points to Remember........................................................................................................ 116
Configuration Task List for Route Maps......................................................................................117
Configuring Match Routes.......................................................................................................... 119
Configuring Set Conditions.........................................................................................................121
Configure a Route Map for Route Redistribution...................................................................... 122
Configure a Route Map for Route Tagging................................................................................ 122
Continue Clause..........................................................................................................................123
Logging of ACL Processes................................................................................................................ 123
Guidelines for Configuring ACL Logging......................................................................................... 124
Configuring ACL Logging................................................................................................................. 125
Flow-Based Monitoring Support for ACLs....................................................................................... 125
Behavior of Flow-Based Monitoring...........................................................................................126
Enabling Flow-Based Monitoring..................................................................................................... 127
8 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)......................................................................................................129
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................... 129
Guidelines for Configuring ACL VLAN groups.................................................................................130
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.........................131
Configuring ACL VLAN Groups................................................................................................... 131
Configuring FP Blocks for VLAN Parameters............................................................................. 132
Viewing CAM Usage.......................................................................................................................... 133
Allocating FP Blocks for VLAN Processes.........................................................................................134
9 Bidirectional Forwarding Detection (BFD)...................................................136
How BFD Works................................................................................................................................ 136
BFD Packet Format......................................................................................................................137
BFD Sessions................................................................................................................................139
BFD Three-Way Handshake........................................................................................................139
Session State Changes................................................................................................................140
Important Points to Remember........................................................................................................ 141
Configure BFD................................................................................................................................... 141
Configure BFD for Physical Ports............................................................................................... 142
Configure BFD for Static Routes.................................................................................................145
Configure BFD for OSPF..............................................................................................................147
Configure BFD for OSPFv3......................................................................................................... 150
Configure BFD for IS-IS............................................................................................................... 151
Configure BFD for BGP............................................................................................................... 154
Configure BFD for VRRP..............................................................................................................161
Configuring Protocol Liveness................................................................................................... 164
Troubleshooting BFD..................................................................................................................164
10 Border Gateway Protocol IPv4 (BGPv4).................................................... 166
Autonomous Systems (AS)................................................................................................................166
Sessions and Peers............................................................................................................................168
Establish a Session.......................................................................................................................169
Route Reflectors................................................................................................................................169
BGP Attributes................................................................................................................................... 170
Best Path Selection Criteria......................................................................................................... 171
Weight.......................................................................................................................................... 173
Local Preference..........................................................................................................................173
Multi-Exit Discriminators (MEDs)................................................................................................ 174
Origin............................................................................................................................................175
AS Path......................................................................................................................................... 176
Next Hop......................................................................................................................................176
Multiprotocol BGP............................................................................................................................. 177
Implement BGP with Dell Networking OS........................................................................................177
Additional Path (Add-Path) Support............................................................................................177
Advertise IGP Cost as MED for Redistributed Routes.................................................................177
Ignore Router-ID for Some Best-Path Calculations..................................................................178
Four-Byte AS Numbers................................................................................................................178
AS4 Number Representation.......................................................................................................179
AS Number Migration..................................................................................................................180
BGP4 Management Information Base (MIB).............................................................................. 182
Important Points to Remember..................................................................................................182
Configuration Information................................................................................................................183
BGP Configuration............................................................................................................................ 183
Enabling BGP...............................................................................................................................184
Configuring AS4 Number Representations................................................................................188
Configuring Peer Groups............................................................................................................190
Configuring BGP Fast Fall-Over..................................................................................................192
Configuring Passive Peering....................................................................................................... 194
Maintaining Existing AS Numbers During an AS Migration........................................................195
Allowing an AS Number to Appear in its Own AS Path..............................................................196
Enabling Graceful Restart............................................................................................................197
Enabling Neighbor Graceful Restart...........................................................................................198
Filtering on an AS-Path Attribute................................................................................................198
Regular Expressions as Filters.................................................................................................... 200
Redistributing Routes..................................................................................................................201
Enabling Additional Paths...........................................................................................................202
Configuring IP Community Lists................................................................................................ 202
Configuring an IP Extended Community List............................................................................ 204
Filtering Routes with Community Lists...................................................................................... 205
Manipulating the COMMUNITY Attribute.................................................................................. 205
Changing MED Attributes........................................................................................................... 207
Changing the LOCAL_PREFERENCE Attribute.......................................................................... 207
Changing the NEXT_HOP Attribute...........................................................................................208
Changing the WEIGHT Attribute................................................................................................209
Enabling Multipath......................................................................................................................209
Filtering BGP Routes...................................................................................................................209
Filtering BGP Routes Using Route Maps.....................................................................................211
Filtering BGP Routes Using AS-PATH Information.................................................................... 212
Configuring BGP Route Reflectors.............................................................................................212
Aggregating Routes.....................................................................................................................213
Configuring BGP Confederations...............................................................................................214
Enabling Route Flap Dampening................................................................................................ 214
Changing BGP Timers................................................................................................................. 217
Enabling BGP Neighbor Soft-Reconfiguration...........................................................................217
Route Map Continue...................................................................................................................219
Enabling MBGP Configurations........................................................................................................ 219
BGP Regular Expression Optimization.............................................................................................220
Debugging BGP................................................................................................................................ 220
Storing Last and Bad PDUs..........................................................................................................221
Capturing PDUs...........................................................................................................................222
PDU Counters............................................................................................................................. 223
Sample Configurations..................................................................................................................... 224
11 Content Addressable Memory (CAM)......................................................... 230
CAM Allocation................................................................................................................................. 230
Test CAM Usage................................................................................................................................232
View CAM Profiles.............................................................................................................................232
View CAM-ACL Settings................................................................................................................... 233
View CAM Usage...............................................................................................................................235
CAM Optimization.............................................................................................................................235
Troubleshoot CAM Profiling.............................................................................................................236
CAM Profile Mismatches.............................................................................................................236
QoS CAM Region Limitation.......................................................................................................236
12 Control Plane Policing (CoPP)..................................................................... 237
Configure Control Plane Policing.................................................................................................... 238
Configuring CoPP for Protocols................................................................................................ 239
Configuring CoPP for CPU Queues........................................................................................... 241
CoPP for OSPFv3 Packets...........................................................................................................242
Configuring CoPP for OSPFv3....................................................................................................245
Show Commands....................................................................................................................... 246
13 Dynamic Host Configuration Protocol (DHCP)........................................248
DHCP Packet Format and Options.................................................................................................. 248
Assign an IP Address using DHCP....................................................................................................250
Implementation Information............................................................................................................ 251
Configure the System to be a DHCP Server.................................................................................... 252
Configuring the Server for Automatic Address Allocation........................................................ 252
Specifying a Default Gateway.....................................................................................................254
Configure a Method of Hostname Resolution.......................................................................... 254
Using DNS for Address Resolution.............................................................................................254
Using NetBIOS WINS for Address Resolution............................................................................ 254
Creating Manual Binding Entries................................................................................................ 255
Debugging the DHCP Server......................................................................................................255
Using DHCP Clear Commands...................................................................................................255
Configure the System to be a Relay Agent......................................................................................256
Configure the System to be a DHCP Client.................................................................................... 258
DHCP Client on a Management Interface................................................................................. 258
DHCP Client Operation with Other Features............................................................................ 259
Configure the System for User Port Stacking (Option 230)........................................................... 260
Configure Secure DHCP.................................................................................................................. 260
Option 82....................................................................................................................................260
DHCP Snooping.......................................................................................................................... 261
Drop DHCP Packets on Snooped VLANs Only..........................................................................263
Dynamic ARP Inspection............................................................................................................ 263
Configuring Dynamic ARP Inspection........................................................................................265
Source Address Validation................................................................................................................266
Enabling IP Source Address Validation...................................................................................... 266
DHCP MAC Source Address Validation......................................................................................266
Enabling IP+MAC Source Address Validation............................................................................ 267
14 Equal Cost Multi-Path (ECMP).....................................................................268
ECMP for Flow-Based Affinity..........................................................................................................268
Configuring the Hash Algorithm................................................................................................ 268
Enabling Deterministic ECMP Next Hop....................................................................................268
Configuring the Hash Algorithm Seed.......................................................................................269
Link Bundle Monitoring.................................................................................................................... 269
Managing ECMP Group Paths.................................................................................................... 270
Creating an ECMP Group Bundle............................................................................................... 271
Modifying the ECMP Group Threshold.......................................................................................271
15 Enabling FIPS Cryptography.........................................................................273
Configuration Tasks.......................................................................................................................... 273
Preparing the System........................................................................................................................273
Enabling FIPS Mode.......................................................................................................................... 274
Generating Host-Keys...................................................................................................................... 274
Monitoring FIPS Mode Status........................................................................................................... 275
Disabling FIPS Mode..........................................................................................................................275
16 Force10 Resilient Ring Protocol (FRRP)..................................................... 277
Protocol Overview............................................................................................................................ 277
Ring Status...................................................................................................................................278
Multiple FRRP Rings.................................................................................................................... 279
Important FRRP Points................................................................................................................279
Important FRRP Concepts.......................................................................................................... 279
Implementing FRRP.......................................................................................................................... 281
FRRP Configuration...........................................................................................................................281
Creating the FRRP Group............................................................................................................281
Configuring the Control VLAN................................................................................................... 282
Configuring and Adding the Member VLANs.............................................................................283
Setting the FRRP Timers............................................................................................................. 284
Clearing the FRRP Counters.......................................................................................................285
Viewing the FRRP Configuration................................................................................................285
Viewing the FRRP Information................................................................................................... 285
Troubleshooting FRRP......................................................................................................................286
Configuration Checks.................................................................................................................286
Sample Configuration and Topology.............................................................................................. 286
17 GARP VLAN Registration Protocol (GVRP)................................................ 288
Important Points to Remember....................................................................................................... 288
Configure GVRP................................................................................................................................289
Related Configuration Tasks...................................................................................................... 289
Enabling GVRP Globally................................................................................................................... 290
Enabling GVRP on a Layer 2 Interface.............................................................................................290
Configure GVRP Registration...........................................................................................................290
Configure a GARP Timer...................................................................................................................291
18 Internet Group Management Protocol (IGMP).........................................293
IGMP Implementation Information..................................................................................................293
IGMP Protocol Overview..................................................................................................................293
IGMP Version 2............................................................................................................................293
IGMP Version 3............................................................................................................................295
Configure IGMP................................................................................................................................ 298
Related Configuration Tasks...................................................................................................... 298
Viewing IGMP Enabled Interfaces....................................................................................................299
Selecting an IGMP Version............................................................................................................... 299
Viewing IGMP Groups...................................................................................................................... 300
Adjusting Timers...............................................................................................................................300
Adjusting Query and Response Timers......................................................................................300
Adjusting the IGMP Querier Timeout Value...............................................................................301
Configuring a Static IGMP Group.....................................................................................................301
Enabling IGMP Immediate-Leave.................................................................................................... 302
IGMP Snooping.................................................................................................................................302
IGMP Snooping Implementation Information...........................................................................302
Configuring IGMP Snooping...................................................................................................... 302
Removing a Group-Port Association......................................................................................... 303
Disabling Multicast Flooding...................................................................................................... 303
Specifying a Port as Connected to a Multicast Router............................................................. 304
Configuring the Switch as Querier.............................................................................................304
Fast Convergence after MSTP Topology Changes......................................................................... 305
Egress Interface Selection (EIS) for HTTP and IGMP Applications..................................................305
Protocol Separation....................................................................................................................306
Enabling and Disabling Management Egress Interface Selection.............................................307
Handling of Management Route Configuration........................................................................308
Handling of Switch-Initiated Traffic...........................................................................................308
Handling of Switch-Destined Traffic......................................................................................... 309
Handling of Transit Traffic (Traffic Separation).......................................................................... 310
Mapping of Management Applications and Traffic Type...........................................................310
Behavior of Various Applications for Switch-Initiated Traffic ................................................... 311
Behavior of Various Applications for Switch-Destined Traffic ................................................. 312
Interworking of EIS With Various Applications...........................................................................313
Designating a Multicast Router Interface.........................................................................................314
19 Interfaces..........................................................................................................315
Basic Interface Configuration........................................................................................................... 315
Advanced Interface Configuration................................................................................................... 315
Interface Types..................................................................................................................................316
View Basic Interface Information..................................................................................................... 316
Enabling a Physical Interface............................................................................................................318
Physical Interfaces.............................................................................................................................318
Configuration Task List for Physical Interfaces.......................................................................... 319
Overview of Layer Modes........................................................................................................... 319
Configuring Layer 2 (Data Link) Mode........................................................................................319
Configuring Layer 2 (Interface) Mode........................................................................................320
Configuring Layer 3 (Network) Mode........................................................................................ 320
Configuring Layer 3 (Interface) Mode.........................................................................................321
Egress Interface Selection (EIS).........................................................................................................321
Important Points to Remember..................................................................................................322
Configuring EIS........................................................................................................................... 322
Management Interfaces....................................................................................................................322
Configuring Management Interfaces......................................................................................... 322
Configuring Management Interfaces on the S-Series...............................................................323
VLAN Interfaces................................................................................................................................ 324
Loopback Interfaces......................................................................................................................... 325
Null Interfaces................................................................................................................................... 325
Port Channel Interfaces....................................................................................................................325
Port Channel Definition and Standards......................................................................................326
Port Channel Benefits.................................................................................................................326
Port Channel Implementation....................................................................................................326
10/100/1000 Mbps Interfaces in Port Channels........................................................................327
Configuration Tasks for Port Channel Interfaces...................................................................... 327
Creating a Port Channel............................................................................................................. 328
Adding a Physical Interface to a Port Channel.......................................................................... 328
Reassigning an Interface to a New Port Channel......................................................................330
Configuring the Minimum Oper Up Links in a Port Channel.....................................................331
......................................................................................................................................................331
Assigning an IP Address to a Port Channel................................................................................ 332
Deleting or Disabling a Port Channel.........................................................................................332
Load Balancing Through Port Channels.................................................................................... 332
Load-Balancing on the S- Series................................................................................................333
Changing the Hash Algorithm.................................................................................................... 333
Bulk Configuration............................................................................................................................335
Interface Range........................................................................................................................... 335
Bulk Configuration Examples..................................................................................................... 335
Defining Interface Range Macros.....................................................................................................337
Define the Interface Range.........................................................................................................337
Choosing an Interface-Range Macro.........................................................................................337
Monitoring and Maintaining Interfaces............................................................................................338
Maintenance Using TDR............................................................................................................. 339
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 339
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................340
Important Points to Remember..................................................................................................341
Support for LM4 Optics...............................................................................................................341
Example Scenarios......................................................................................................................342
Link Dampening................................................................................................................................346
Important Points to Remember................................................................................................. 346
Enabling Link Dampening...........................................................................................................346
Link Bundle Monitoring.................................................................................................................... 348
Using Ethernet Pause Frames for Flow Control.............................................................................. 348
Threshold Settings...................................................................................................................... 349
Enabling Pause Frames...............................................................................................................349
Configure the MTU Size on an Interface......................................................................................... 350
Port-Pipes..........................................................................................................................................351
Auto-Negotiation on Ethernet Interfaces........................................................................................ 351
Setting the Speed and Duplex Mode of Ethernet Interfaces.....................................................352
Set Auto-Negotiation Options....................................................................................................353
View Advanced Interface Information............................................................................................. 354
Configuring the Interface Sampling Size................................................................................... 355
Dynamic Counters............................................................................................................................356
Clearing Interface Counters....................................................................................................... 356
Enhanced Validation of Interface Ranges........................................................................................ 357
20 Internet Protocol Security (IPSec).............................................................. 358
Configuring IPSec ............................................................................................................................ 359
21 IPv4 Routing....................................................................................................360
IP Addresses......................................................................................................................................360
Implementation Information......................................................................................................360
Configuration Tasks for IP Addresses.............................................................................................. 360
Assigning IP Addresses to an Interface.............................................................................................361
Configuring Static Routes.................................................................................................................362
Configure Static Routes for the Management Interface.................................................................363
IPv4 Path MTU Discovery Overview.................................................................................................364
Using the Configured Source IP Address in ICMP Messages..........................................................365
Configuring the ICMP Source Interface.....................................................................................365
Configuring the Duration to Establish a TCP Connection..............................................................365
Enabling Directed Broadcast............................................................................................................366
Resolution of Host Names............................................................................................................... 366
Enabling Dynamic Resolution of Host Names................................................................................ 366
Specifying the Local System Domain and a List of Domains..........................................................367
Configuring DNS with Traceroute....................................................................................................367
ARP.................................................................................................................................................... 368
Configuration Tasks for ARP............................................................................................................ 369
Configuring Static ARP Entries......................................................................................................... 369
Enabling Proxy ARP...........................................................................................................................369
Clearing ARP Cache..........................................................................................................................370
ARP Learning via Gratuitous ARP..................................................................................................... 370
Enabling ARP Learning via Gratuitous ARP.......................................................................................371
ARP Learning via ARP Request..........................................................................................................371
Configuring ARP Retries....................................................................................................................372
ICMP.................................................................................................................................................. 373
Configuration Tasks for ICMP...........................................................................................................373
Enabling ICMP Unreachable Messages............................................................................................373
UDP Helper........................................................................................................................................373
Configure UDP Helper................................................................................................................ 373
Important Points to Remember..................................................................................................374
Enabling UDP Helper........................................................................................................................ 374
Configuring a Broadcast Address.....................................................................................................374
Configurations Using UDP Helper....................................................................................................375
UDP Helper with Broadcast-All Addresses...................................................................................... 375
UDP Helper with Subnet Broadcast Addresses................................................................................376
UDP Helper with Configured Broadcast Addresses.........................................................................377
UDP Helper with No Configured Broadcast Addresses...................................................................377
Troubleshooting UDP Helper........................................................................................................... 377
22 IPv6 Routing....................................................................................................379
Protocol Overview............................................................................................................................ 379
Extended Address Space.............................................................................................................379
Stateless Autoconfiguration........................................................................................................379
IPv6 Headers............................................................................................................................... 380
IPv6 Header Fields.......................................................................................................................381
Extension Header Fields..............................................................................................................382
Addressing...................................................................................................................................383
Implementing IPv6 with Dell Networking OS..................................................................................385
ICMPv6.............................................................................................................................................. 387
Path MTU Discovery..........................................................................................................................387
IPv6 Neighbor Discovery..................................................................................................................388
IPv6 Neighbor Discovery of MTU Packets.................................................................................389
Configuration Task List for IPv6 RDNSS.......................................................................................... 389
Configuring the IPv6 Recursive DNS Server.............................................................................. 389
Debugging IPv6 RDNSS Information Sent to the Host ............................................................ 390
Displaying IPv6 RDNSS Information........................................................................................... 391
Secure Shell (SSH) Over an IPv6 Transport......................................................................................392
Configuration Tasks for IPv6............................................................................................................ 392
Adjusting Your CAM-Profile........................................................................................................392
Assigning an IPv6 Address to an Interface.................................................................................393
Assigning a Static IPv6 Route..................................................................................................... 393
Configuring Telnet with IPv6......................................................................................................394
SNMP over IPv6...........................................................................................................................394
Showing IPv6 Information.......................................................................................................... 395
Showing an IPv6 Interface..........................................................................................................395
Showing IPv6 Routes..................................................................................................................396
Showing the Running-Configuration for an Interface.............................................................. 397
Clearing IPv6 Routes...................................................................................................................398
23 Intermediate System to Intermediate System.......................................... 399
IS-IS Protocol Overview................................................................................................................... 399
IS-IS Addressing................................................................................................................................399
Multi-Topology IS-IS........................................................................................................................400
Transition Mode.......................................................................................................................... 401
Interface Support........................................................................................................................ 401
Adjacencies..................................................................................................................................401
Graceful Restart................................................................................................................................ 401
Timers..........................................................................................................................................402
Implementation Information............................................................................................................402
Configuration Information............................................................................................................... 403
Configuration Tasks for IS-IS..................................................................................................... 403
Configuring the Distance of a Route..........................................................................................412
Changing the IS-Type................................................................................................................. 412
Redistributing IPv4 Routes..........................................................................................................415
Redistributing IPv6 Routes..........................................................................................................416
Configuring Authentication Passwords......................................................................................417
Setting the Overload Bit.............................................................................................................. 417
Debugging IS-IS.......................................................................................................................... 418
IS-IS Metric Styles..............................................................................................................................419
Configure Metric Values................................................................................................................... 419
Maximum Values in the Routing Table...................................................................................... 420
Change the IS-IS Metric Style in One Level Only......................................................................420
Leaks from One Level to Another.............................................................................................. 422
Sample Configurations..................................................................................................................... 422
24 Link Aggregation Control Protocol (LACP)...............................................425
Introduction to Dynamic LAGs and LACP....................................................................................... 425
Important Points to Remember................................................................................................. 425
LACP Modes................................................................................................................................426
Configuring LACP Commands...................................................................................................426
LACP Configuration Tasks................................................................................................................ 427
Creating a LAG............................................................................................................................ 427
Configuring the LAG Interfaces as Dynamic............................................................................. 428
Setting the LACP Long Timeout.................................................................................................428
Monitoring and Debugging LACP.............................................................................................. 429
Shared LAG State Tracking...............................................................................................................429
Configuring Shared LAG State Tracking.................................................................................... 430
Important Points about Shared LAG State Tracking.................................................................. 431
LACP Basic Configuration Example................................................................................................. 432
Configure a LAG on ALPHA........................................................................................................ 432
Setting Up a Threshold for Utilization of High-Gigabit Port Channels.......................................... 439
Guidelines for Monitoring High-Gigabit Port Channels............................................................441
Enabling the Verification of Member Links Utilization in a High-Gigabit Port Channel................442
Viewing Buffer Utilization and Queue Statistics on High-Gigabit Ethernet Backplane Ports....... 442
25 Layer 2..............................................................................................................444
Manage the MAC Address Table......................................................................................................444
Clearing the MAC Address Table............................................................................................... 444
Setting the Aging Time for Dynamic Entries..............................................................................444
Configuring a Static MAC Address............................................................................................. 445
Displaying the MAC Address Table............................................................................................ 445
MAC Learning Limit.......................................................................................................................... 445
Setting the MAC Learning Limit................................................................................................. 446
mac learning-limit Dynamic.......................................................................................................446
mac learning-limit mac-address-sticky.....................................................................................447
mac learning-limit station-move............................................................................................... 447
mac learning-limit no-station-move.........................................................................................447
Learning Limit Violation Actions................................................................................................ 448
Setting Station Move Violation Actions......................................................................................448
Recovering from Learning Limit and Station Move Violations................................................. 449
NIC Teaming.....................................................................................................................................449
Configure Redundant Pairs.............................................................................................................. 450
Important Points about Configuring Redundant Pairs..............................................................452
Far-End Failure Detection................................................................................................................ 453
FEFD State Changes....................................................................................................................454
Configuring FEFD........................................................................................................................455
Enabling FEFD on an Interface...................................................................................................456
Debugging FEFD......................................................................................................................... 457
26 Link Layer Discovery Protocol (LLDP)........................................................459
802.1AB (LLDP) Overview.................................................................................................................459
Protocol Data Units.....................................................................................................................459
Optional TLVs................................................................................................................................... 460
Management TLVs......................................................................................................................460
TIA-1057 (LLDP-MED) Overview......................................................................................................462
TIA Organizationally Specific TLVs.............................................................................................463
Configure LLDP.................................................................................................................................467
Related Configuration Tasks.......................................................................................................467
Important Points to Remember................................................................................................. 468
LLDP Compatibility..................................................................................................................... 468
CONFIGURATION versus INTERFACE Configurations................................................................... 468
Enabling LLDP...................................................................................................................................469
Disabling and Undoing LLDP......................................................................................................469
Enabling LLDP on Management Ports.............................................................................................469
Disabling and Undoing LLDP on Management Ports................................................................469
Advertising TLVs................................................................................................................................470
Viewing the LLDP Configuration...................................................................................................... 471
Viewing Information Advertised by Adjacent LLDP Agents.............................................................472
Configuring LLDPDU Intervals..........................................................................................................473
Configuring Transmit and Receive Mode........................................................................................ 473
Configuring a Time to Live............................................................................................................... 474
Debugging LLDP............................................................................................................................... 475
Relevant Management Objects........................................................................................................476
27 Microsoft Network Load Balancing............................................................482
NLB Unicast Mode Scenario.............................................................................................................482
NLB Multicast Mode Scenario..........................................................................................................483
Limitations With Enabling NLB on Switches....................................................................................483
Benefits and Working of Microsoft Clustering................................................................................ 483
Enable and Disable VLAN Flooding .................................................................................................484
Configuring a Switch for NLB ......................................................................................................... 484
.....................................................................................................................................................484
28 Multicast Source Discovery Protocol (MSDP).......................................... 485
Protocol Overview............................................................................................................................485
Anycast RP.........................................................................................................................................487
Implementation Information............................................................................................................487
Configure Multicast Source Discovery Protocol............................................................................. 487
Related Configuration Tasks.......................................................................................................487
Enable MSDP..................................................................................................................................... 491
Manage the Source-Active Cache...................................................................................................492
Viewing the Source-Active Cache............................................................................................. 492
Limiting the Source-Active Cache............................................................................................. 493
Clearing the Source-Active Cache.............................................................................................493
Enabling the Rejected Source-Active Cache.............................................................................493
Accept Source-Active Messages that Fail the RFP Check.............................................................. 493
Specifying Source-Active Messages................................................................................................ 497
Limiting the Source-Active Messages from a Peer......................................................................... 498
Preventing MSDP from Caching a Local Source.............................................................................498
Preventing MSDP from Caching a Remote Source.........................................................................499
Preventing MSDP from Advertising a Local Source........................................................................ 500
Logging Changes in Peership States................................................................................................501
Terminating a Peership..................................................................................................................... 501
Clearing Peer Statistics..................................................................................................................... 501
Debugging MSDP..............................................................................................................................502
MSDP with Anycast RP..................................................................................................................... 502
Configuring Anycast RP....................................................................................................................504
Reducing Source-Active Message Flooding..............................................................................504
Specifying the RP Address Used in SA Messages...................................................................... 504
MSDP Sample Configurations.......................................................................................................... 507
29 Multiple Spanning Tree Protocol (MSTP).................................................. 510
Protocol Overview............................................................................................................................ 510
Spanning Tree Variations...................................................................................................................511
Implementation Information.......................................................................................................511
Configure Multiple Spanning Tree Protocol.....................................................................................511
Related Configuration Tasks........................................................................................................511
Enable Multiple Spanning Tree Globally...........................................................................................512
Adding and Removing Interfaces......................................................................................................512
Creating Multiple Spanning Tree Instances......................................................................................512
Influencing MSTP Root Selection.....................................................................................................514
Interoperate with Non-Dell Networking OS Bridges.......................................................................514
Changing the Region Name or Revision.......................................................................................... 515
Modifying Global Parameters........................................................................................................... 515
Modifying the Interface Parameters................................................................................................. 516
Configuring an EdgePort...................................................................................................................517
Flush MAC Addresses after a Topology Change..............................................................................518
MSTP Sample Configurations........................................................................................................... 518
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration.............................................................519
Debugging and Verifying MSTP Configurations.............................................................................. 522
30 Multicast Features..........................................................................................525
Enabling IP Multicast.........................................................................................................................525
Multicast with ECMP......................................................................................................................... 525
Implementation Information............................................................................................................526
First Packet Forwarding for Lossless Multicast................................................................................ 527
Multicast Policies...............................................................................................................................527
IPv4 Multicast Policies.................................................................................................................527
31 Open Shortest Path First (OSPFv2 and OSPFv3).......................................535
Protocol Overview............................................................................................................................ 535
Autonomous System (AS) Areas................................................................................................. 535
Area Types...................................................................................................................................536
Networks and Neighbors............................................................................................................ 537
Router Types................................................................................................................................537
Designated and Backup Designated Routers............................................................................ 539
Link-State Advertisements (LSAs)............................................................................................... 539
Router Priority and Cost..............................................................................................................541
OSPF with Dell Networking OS........................................................................................................ 541
Graceful Restart.......................................................................................................................... 542
Fast Convergence (OSPFv2, IPv4 Only)..................................................................................... 543
Multi-Process OSPFv2 (IPv4 only)..............................................................................................543
RFC-2328 Compliant OSPF Flooding........................................................................................ 544
OSPF ACK Packing...................................................................................................................... 545
Setting OSPF Adjacency with Cisco Routers............................................................................. 545
Configuration Information............................................................................................................... 546
Configuration Task List for OSPFv2 (OSPF for IPv4)..................................................................546
Sample Configurations for OSPFv2..................................................................................................561
Basic OSPFv2 Router Topology..................................................................................................561
OSPF Area 0 — Gl 1/1 and 1/2.....................................................................................................561
OSPF Area 0 — Gl 3/1 and 3/2....................................................................................................562
OSPF Area 0 — Gl 2/1 and 2/2....................................................................................................562
Configuration Task List for OSPFv3 (OSPF for IPv6)........................................................................562
Enabling IPv6 Unicast Routing................................................................................................... 563
Assigning IPv6 Addresses on an Interface................................................................................. 563
Assigning Area ID on an Interface.............................................................................................. 563
Assigning OSPFv3 Process ID and Router ID Globally.............................................................. 564
Configuring Stub Areas...............................................................................................................564
Configuring Passive-Interface....................................................................................................565
Redistributing Routes..................................................................................................................565
Configuring a Default Route...................................................................................................... 566
Enabling OSPFv3 Graceful Restart............................................................................................. 566
OSPFv3 Authentication Using IPsec...........................................................................................568
Troubleshooting OSPFv3............................................................................................................576
32 Policy-based Routing (PBR)......................................................................... 578
Overview............................................................................................................................................578
Implementing Policy-based Routing with Dell Networking OS.....................................................580
Configuration Task List for Policy-based Routing.......................................................................... 580
PBR Exceptions (Permit)............................................................................................................. 583
Sample Configuration.......................................................................................................................585
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View
Redirect-List GOLD.....................................................................................................................586
33 PIM Sparse-Mode (PIM-SM)......................................................................... 588
Implementation Information............................................................................................................588
Protocol Overview............................................................................................................................588
Requesting Multicast Traffic.......................................................................................................588
Refuse Multicast Traffic.............................................................................................................. 589
Send Multicast Traffic................................................................................................................. 589
Configuring PIM-SM.........................................................................................................................590
Related Configuration Tasks...................................................................................................... 590
Enable PIM-SM................................................................................................................................. 590
Configuring S,G Expiry Timers..........................................................................................................591
Configuring a Static Rendezvous Point........................................................................................... 592
Overriding Bootstrap Router Updates........................................................................................593
Configuring a Designated Router.................................................................................................... 593
Creating Multicast Boundaries and Domains.................................................................................. 594
Enabling PIM-SM Graceful Restart...................................................................................................594
34 PIM Source-Specific Mode (PIM-SSM).......................................................595
Implementation Information............................................................................................................595
Important Points to Remember..................................................................................................595
Configure PIM-SMM.........................................................................................................................596
Related Configuration Tasks...................................................................................................... 596
Enabling PIM-SSM............................................................................................................................ 596
Use PIM-SSM with IGMP Version 2 Hosts....................................................................................... 596
Configuring PIM-SSM with IGMPv2............................................................................................597
35 Port Monitoring..............................................................................................599
Important Points to Remember....................................................................................................... 599
Port Monitoring................................................................................................................................ 600
Configuring Port Monitoring............................................................................................................ 601
Enabling Flow-Based Monitoring.................................................................................................... 603
Remote Port Mirroring..................................................................................................................... 604
Remote Port Mirroring Example................................................................................................ 604
Configuring Remote Port Mirroring...........................................................................................605
Displaying Remote-Port Mirroring Configurations................................................................... 607
/