Dell PowerSwitch S6000 ON Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6000 ON Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S6000–ON
System
9.14.2.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2019 - 04
Rev. A00
Contents
1 About this Guide...........................................................................................................................................37
Audience............................................................................................................................................................................37
Conventions...................................................................................................................................................................... 37
Related Documents..........................................................................................................................................................37
2 Conguration Fundamentals........................................................................................................................ 38
Accessing the Command Line........................................................................................................................................38
CLI Modes.........................................................................................................................................................................38
Navigating CLI Modes...............................................................................................................................................40
The do Command............................................................................................................................................................ 43
Undoing Commands........................................................................................................................................................ 43
Obtaining Help..................................................................................................................................................................44
Entering and Editing Commands....................................................................................................................................44
Command History............................................................................................................................................................45
Filtering show Command Outputs.................................................................................................................................45
Example of the grep Keyword.................................................................................................................................. 45
Multiple Users in Conguration Mode...........................................................................................................................46
3 Getting Started............................................................................................................................................47
Console Access................................................................................................................................................................48
Serial Console.............................................................................................................................................................48
Default Conguration...................................................................................................................................................... 49
Conguring a Host Name............................................................................................................................................... 49
Accessing the System Remotely....................................................................................................................................49
Accessing the System Remotely............................................................................................................................. 50
Congure the Management Port IP Address.........................................................................................................50
Congure a Management Route..............................................................................................................................50
Conguring a Username and Password..................................................................................................................50
Conguring the Enable Password...................................................................................................................................51
Conguration File Management.....................................................................................................................................52
Copy Files to and from the System......................................................................................................................... 52
Mounting an NFS File System..................................................................................................................................53
Save the Running-Conguration..............................................................................................................................54
Congure the Overload Bit for a Startup Scenario............................................................................................... 55
Viewing Files...............................................................................................................................................................55
Managing the File System.............................................................................................................................................. 56
View Command History.................................................................................................................................................. 56
Upgrading Dell EMC Networking OS.............................................................................................................................57
Using HTTP for File Transfers........................................................................................................................................ 57
Verify Software Images Before Installation...................................................................................................................58
4 Management............................................................................................................................................... 59
Contents
3
Conguring Privilege Levels........................................................................................................................................... 59
Creating a Custom Privilege Level...........................................................................................................................60
Removing a Command from EXEC Mode.............................................................................................................. 60
Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 60
Allowing Access to CONFIGURATION Mode Commands....................................................................................60
Allowing Access to Dierent Modes........................................................................................................................60
Applying a Privilege Level to a Username............................................................................................................... 62
Applying a Privilege Level to a Terminal Line.......................................................................................................... 62
Conguring Logging........................................................................................................................................................ 62
Audit and Security Logs............................................................................................................................................ 63
Conguring Logging Format ...................................................................................................................................64
Setting Up a Secure Connection to a Syslog Server.............................................................................................64
Log Messages in the Internal Buer..............................................................................................................................66
Conguration Task List for System Log Management..........................................................................................66
Disabling System Logging...............................................................................................................................................66
Sending System Messages to a Syslog Server............................................................................................................66
Conguring a UNIX System as a Syslog Server.....................................................................................................66
Track Login Activity..........................................................................................................................................................67
Restrictions for Tracking Login Activity...................................................................................................................67
Conguring Login Activity Tracking......................................................................................................................... 67
Display Login Statistics..............................................................................................................................................68
Limit Concurrent Login Sessions....................................................................................................................................69
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 69
Conguring Concurrent Session Limit.....................................................................................................................69
Enabling the System to Clear Existing Sessions.................................................................................................... 70
Enabling Secured CLI Mode............................................................................................................................................ 71
Changing System Logging Settings............................................................................................................................... 71
Display the Logging Buer and the Logging Conguration........................................................................................ 72
Conguring a UNIX Logging Facility Level.................................................................................................................... 72
Synchronizing Log Messages......................................................................................................................................... 73
Enabling Timestamp on Syslog Messages.................................................................................................................... 74
File Transfer Services.......................................................................................................................................................74
Conguration Task List for File Transfer Services..................................................................................................75
Enabling the FTP Server...........................................................................................................................................75
Conguring FTP Server Parameters....................................................................................................................... 75
Conguring FTP Client Parameters......................................................................................................................... 76
Terminal Lines................................................................................................................................................................... 76
Denying and Permitting Access to a Terminal Line................................................................................................76
Conguring Login Authentication for Terminal Lines............................................................................................. 77
Setting Timeout for EXEC Privilege Mode................................................................................................................... 78
Using Telnet to get to Another Network Device..........................................................................................................79
Lock CONFIGURATION Mode....................................................................................................................................... 79
Viewing the Conguration Lock Status...................................................................................................................79
Reloading the system...................................................................................................................................................... 80
Restoring the Factory Default Settings......................................................................................................................... 81
4
Contents
Important Points to Remember................................................................................................................................ 81
Restoring Factory Default Environment Variables.................................................................................................. 81
Viewing the Reason for Last System Reboot...............................................................................................................83
Disabling Syslog Messages for SNMP Authentication Failure Events.......................................................................83
5 802.1X..........................................................................................................................................................84
Port-Authentication Process..........................................................................................................................................86
EAP over RADIUS......................................................................................................................................................86
Conguring 802.1X........................................................................................................................................................... 87
Related Conguration Tasks..................................................................................................................................... 87
Important Points to Remember......................................................................................................................................87
Enabling 802.1X................................................................................................................................................................ 88
Conguring dot1x Prole ................................................................................................................................................89
Conguring MAC addresses for a do1x Prole.............................................................................................................90
Conguring the Static MAB and MAB Prole .............................................................................................................90
Conguring Critical VLAN .............................................................................................................................................. 91
Conguring Request Identity Re-Transmissions...........................................................................................................92
Conguring a Quiet Period after a Failed Authentication..................................................................................... 92
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 93
Re-Authenticating a Port................................................................................................................................................94
Conguring Timeouts......................................................................................................................................................95
Conguring Dynamic VLAN Assignment with Port Authentication.......................................................................... 96
Guest and Authentication-Fail VLANs...........................................................................................................................97
Conguring a Guest VLAN........................................................................................................................................97
Conguring an Authentication-Fail VLAN............................................................................................................... 97
6 Access Control Lists (ACLs)........................................................................................................................ 99
IP Access Control Lists (ACLs).....................................................................................................................................100
CAM Usage................................................................................................................................................................101
Implementing ACLs on Dell EMC Networking OS................................................................................................ 101
Congure ACL Range Proles................................................................................................................................ 103
Important Points to Remember....................................................................................................................................104
Conguration Task List for Route Maps................................................................................................................104
Conguring Match Routes......................................................................................................................................106
Conguring Set Conditions..................................................................................................................................... 107
Congure a Route Map for Route Redistribution.................................................................................................108
Congure a Route Map for Route Tagging........................................................................................................... 109
Continue Clause........................................................................................................................................................109
IP Fragment Handling..................................................................................................................................................... 110
IP Fragments ACL Examples................................................................................................................................... 110
Layer 4 ACL Rules Examples................................................................................................................................... 110
Congure a Standard IP ACL..........................................................................................................................................111
Conguring a Standard IP ACL Filter......................................................................................................................112
Congure an Extended IP ACL......................................................................................................................................113
Conguring Filters with a Sequence Number........................................................................................................113
Conguring Filters Without a Sequence Number................................................................................................. 116
Contents
5
Congure Layer 2 and Layer 3 ACLs............................................................................................................................ 116
Assign an IP ACL to an Interface...................................................................................................................................117
Applying an IP ACL..........................................................................................................................................................117
Counting ACL Hits.................................................................................................................................................... 118
Congure Ingress ACLs.................................................................................................................................................. 118
Congure Egress ACLs...................................................................................................................................................119
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 120
IP Prex Lists.................................................................................................................................................................. 120
Implementation Information..................................................................................................................................... 121
Conguration Task List for Prex Lists...................................................................................................................121
ACL Remarks.................................................................................................................................................................. 124
Conguring a Remark.............................................................................................................................................. 124
Deleting a Remark.................................................................................................................................................... 125
ACL Resequencing......................................................................................................................................................... 126
Resequencing an ACL or Prex List.......................................................................................................................126
Route Maps..................................................................................................................................................................... 127
Implementation Information.....................................................................................................................................127
Flow-Based Monitoring..................................................................................................................................................128
Behavior of Flow-Based Monitoring.......................................................................................................................128
Enabling Flow-Based Monitoring............................................................................................................................129
Conguring IP Mirror Access Group............................................................................................................................ 130
Sample Conguration................................................................................................................................................131
Example of viewing IP mirror–access–group applied to an Interface................................................................132
7 Bidirectional Forwarding Detection (BFD).................................................................................................. 133
How BFD Works............................................................................................................................................................. 133
BFD Packet Format..................................................................................................................................................134
BFD Sessions............................................................................................................................................................ 135
BFD Three-Way Handshake.................................................................................................................................... 136
Session State Changes............................................................................................................................................138
Important Points to Remember.................................................................................................................................... 138
Congure BFD................................................................................................................................................................ 139
Congure BFD for Physical Ports...........................................................................................................................139
Congure BFD for Static Routes.............................................................................................................................141
Congure BFD for IPv6 Static Routes...................................................................................................................144
Congure BFD for OSPF......................................................................................................................................... 147
Congure BFD for OSPFv3......................................................................................................................................151
Congure BFD for IS-IS...........................................................................................................................................154
Congure BFD for BGP...........................................................................................................................................156
Congure BFD for VRRP.........................................................................................................................................164
Conguring Protocol Liveness................................................................................................................................166
8 Border Gateway Protocol (BGP).................................................................................................................167
BGP IP version 4 (BGPv4) Overview.......................................................................................................................... 167
BGP Autonomous Systems..................................................................................................................................... 167
AS4 Number Representation.................................................................................................................................. 169
6
Contents
Four-Byte AS Numbers............................................................................................................................................ 171
BGP router ID.............................................................................................................................................................171
Sessions and Peers................................................................................................................................................... 171
Establish a Session................................................................................................................................................... 172
BGP Attributes for selecting Best Path.................................................................................................................172
Multiprotocol BGP.................................................................................................................................................... 177
BGP global and address family conguration........................................................................................................178
Implement BGP with Dell EMC Networking OS...................................................................................................180
Conguration Information........................................................................................................................................183
Basic BGP conguration tasks......................................................................................................................................183
Prerequisite for conguring a BGP network......................................................................................................... 183
Restrictions............................................................................................................................................................... 184
Enabling BGP............................................................................................................................................................ 184
Enabling four-byte autonomous system numbers................................................................................................186
Changing a BGP router ID....................................................................................................................................... 187
Conguring AS4 Number Representations........................................................................................................... 187
Conguring a BGP peer...........................................................................................................................................189
Example-Conguring BGP routing between peers..............................................................................................190
BGP peer group.........................................................................................................................................................191
Advanced BGP conguration tasks..............................................................................................................................197
Route-refresh and Soft-reconguration................................................................................................................198
Aggregating Routes.................................................................................................................................................200
Filtering BGP............................................................................................................................................................ 202
Conguring BGP Fast Fall-Over............................................................................................................................ 209
Conguring Passive Peering................................................................................................................................... 210
Enabling Graceful Restart........................................................................................................................................ 211
Redistributing Routes...............................................................................................................................................212
Enabling Additional Paths........................................................................................................................................ 213
Conguring IP Community Lists............................................................................................................................. 214
Conguring an IP Extended Community List........................................................................................................215
Congure BGP attributes........................................................................................................................................216
Enabling Multipath...................................................................................................................................................220
Route Reectors.......................................................................................................................................................221
Enabling Route Flap Dampening............................................................................................................................ 222
Changing BGP keepalive and hold timers.............................................................................................................224
Setting the extended timer.................................................................................................................................... 225
Enabling or disabling BGP neighbors.....................................................................................................................226
Route Map Continue............................................................................................................................................... 227
Conguring BGP Confederations...........................................................................................................................227
Conguring a BGP VRF address family.................................................................................................................228
Maintaining Existing AS Numbers During an AS Migration................................................................................ 229
Allowing an AS Number to Appear in its Own AS Path...................................................................................... 230
Enabling MBGP Congurations.............................................................................................................................. 231
MBGP support for IPv6...........................................................................................................................................231
Conguring IPv6 MBGP between peers...............................................................................................................232
Contents
7
Example-Conguring IPv4 and IPv6 neighbors................................................................................................... 232
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor......................................... 235
BGP Regular Expression Optimization..................................................................................................................236
Debugging BGP........................................................................................................................................................237
9 Content Addressable Memory (CAM)........................................................................................................239
CAM Allocation...............................................................................................................................................................239
Test CAM Usage.............................................................................................................................................................241
View CAM Proles..........................................................................................................................................................241
View CAM-ACL Settings.............................................................................................................................................. 242
View CAM Usage...........................................................................................................................................................243
Conguring CAM Threshold and Silence Period........................................................................................................244
Setting CAM Threshold and Silence Period..........................................................................................................244
CAM Optimization......................................................................................................................................................... 245
Troubleshoot CAM Proling..........................................................................................................................................245
QoS CAM Region Limitation...................................................................................................................................245
Syslog Error When the Table is Full....................................................................................................................... 246
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................246
Syslog Warning for Discrepancies Between Congured Extended Prexes....................................................246
Unied Forwarding Table (UFT) Modes......................................................................................................................246
Conguring UFT Modes..........................................................................................................................................246
10 Control Plane Policing (CoPP)..................................................................................................................248
Congure Control Plane Policing................................................................................................................................. 249
Conguring CoPP for Protocols............................................................................................................................ 250
Conguring CoPP for CPU Queues...................................................................................................................... 252
Displaying CoPP Conguration ............................................................................................................................. 253
11 Data Center Bridging (DCB)..................................................................................................................... 255
Ethernet Enhancements in Data Center Bridging..................................................................................................... 255
Priority-Based Flow Control................................................................................................................................... 256
Enhanced Transmission Selection..........................................................................................................................257
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................258
Data Center Bridging in a Trac Flow.................................................................................................................. 259
Enabling Data Center Bridging.....................................................................................................................................259
DCB Maps and its Attributes................................................................................................................................. 260
Data Center Bridging: Default Conguration.............................................................................................................. 261
Conguring Priority-Based Flow Control.....................................................................................................................261
Conguring Lossless Queues................................................................................................................................. 262
Conguring PFC in a DCB Map................................................................................................................................... 264
PFC Conguration Notes........................................................................................................................................264
PFC Prerequisites and Restrictions.......................................................................................................................265
Applying a DCB Map on a Port....................................................................................................................................265
Conguring PFC without a DCB Map.........................................................................................................................266
Conguring Lossless QueuesExample:..................................................................................................................266
Conguring PFC Asymmetric.......................................................................................................................................267
8
Contents
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................268
Pause and Resume of Trac..................................................................................................................................268
Buer Sizes for Lossless or PFC Packets............................................................................................................ 268
Behavior of Tagged Packets.........................................................................................................................................269
Conguration Example for DSCP and PFC Priorities................................................................................................269
SNMP Support for PFC and Buer Statistics Tracking............................................................................................270
Performing PFC Using DSCP Bits Instead of 802.1p Bits..........................................................................................271
PFC and ETS Conguration Examples........................................................................................................................272
Using PFC to Manage Converged Ethernet Trac...................................................................................................272
Operations on Untagged Packets................................................................................................................................ 272
Generation of PFC for a Priority for Untagged Packets........................................................................................... 273
Congure Enhanced Transmission Selection..............................................................................................................273
ETS Prerequisites and Restrictions........................................................................................................................273
Creating an ETS Priority Group..............................................................................................................................273
ETS Operation with DCBx.......................................................................................................................................274
Conguring Bandwidth Allocation for DCBx CIN.................................................................................................275
Conguring ETS in a DCB Map..............................................................................................................................276
Hierarchical Scheduling in ETS Output Policies..........................................................................................................277
Using ETS to Manage Converged Ethernet Trac................................................................................................... 277
Applying DCB Policies in a Switch Stack.................................................................................................................... 278
Congure a DCBx Operation........................................................................................................................................ 278
DCBx Operation....................................................................................................................................................... 278
DCBx Port Roles...................................................................................................................................................... 278
DCB Conguration Exchange................................................................................................................................ 280
Conguration Source Election............................................................................................................................... 280
Propagation of DCB Information............................................................................................................................ 281
Auto-Detection and Manual Conguration of the DCBx Version....................................................................... 281
DCBx Example.......................................................................................................................................................... 281
DCBx Prerequisites and Restrictions.....................................................................................................................282
Conguring DCBx.................................................................................................................................................... 282
Verifying the DCB Conguration................................................................................................................................. 286
QoS dot1p Trac Classication and Queue Assignment..........................................................................................294
Conguring the Dynamic Buer Method................................................................................................................... 295
Sample DCB Conguration...........................................................................................................................................296
PFC and ETS Conguration Command Examples...............................................................................................297
12 Dynamic Host Conguration Protocol (DHCP).........................................................................................298
DHCP Packet Format and Options............................................................................................................................. 298
Assign an IP Address using DHCP...............................................................................................................................300
Implementation Information.......................................................................................................................................... 301
Congure the System to be a DHCP Server.............................................................................................................. 301
Conguring the Server for Automatic Address Allocation..................................................................................302
Specifying a Default Gateway................................................................................................................................ 303
Congure a Method of Hostname Resolution..................................................................................................... 304
Using DNS for Address Resolution........................................................................................................................304
Using NetBIOS WINS for Address Resolution..................................................................................................... 304
Contents
9
Creating Manual Binding Entries............................................................................................................................304
Debugging the DHCP Server.................................................................................................................................305
Using DHCP Clear Commands.............................................................................................................................. 305
Congure the System to be a DHCP Client...............................................................................................................305
Conguring the DHCP Client System...................................................................................................................306
DHCP Client on a Management Interface............................................................................................................ 307
DHCP Client Operation with Other Features.......................................................................................................308
DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................309
Conguring Route Leaking between VRFs on DHCP Relay Agent................................................................... 309
Non-default VRF conguration for DHCPv6 helper address....................................................................................310
Conguring DHCP relay source interface....................................................................................................................310
Global DHCP relay source IPv4 or IPv6 conguration ........................................................................................310
Interface level DHCP relay source IPv4 or IPv6 conguration ........................................................................... 311
Congure the System for User Port Stacking (Option 230).................................................................................... 312
Congure Secure DHCP................................................................................................................................................312
Option 82...................................................................................................................................................................313
DHCPv6 relay agent options...................................................................................................................................313
DHCP Snooping........................................................................................................................................................314
Drop DHCP Packets on Snooped VLANs Only.....................................................................................................318
Dynamic ARP Inspection......................................................................................................................................... 319
Conguring Dynamic ARP Inspection....................................................................................................................319
Source Address Validation............................................................................................................................................. 321
Enabling IP Source Address Validation...................................................................................................................321
DHCP MAC Source Address Validation................................................................................................................ 322
Enabling IP+MAC Source Address Validation.......................................................................................................322
Viewing the Number of SAV Dropped Packets....................................................................................................323
Clearing the Number of SAV Dropped Packets................................................................................................... 323
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 324
ECMP for Flow-Based Anity..................................................................................................................................... 324
Conguring the Hash Algorithm............................................................................................................................ 324
Enabling Deterministic ECMP Next Hop...............................................................................................................324
Conguring the Hash Algorithm Seed.................................................................................................................. 325
Link Bundle Monitoring................................................................................................................................................. 325
Managing ECMP Group Paths...............................................................................................................................326
Creating an ECMP Group Bundle..........................................................................................................................326
Modifying the ECMP Group Threshold.................................................................................................................326
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table...................................... 327
Support for ECMP in host table............................................................................................................................ 328
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 328
14 FIP Snooping............................................................................................................................................329
Fibre Channel over Ethernet........................................................................................................................................ 329
Ensure Robustness in a Converged Ethernet Network............................................................................................329
FIP Snooping on Ethernet Bridges...............................................................................................................................331
Using FIP Snooping....................................................................................................................................................... 333
10
Contents
FIP Snooping Prerequisites.....................................................................................................................................333
Important Points to Remember..............................................................................................................................333
Enabling the FCoE Transit Feature........................................................................................................................334
Enable FIP Snooping on VLANs.............................................................................................................................334
Congure the FC-MAP Value................................................................................................................................ 335
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................335
Congure a Port for a Bridge-to-FCF Link...........................................................................................................335
Impact on Other Software Features..................................................................................................................... 335
FIP Snooping Restrictions...................................................................................................................................... 336
Conguring FIP Snooping.......................................................................................................................................336
Displaying FIP Snooping Information........................................................................................................................... 337
FCoE Transit Conguration Example...........................................................................................................................342
15 Flex Hash and Optimized Boot-Up............................................................................................................344
Flex Hash Capability Overview.....................................................................................................................................344
Conguring the Flex Hash Mechanism.......................................................................................................................344
Conguring Fast Boot and LACP Fast Switchover...................................................................................................345
Optimizing the Boot Time.............................................................................................................................................345
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................345
Guidelines for Conguring Optimized Booting Mechanism................................................................................346
Interoperation of Applications with Fast Boot and System States.......................................................................... 347
LACP and IPv4 Routing.......................................................................................................................................... 347
LACP and IPv6 Routing.......................................................................................................................................... 347
BGP Graceful Restart............................................................................................................................................. 348
Cold Boot Caused by Power Cycling the System................................................................................................348
Unexpected Reload of the System........................................................................................................................348
Software Upgrade................................................................................................................................................... 348
LACP Fast Switchover............................................................................................................................................348
Changes to BGP Multipath.................................................................................................................................... 349
Delayed Installation of ECMP Routes Into BGP...................................................................................................349
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 349
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces......................................................................................350
16 Force10 Resilient Ring Protocol (FRRP)....................................................................................................351
Protocol Overview..........................................................................................................................................................351
Ring Status............................................................................................................................................................... 352
Multiple FRRP Rings............................................................................................................................................... 352
Important FRRP Points...........................................................................................................................................353
Important FRRP Concepts.....................................................................................................................................354
Implementing FRRP...................................................................................................................................................... 355
FRRP Conguration...................................................................................................................................................... 355
Creating the FRRP Group...................................................................................................................................... 355
Conguring the Control VLAN...............................................................................................................................355
Conguring and Adding the Member VLANs.......................................................................................................357
Setting the FRRP Timers........................................................................................................................................358
Clearing the FRRP Counters..................................................................................................................................358
Contents
11
Viewing the FRRP Conguration...........................................................................................................................358
Viewing the FRRP Information.............................................................................................................................. 358
Troubleshooting FRRP.................................................................................................................................................. 359
Conguration Checks..............................................................................................................................................359
Sample Conguration and Topology............................................................................................................................359
FRRP Support on VLT.................................................................................................................................................. 360
Example Scenario..................................................................................................................................................... 361
Important Points to Remember............................................................................................................................. 362
17 GARP VLAN Registration Protocol (GVRP)..............................................................................................363
Important Points to Remember................................................................................................................................... 363
Congure GVRP............................................................................................................................................................ 364
Related Conguration Tasks...................................................................................................................................364
Enabling GVRP Globally................................................................................................................................................365
Enabling GVRP on a Layer 2 Interface........................................................................................................................365
Congure GVRP Registration...................................................................................................................................... 365
Congure a GARP Timer.............................................................................................................................................. 366
18 Internet Group Management Protocol (IGMP)..........................................................................................367
IGMP Implementation Information...............................................................................................................................367
IGMP Protocol Overview.............................................................................................................................................. 367
IGMP Version 2........................................................................................................................................................ 367
IGMP Version 3........................................................................................................................................................369
Congure IGMP............................................................................................................................................................. 372
Related Conguration Tasks................................................................................................................................... 372
Viewing IGMP Enabled Interfaces............................................................................................................................... 373
Selecting an IGMP Version........................................................................................................................................... 373
Viewing IGMP Groups................................................................................................................................................... 374
Adjusting Timers.............................................................................................................................................................374
Adjusting Query and Response Timers..................................................................................................................374
Enabling IGMP Immediate-Leave.................................................................................................................................375
IGMP Snooping.............................................................................................................................................................. 376
IGMP Snooping Implementation Information....................................................................................................... 376
Conguring IGMP Snooping...................................................................................................................................376
Removing a Group-Port Association..................................................................................................................... 377
Disabling Multicast Flooding................................................................................................................................... 377
Specifying a Port as Connected to a Multicast Router.......................................................................................377
Conguring the Switch as Querier.........................................................................................................................378
Fast Convergence after MSTP Topology Changes................................................................................................... 378
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................ 378
Protocol Separation................................................................................................................................................. 379
Enabling and Disabling Management Egress Interface Selection...................................................................... 380
Handling of Management Route Conguration....................................................................................................381
Handling of Switch-Initiated Trac........................................................................................................................381
Handling of Switch-Destined Trac......................................................................................................................382
Handling of Transit Trac (Trac Separation).................................................................................................... 383
12
Contents
Mapping of Management Applications and Trac Type.....................................................................................383
Behavior of Various Applications for Switch-Initiated Trac ............................................................................ 384
Behavior of Various Applications for Switch-Destined Trac .......................................................................... 385
Interworking of EIS With Various Applications.....................................................................................................385
Designating a Multicast Router Interface...................................................................................................................386
19 Interfaces................................................................................................................................................. 387
Basic Interface Conguration....................................................................................................................................... 387
Advanced Interface Conguration............................................................................................................................... 387
Interface Types...............................................................................................................................................................388
View Basic Interface Information.................................................................................................................................388
Resetting an Interface to its Factory Default State...................................................................................................390
Enabling a Physical Interface........................................................................................................................................ 391
Physical Interfaces......................................................................................................................................................... 391
Conguration Task List for Physical Interfaces.....................................................................................................391
40G to 1G Breakout Cable Adaptor........................................................................................................................391
Overview of Layer Modes...................................................................................................................................... 392
Conguring Layer 2 (Data Link) Mode..................................................................................................................393
Conguring Layer 2 (Interface) Mode.................................................................................................................. 393
Conguring Layer 3 (Network) Mode...................................................................................................................393
Conguring Layer 3 (Interface) Mode.................................................................................................................. 394
Automatic recovery of an Err-disabled interface.......................................................................................................395
Conguring an automatic recovery for an Err-disabled interface......................................................................395
Egress Interface Selection (EIS)..................................................................................................................................396
Important Points to Remember............................................................................................................................. 396
Conguring EIS........................................................................................................................................................ 396
Management Interfaces................................................................................................................................................397
Conguring Management Interfaces.....................................................................................................................397
Conguring a Management Interface on an Ethernet Port............................................................................... 398
VLAN Interfaces............................................................................................................................................................ 399
Loopback Interfaces......................................................................................................................................................400
Null Interfaces................................................................................................................................................................ 400
Port Channel Interfaces................................................................................................................................................400
Port Channel Denition and Standards................................................................................................................. 401
Port Channel Benets..............................................................................................................................................401
Port Channel Implementation................................................................................................................................. 401
Interfaces in Port Channels.................................................................................................................................... 402
Conguration Tasks for Port Channel Interfaces.................................................................................................402
Creating a Port Channel..........................................................................................................................................402
Adding a Physical Interface to a Port Channel.....................................................................................................403
Reassigning an Interface to a New Port Channel................................................................................................404
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 405
Adding or Removing a Port Channel from a VLAN............................................................................................. 405
Assigning an IP Address to a Port Channel.......................................................................................................... 406
Deleting or Disabling a Port Channel..................................................................................................................... 407
Load Balancing Through Port Channels................................................................................................................407
Contents
13
Changing the Hash Algorithm................................................................................................................................ 407
Bulk Conguration......................................................................................................................................................... 408
Interface Range....................................................................................................................................................... 408
Bulk Conguration Examples..................................................................................................................................409
Dening Interface Range Macros.................................................................................................................................410
Dene the Interface Range......................................................................................................................................411
Choosing an Interface-Range Macro......................................................................................................................411
Monitoring and Maintaining Interfaces.........................................................................................................................411
Maintenance Using TDR..........................................................................................................................................412
Non Dell-Qualied Transceivers....................................................................................................................................413
Splitting 40G Ports without Reload............................................................................................................................. 413
Splitting QSFP Ports to SFP+ Ports............................................................................................................................415
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port...................................................................................416
Important Points to Remember.............................................................................................................................. 416
Example Scenarios....................................................................................................................................................417
Conguring wavelength for 10–Gigabit SFP+ optics.................................................................................................418
Link Dampening.............................................................................................................................................................. 418
Important Points to Remember.............................................................................................................................. 419
Conguration Example of Link Dampening........................................................................................................... 419
Enabling Link Dampening.........................................................................................................................................421
Link Bundle Monitoring................................................................................................................................................. 422
Using Ethernet Pause Frames for Flow Control........................................................................................................ 423
Enabling Pause Frames........................................................................................................................................... 423
Congure the MTU Size on an Interface....................................................................................................................424
Port-Pipes.......................................................................................................................................................................425
Auto-Negotiation on Ethernet Interfaces...................................................................................................................425
Setting the Speed of Ethernet Interfaces............................................................................................................ 425
Set Auto-Negotiation Options................................................................................................................................426
View Advanced Interface Information......................................................................................................................... 427
Conguring the Interface Sampling Size.............................................................................................................. 428
Dynamic Counters......................................................................................................................................................... 429
Clearing Interface Counters....................................................................................................................................429
Compressing Conguration Files................................................................................................................................. 430
20 IPv4 Routing............................................................................................................................................433
IP Addresses...................................................................................................................................................................434
Implementation Information....................................................................................................................................434
Conguration Tasks for IP Addresses..........................................................................................................................434
Assigning IP Addresses to an Interface.......................................................................................................................434
Conguring Static Routes............................................................................................................................................ 435
Congure Static Routes for the Management Interface..........................................................................................436
Using the Congured Source IP Address in ICMP Messages.................................................................................. 437
Conguring the ICMP Source Interface................................................................................................................437
Conguring the Duration to Establish a TCP Connection.........................................................................................437
Enabling Directed Broadcast........................................................................................................................................ 438
Resolution of Host Names............................................................................................................................................438
14
Contents
Enabling Dynamic Resolution of Host Names............................................................................................................438
Specifying the Local System Domain and a List of Domains................................................................................... 439
Conguring DNS with Traceroute................................................................................................................................439
ARP................................................................................................................................................................................. 440
Conguration Tasks for ARP........................................................................................................................................ 440
Conguring Static ARP Entries....................................................................................................................................440
Enabling Proxy ARP........................................................................................................................................................441
Clearing ARP Cache.......................................................................................................................................................441
ARP Learning via Gratuitous ARP................................................................................................................................ 441
Enabling ARP Learning via Gratuitous ARP................................................................................................................442
ARP Learning via ARP Request................................................................................................................................... 442
Conguring ARP Retries...............................................................................................................................................443
ICMP............................................................................................................................................................................... 443
Conguration Tasks for ICMP...................................................................................................................................... 443
Enabling ICMP Unreachable Messages...................................................................................................................... 443
ICMP Redirects..............................................................................................................................................................444
UDP Helper.....................................................................................................................................................................445
Congure UDP Helper.............................................................................................................................................445
Important Points to Remember............................................................................................................................. 445
Enabling UDP Helper.....................................................................................................................................................445
Congurations Using UDP Helper............................................................................................................................... 445
UDP Helper with Broadcast-All Addresses.................................................................................................................446
UDP Helper with Subnet Broadcast Addresses.........................................................................................................446
UDP Helper with Congured Broadcast Addresses.................................................................................................. 447
UDP Helper with No Congured Broadcast Addresses............................................................................................447
Troubleshooting UDP Helper........................................................................................................................................ 448
21 IPv6 Routing............................................................................................................................................ 449
Protocol Overview.........................................................................................................................................................449
Extended Address Space........................................................................................................................................450
Stateless Autoconguration................................................................................................................................... 450
IPv6 Headers............................................................................................................................................................450
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support.................................................................... 451
IPv6 Header Fields...................................................................................................................................................452
Extension Header Fields..........................................................................................................................................454
Addressing................................................................................................................................................................455
Implementing IPv6 with Dell EMC Networking OS...................................................................................................456
ICMPv6........................................................................................................................................................................... 457
Path MTU discovery..................................................................................................................................................... 458
IPv6 Neighbor Discovery..............................................................................................................................................458
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................459
Conguring the IPv6 Recursive DNS Server....................................................................................................... 459
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................460
Displaying IPv6 RDNSS Information......................................................................................................................460
Secure Shell (SSH) Over an IPv6 Transport...............................................................................................................461
Conguration Tasks for IPv6.........................................................................................................................................461
Contents
15
Adjusting Your CAM-Prole.....................................................................................................................................461
Assigning an IPv6 Address to an Interface...........................................................................................................462
Assigning a Static IPv6 Route................................................................................................................................463
Conguring Telnet with IPv6..................................................................................................................................463
SNMP over IPv6......................................................................................................................................................464
Displaying IPv6 Information....................................................................................................................................464
Displaying an IPv6 Interface Information.............................................................................................................. 464
Showing IPv6 Routes..............................................................................................................................................465
Showing the Running-Conguration for an Interface.........................................................................................466
Clearing IPv6 Routes............................................................................................................................................... 467
Disabling ND Entry Timeout................................................................................................................................... 467
Conguring IPv6 RA Guard.......................................................................................................................................... 467
Conguring IPv6 RA Guard on an Interface.........................................................................................................469
Monitoring IPv6 RA Guard......................................................................................................................................470
22 iSCSI Optimization................................................................................................................................... 471
iSCSI Optimization Overview........................................................................................................................................471
Monitoring iSCSI Trac Flows............................................................................................................................... 473
Application of Quality of Service to iSCSI Trac Flows......................................................................................473
Information Monitored in iSCSI Trac Flows....................................................................................................... 473
Detection and Auto-Conguration for Dell EqualLogic Arrays............................................................................474
Conguring Detection and Ports for Dell Compellent Arrays............................................................................. 474
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................475
Enable and Disable iSCSI Optimization................................................................................................................. 475
Default iSCSI Optimization Values............................................................................................................................... 476
iSCSI Optimization Prerequisites..................................................................................................................................476
Conguring iSCSI Optimization....................................................................................................................................476
Displaying iSCSI Optimization Information..................................................................................................................478
23 Intermediate System to Intermediate System.......................................................................................... 480
IS-IS Protocol Overview............................................................................................................................................... 480
IS-IS Addressing.............................................................................................................................................................480
Multi-Topology IS-IS....................................................................................................................................................... 481
Transition Mode........................................................................................................................................................ 481
Interface Support.....................................................................................................................................................482
Adjacencies...............................................................................................................................................................482
Graceful Restart.............................................................................................................................................................482
Timers........................................................................................................................................................................482
Implementation Information..........................................................................................................................................482
Conguration Information.............................................................................................................................................483
Conguration Tasks for IS-IS..................................................................................................................................484
Conguring the Distance of a Route......................................................................................................................491
Changing the IS-Type.............................................................................................................................................. 492
Redistributing IPv4 Routes.....................................................................................................................................494
Redistributing IPv6 Routes.....................................................................................................................................495
Conguring Authentication Passwords.................................................................................................................496
16
Contents
Setting the Overload Bit......................................................................................................................................... 496
Debugging IS-IS....................................................................................................................................................... 497
IS-IS Metric Styles.........................................................................................................................................................498
Congure Metric Values............................................................................................................................................... 498
Maximum Values in the Routing Table.................................................................................................................. 498
Change the IS-IS Metric Style in One Level Only................................................................................................498
Leaks from One Level to Another..........................................................................................................................500
Sample Congurations...................................................................................................................................................501
24 Link Aggregation Control Protocol (LACP).............................................................................................. 503
Introduction to Dynamic LAGs and LACP.................................................................................................................. 503
Important Points to Remember............................................................................................................................. 503
LACP Modes............................................................................................................................................................504
Conguring LACP Commands...............................................................................................................................504
LACP Conguration Tasks............................................................................................................................................505
Creating a LAG........................................................................................................................................................ 505
Conguring the LAG Interfaces as Dynamic........................................................................................................505
Setting the LACP Long Timeout........................................................................................................................... 506
Monitoring and Debugging LACP..........................................................................................................................506
Shared LAG State Tracking.......................................................................................................................................... 507
Conguring Shared LAG State Tracking............................................................................................................... 507
Important Points about Shared LAG State Tracking...........................................................................................509
LACP Basic Conguration Example............................................................................................................................ 509
Congure a LAG on ALPHA...................................................................................................................................509
25 Layer 2..................................................................................................................................................... 518
Manage the MAC Address Table.................................................................................................................................. 518
Clearing the MAC Address Table............................................................................................................................518
Setting the Aging Time for Dynamic Entries.........................................................................................................518
Conguring a Static MAC Address.........................................................................................................................519
Displaying the MAC Address Table.........................................................................................................................519
MAC Learning Limit........................................................................................................................................................519
Setting the MAC Learning Limit............................................................................................................................ 520
mac learning-limit Dynamic.................................................................................................................................... 520
mac learning-limit mac-address-sticky................................................................................................................. 520
mac learning-limit station-move............................................................................................................................. 521
mac learning-limit no-station-move....................................................................................................................... 521
Learning Limit Violation Actions..............................................................................................................................521
Setting Station Move Violation Actions................................................................................................................ 522
Recovering from Learning Limit and Station Move Violations........................................................................... 522
Disabling MAC Address Learning on the System.................................................................................................523
Enabling port security............................................................................................................................................. 523
NIC Teaming................................................................................................................................................................... 523
Congure Redundant Pairs...........................................................................................................................................524
Important Points about Conguring Redundant Pairs........................................................................................ 526
Far-End Failure Detection............................................................................................................................................. 527
Contents
17
FEFD State Changes...............................................................................................................................................528
Conguring FEFD.................................................................................................................................................... 529
Enabling FEFD on an Interface.............................................................................................................................. 530
Debugging FEFD.......................................................................................................................................................531
26 Link Layer Discovery Protocol (LLDP)..................................................................................................... 532
802.1AB (LLDP) Overview............................................................................................................................................532
Protocol Data Units................................................................................................................................................. 532
Optional TLVs.................................................................................................................................................................533
Management TLVs.................................................................................................................................................. 533
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 535
TIA Organizationally Specic TLVs........................................................................................................................ 535
Congure LLDP............................................................................................................................................................. 539
Related Conguration Tasks...................................................................................................................................539
Important Points to Remember............................................................................................................................. 539
LLDP Compatibility..................................................................................................................................................540
CONFIGURATION versus INTERFACE Congurations............................................................................................ 540
Enabling LLDP................................................................................................................................................................540
Disabling and Undoing LLDP...................................................................................................................................541
Enabling LLDP on Management Ports.........................................................................................................................541
Disabling and Undoing LLDP on Management Ports...........................................................................................541
Advertising TLVs.............................................................................................................................................................541
Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................543
Reserved Unrecognized LLDP TLVs..................................................................................................................... 543
Organizational Specic Unrecognized LLDP TLVs..............................................................................................543
Viewing Unrecognized LLDP TLVs........................................................................................................................ 543
Viewing the LLDP Conguration................................................................................................................................. 544
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................544
Examples of Viewing Information Advertised by Neighbors...............................................................................544
Conguring LLDPDU Intervals.....................................................................................................................................546
Conguring LLDP Notication Interval....................................................................................................................... 547
Conguring Transmit and Receive Mode....................................................................................................................547
Conguring the Time to Live Value............................................................................................................................. 548
Debugging LLDP............................................................................................................................................................548
Relevant Management Objects................................................................................................................................... 550
27 Microsoft Network Load Balancing.......................................................................................................... 555
NLB Unicast Mode Scenario........................................................................................................................................555
NLB Multicast Mode Scenario.....................................................................................................................................555
Limitations of the NLB Feature....................................................................................................................................556
Microsoft Clustering......................................................................................................................................................556
Enable and Disable VLAN Flooding ............................................................................................................................ 556
Conguring a Switch for NLB .....................................................................................................................................556
Enabling a Switch for Multicast NLB.................................................................................................................... 557
28 Multicast Source Discovery Protocol (MSDP)......................................................................................... 558
18
Contents
Protocol Overview.........................................................................................................................................................558
Anycast RP.....................................................................................................................................................................559
Implementation Information......................................................................................................................................... 560
Congure Multicast Source Discovery Protocol........................................................................................................560
Related Conguration Tasks...................................................................................................................................560
Enable MSDP................................................................................................................................................................. 564
Manage the Source-Active Cache..............................................................................................................................565
Viewing the Source-Active Cache........................................................................................................................ 565
Limiting the Source-Active Cache.........................................................................................................................565
Clearing the Source-Active Cache........................................................................................................................566
Enabling the Rejected Source-Active Cache....................................................................................................... 566
Accept Source-Active Messages that Fail the RFP Check..................................................................................... 566
Specifying Source-Active Messages...........................................................................................................................569
Limiting the Source-Active Messages from a Peer...................................................................................................570
Preventing MSDP from Caching a Local Source.......................................................................................................570
Preventing MSDP from Caching a Remote Source................................................................................................... 571
Preventing MSDP from Advertising a Local Source.................................................................................................. 571
Logging Changes in Peership States...........................................................................................................................572
Terminating a Peership..................................................................................................................................................572
Clearing Peer Statistics.................................................................................................................................................573
Debugging MSDP.......................................................................................................................................................... 573
MSDP with Anycast RP................................................................................................................................................ 574
Conguring Anycast RP................................................................................................................................................575
Reducing Source-Active Message Flooding.........................................................................................................576
Specifying the RP Address Used in SA Messages.............................................................................................. 576
MSDP Sample Congurations......................................................................................................................................578
33 Multicast Listener Discovery Protocol...................................................................................................... 581
MLD Version 1................................................................................................................................................................. 581
MLD Querier Router.......................................................................................................................................................581
Joining a Multicast Group.............................................................................................................................................582
Leaving a Multicast Group............................................................................................................................................582
MLD version 2................................................................................................................................................................582
MLD timers.....................................................................................................................................................................584
Reducing Host Response Burstiness.................................................................................................................... 585
Conguring MLD Version............................................................................................................................................. 585
Clearing MLD groups.................................................................................................................................................... 585
Debugging MLD.............................................................................................................................................................585
Explicit Tracking.............................................................................................................................................................585
Reducing Leave Latency...............................................................................................................................................586
Displaying MLD groups table........................................................................................................................................586
Displaying MLD Interfaces............................................................................................................................................586
30 Multiple Spanning Tree Protocol (MSTP).................................................................................................587
Protocol Overview......................................................................................................................................................... 587
Spanning Tree Variations.............................................................................................................................................. 588
Contents
19
Implementation Information................................................................................................................................... 588
Congure Multiple Spanning Tree Protocol................................................................................................................588
Related Conguration Tasks...................................................................................................................................589
Enable Multiple Spanning Tree Globally...................................................................................................................... 589
Adding and Removing Interfaces.................................................................................................................................589
Creating Multiple Spanning Tree Instances................................................................................................................ 590
Inuencing MSTP Root Selection................................................................................................................................ 591
Interoperate with Non-Dell Bridges.............................................................................................................................592
Changing the Region Name or Revision..................................................................................................................... 592
Modifying Global Parameters....................................................................................................................................... 592
Modifying the Interface Parameters........................................................................................................................... 594
Setting STP path cost as constant.............................................................................................................................595
Conguring an EdgePort.............................................................................................................................................. 595
Flush MAC Addresses after a Topology Change....................................................................................................... 596
MSTP Sample Congurations......................................................................................................................................596
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................596
Debugging and Verifying MSTP Congurations........................................................................................................ 600
31 Multicast Features....................................................................................................................................603
Enabling IP Multicast.....................................................................................................................................................603
Implementation Information..........................................................................................................................................603
Multicast Policies...........................................................................................................................................................604
IPv4 Multicast Policies............................................................................................................................................604
Understanding Multicast Traceroute (mtrace)............................................................................................................ 611
Important Points to Remember.............................................................................................................................. 612
Printing Multicast Traceroute (mtrace) Paths............................................................................................................ 612
Supported Error Codes..................................................................................................................................................613
mtrace Scenarios............................................................................................................................................................614
33 Multicast Listener Discovery Protocol..................................................................................................... 620
MLD Version 1................................................................................................................................................................ 620
MLD Querier Router......................................................................................................................................................620
Joining a Multicast Group..............................................................................................................................................621
Leaving a Multicast Group.............................................................................................................................................621
MLD version 2.................................................................................................................................................................621
MLD timers.....................................................................................................................................................................623
Reducing Host Response Burstiness.................................................................................................................... 624
Clearing MLD groups.....................................................................................................................................................624
Debugging MLD............................................................................................................................................................. 624
Explicit Tracking............................................................................................................................................................. 624
Reducing Leave Latency...............................................................................................................................................624
Displaying MLD groups table........................................................................................................................................625
Displaying MLD Interfaces............................................................................................................................................625
MLD Snooping............................................................................................................................................................... 625
Enable MLD Snooping.............................................................................................................................................625
20
Contents
/