Dell PowerSwitch S5000 User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S5000 User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell 9.11(2.0P1) Conguration Guide for the
S5000 Switch
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 05
Rev. A00
Contents
1 About this Guide...........................................................................................................................................36
Audience........................................................................................................................................................................... 36
Conventions......................................................................................................................................................................36
Related Documents......................................................................................................................................................... 36
2 Conguration Fundamentals........................................................................................................................ 37
Accessing the Command Line........................................................................................................................................ 37
CLI Modes.........................................................................................................................................................................37
Navigating CLI Modes...............................................................................................................................................39
Port Numbering Convention...........................................................................................................................................40
The do Command............................................................................................................................................................. 41
The no Command............................................................................................................................................................ 42
Obtaining Help..................................................................................................................................................................42
Entering and Editing Commands....................................................................................................................................43
Command History............................................................................................................................................................ 44
Filtering show Command Outputs.................................................................................................................................44
Multiple Users in Conguration Mode...........................................................................................................................45
3 Getting Started............................................................................................................................................46
Accessing Ports............................................................................................................................................................... 46
Accessing the RJ-45/RS-232 Console Port................................................................................................................ 46
Pin Assignments...............................................................................................................................................................47
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................47
Entering CLI commands Using an SSH Connection..............................................................................................47
Executing Local CLI Scripts Using an SSH Connection........................................................................................ 47
Default Conguration...................................................................................................................................................... 48
Accessing the USB-B Console Port.............................................................................................................................. 48
Booting Process............................................................................................................................................................... 48
Enter the Initial Conguration Information....................................................................................................................50
Conguring the Enable Password...................................................................................................................................51
Conguring a Host Name................................................................................................................................................ 51
Navigating CLI Modes......................................................................................................................................................51
Default Conguration...................................................................................................................................................... 52
Conguring Layer 2 (Data Link) Mode..........................................................................................................................52
Accessing the System Remotely....................................................................................................................................52
Congure the Management Port IP Address............................................................................................................... 52
Congure a Management Route....................................................................................................................................53
Conguring a Username and Password........................................................................................................................53
Creating a Port-based VLAN..........................................................................................................................................53
Assigning Interfaces to a VLAN..................................................................................................................................... 53
Assigning an IP Address to a VLAN...............................................................................................................................54
Connect the S5000 to the Network.............................................................................................................................54
Contents
3
Congure File Management........................................................................................................................................... 54
Copying Files to and from the System..........................................................................................................................54
Important Points to Remember............................................................................................................................... 55
Mounting an NFS File System........................................................................................................................................55
Important Points to Remember................................................................................................................................56
Saving the Running-Conguration.................................................................................................................................57
Viewing Files..................................................................................................................................................................... 57
View Conguration Files................................................................................................................................................. 58
Compressing Conguration Files................................................................................................................................... 59
Managing the File System.............................................................................................................................................. 62
Enabling Software Features on Devices Using a Command Option..........................................................................62
View Command History.................................................................................................................................................. 63
Upgrading and Downgrading Dell Networking OS.......................................................................................................63
Verify Software Images Before Installation...................................................................................................................63
Using HTTP for File Transfers........................................................................................................................................ 64
4 Switch Management....................................................................................................................................66
Conguring Privilege Levels........................................................................................................................................... 66
Creating a Custom Privilege Level...........................................................................................................................66
Removing a Command from EXEC Mode.................................................................................................................... 66
Moving a Command from EXEC Privilege Mode to EXEC Mode..............................................................................66
Allowing Access to CONFIGURATION Mode Commands.......................................................................................... 67
Allowing Access to the Following Modes......................................................................................................................67
Applying a Privilege Level to a Username..................................................................................................................... 68
Applying a Privilege Level to a Terminal Line................................................................................................................ 69
Conguring Logging........................................................................................................................................................ 69
Log Messages in the Internal Buer..............................................................................................................................69
Conguration Task List for System Log Management.......................................................................................... 69
Disabling System Logging......................................................................................................................................... 70
Sending System Messages to a Syslog Server...................................................................................................... 70
Conguring a UNIX System as a Syslog Server...........................................................................................................70
Track Login Activity..........................................................................................................................................................70
Restrictions for Tracking Login Activity................................................................................................................... 71
Conguring Login Activity Tracking..........................................................................................................................71
Display Login Statistics...............................................................................................................................................71
Limit Concurrent Login Sessions....................................................................................................................................73
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................73
Conguring Concurrent Session Limit.....................................................................................................................73
Enabling the System to Clear Existing Sessions.................................................................................................... 73
Enabling Secured CLI Mode............................................................................................................................................74
Changing System Logging Settings...............................................................................................................................74
Display the Logging Buer and the Logging Conguration........................................................................................ 75
Conguring a UNIX Logging Facility Level....................................................................................................................76
Synchronizing Log Messages......................................................................................................................................... 77
Enabling Timestamp on Syslog Messages.................................................................................................................... 77
File Transfer Services.......................................................................................................................................................78
4
Contents
Conguration Task List for File Transfer Services..................................................................................................78
Enabling the FTP Server........................................................................................................................................... 78
Conguring FTP Server Parameters........................................................................................................................78
Conguring FTP Client Parameters......................................................................................................................... 79
Terminal Lines................................................................................................................................................................... 79
Denying and Permitting Access to a Terminal Line................................................................................................79
Conguring Login Authentication for Terminal Lines...................................................................................................80
Setting Time Out of EXEC Privilege Mode................................................................................................................... 81
Using Telnet to get to Another Network Device...........................................................................................................81
Lock CONFIGURATION Mode....................................................................................................................................... 82
Viewing the Conguration Lock Status...................................................................................................................82
View the Conguration Lock Status..............................................................................................................................83
Recovering from a Forgotten Password....................................................................................................................... 83
Recovering from a Forgotten Enable Password...........................................................................................................83
Recovering from a Failed Start.......................................................................................................................................84
5 802.1X......................................................................................................................................................... 85
The Port-Authentication Process...................................................................................................................................87
EAP over RADIUS............................................................................................................................................................ 87
RADIUS Attributes for 802.1 Support......................................................................................................................88
Conguring 802.1X...........................................................................................................................................................88
Related Conguration Tasks..................................................................................................................................... 88
Important Points to Remember................................................................................................................................88
Enabling 802.1X................................................................................................................................................................ 89
Conguring MAC addresses for a do1x Prole.............................................................................................................90
Conguring Request Identity Re-Transmissions............................................................................................................91
Conguring a Quiet Period after a Failed Authentication............................................................................................ 91
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 92
Re-Authenticating a Port................................................................................................................................................93
Conguring Timeouts......................................................................................................................................................94
Conguring Dynamic VLAN Assignment with Port Authentication.......................................................................... 95
Guest and Authentication-Fail VLANs.......................................................................................................................... 96
Conguring a Guest VLAN....................................................................................................................................... 96
Conguring an Authentication-Fail VLAN...............................................................................................................96
Conguring dot1x Prole ................................................................................................................................................ 97
Conguring the Static MAB and MAB Prole .............................................................................................................98
Conguring Critical VLAN ..............................................................................................................................................99
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 100
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 100
Guidelines for Conguring ACL VLAN Groups............................................................................................................ 101
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters............................................... 101
Conguring ACL VLAN Groups............................................................................................................................... 101
Conguring FP Blocks for VLAN Parameters.......................................................................................................102
Viewing CAM Usage...................................................................................................................................................... 103
Allocating FP Blocks for VLAN Processes.................................................................................................................. 104
Contents
5
7 Access Control Lists (ACLs)....................................................................................................................... 106
IP Access Control Lists (ACLs).....................................................................................................................................106
CAM Allocation and CAM Optimization.......................................................................................................................107
User Congurable CAM Allocation.........................................................................................................................107
CAM Optimization....................................................................................................................................................108
Test CAM Usage.......................................................................................................................................................108
View CAM-ACL Settings.........................................................................................................................................108
View CAM Usage...................................................................................................................................................... 110
QoS CAM Region Limitation....................................................................................................................................110
Implementing ACLs on Dell Networking OS................................................................................................................. 111
ACLs and VLANs........................................................................................................................................................111
ACL Optimization....................................................................................................................................................... 111
Determine the Order in which ACLs are Used to Classify Trac........................................................................ 111
IP Fragment Handling..................................................................................................................................................... 112
IP Fragments ACL Examples....................................................................................................................................112
Layer 4 ACL Rules Examples................................................................................................................................... 113
Congure a Standard IP ACL.........................................................................................................................................114
Conguring a Standard IP ACL Filter......................................................................................................................115
Congure an Extended IP ACL......................................................................................................................................115
Conguring Filters with a Sequence Number........................................................................................................116
Conguring Filters Without a Sequence Number................................................................................................. 116
Established Flag...............................................................................................................................................................117
Congure Layer 2 and Layer 3 ACLs.............................................................................................................................117
Assign an IP ACL to an Interface...................................................................................................................................118
Applying an IP ACL....................................................................................................................................................118
Counting ACL Hits.................................................................................................................................................... 119
Congure Ingress ACLs.................................................................................................................................................. 119
Congure Egress ACLs...................................................................................................................................................119
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 120
Congure ACLs to Loopback......................................................................................................................................... 121
Applying an ACL on Loopback Interfaces.....................................................................................................................121
IP Prex Lists.................................................................................................................................................................. 122
Implementation Information.................................................................................................................................... 122
Conguration Task List for Prex Lists.................................................................................................................. 122
Creating a Prex List......................................................................................................................................................123
Creating a Prex List Without a Sequence Number............................................................................................123
Viewing Prex Lists.................................................................................................................................................. 124
Applying a Prex List for Route Redistribution.....................................................................................................125
Applying a Filter to a Prex List (OSPF)................................................................................................................125
ACL Resequencing......................................................................................................................................................... 126
Resequencing an ACL or Prex List.......................................................................................................................126
Route Maps.....................................................................................................................................................................128
Implementation Information.................................................................................................................................... 128
Important Points to Remember.............................................................................................................................. 128
Conguration Task List for Route Maps................................................................................................................ 128
6
Contents
Creating a Route Map..............................................................................................................................................128
Congure Route Map Filters...................................................................................................................................130
Conguring Match Routes...................................................................................................................................... 130
Conguring Set Conditions..................................................................................................................................... 132
Congure a Route Map for Route Redistribution.................................................................................................133
Congure a Route Map for Route Tagging............................................................................................................133
Continue Clause........................................................................................................................................................134
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 135
How BFD Works............................................................................................................................................................. 135
BFD Packet Format........................................................................................................................................................136
BFD Sessions...................................................................................................................................................................137
BFD Three-Way Handshake.......................................................................................................................................... 138
Session State Changes..................................................................................................................................................140
Important Points to Remember.............................................................................................................................. 140
Congure BFD................................................................................................................................................................ 140
Congure BFD for Physical Ports........................................................................................................................... 141
Congure BFD for Static Routes............................................................................................................................142
Congure BFD for OSPF.........................................................................................................................................145
Congure BFD for IS-IS...........................................................................................................................................148
Congure BFD for BGP............................................................................................................................................151
Conguring Protocol Liveness................................................................................................................................ 157
Troubleshooting BFD......................................................................................................................................................157
9 Border Gateway Protocol IPv4 (BGPv4).................................................................................................... 159
Autonomous Systems (AS)...........................................................................................................................................160
Sessions and Peers........................................................................................................................................................ 162
Establish a Session................................................................................................................................................... 162
Route Reectors.............................................................................................................................................................163
Communities................................................................................................................................................................... 164
BGP Attributes................................................................................................................................................................164
Best Path Selection Criteria....................................................................................................................................164
Weight..............................................................................................................................................................................166
Local Preference.............................................................................................................................................................166
Multi-Exit Discriminators (MEDs)...........................................................................................................................167
Origin................................................................................................................................................................................168
AS Path............................................................................................................................................................................168
Next Hop......................................................................................................................................................................... 169
Multiprotocol BGP..........................................................................................................................................................169
Implement BGP with Dell Networking OS...................................................................................................................169
Additional Path (Add-Path) Support......................................................................................................................169
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 170
Ignore Router-ID for Some Best-Path Calculations............................................................................................. 170
Four-Byte AS Numbers............................................................................................................................................170
AS4 Number Representation................................................................................................................................... 171
AS Number Migration.....................................................................................................................................................172
Contents
7
BGP4 Management Information Base (MIB)..............................................................................................................173
Important Points to Remember...............................................................................................................................174
Conguration Information..............................................................................................................................................174
BGP Conguration................................................................................................................................................... 175
Enabling BGP.................................................................................................................................................................. 176
Conguring AS4 Number Representations................................................................................................................. 179
Conguring Peer Groups...............................................................................................................................................180
Conguring BGP Fast Fall-Over...................................................................................................................................183
Conguring Passive Peering......................................................................................................................................... 184
Maintaining Existing AS Numbers During an AS Migration.......................................................................................185
Allowing an AS Number to Appear in its Own AS Path.............................................................................................186
Enabling Graceful Restart..............................................................................................................................................186
Enabling Neighbor Graceful Restart.............................................................................................................................187
Filtering on an AS-Path Attribute................................................................................................................................. 188
Regular Expressions as Filters.................................................................................................................................189
Filtering BGP Routes Using AS-PATH Information.................................................................................................... 190
Redistributing Routes..................................................................................................................................................... 191
Enabling Additional Paths.............................................................................................................................................. 192
Conguring IP Community Lists................................................................................................................................... 192
Filtering Routes with Community Lists........................................................................................................................193
Manipulating the COMMUNITY Attribute...................................................................................................................194
Changing MED Attributes............................................................................................................................................. 195
Changing the LOCAL_PREFERENCE Attribute........................................................................................................ 195
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes................... 196
Changing the WEIGHT Attribute..................................................................................................................................197
Enabling Multipath..........................................................................................................................................................197
Filtering BGP Routes Using Route Maps.....................................................................................................................197
Filtering BGP Routes Using AS-PATH Information.................................................................................................... 198
Filtering BGP Routes......................................................................................................................................................199
Filtering BGP Routes Using Route Maps..............................................................................................................200
Filtering BGP Routes Using AS-PATH Information.............................................................................................. 201
Conguring BGP Route Reectors.............................................................................................................................. 201
Aggregating Routes.......................................................................................................................................................202
Conguring BGP Confederations................................................................................................................................ 202
Enabling Route Flap Dampening.................................................................................................................................. 203
Changing BGP Timers...................................................................................................................................................205
Enabling BGP Neighbor Soft-Reconguration...........................................................................................................206
Enabling or disabling BGP neighbors...........................................................................................................................207
Route Map Continue..................................................................................................................................................... 208
Match a Clause with a Continue Clause...............................................................................................................208
Set a Clause with a Continue Clause.................................................................................................................... 208
Enabling MBGP Congurations................................................................................................................................... 208
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor......................................... 209
BGP Regular Expression Optimization........................................................................................................................209
Debugging BGP.............................................................................................................................................................. 210
8
Contents
Storing Last and Bad PDUs.....................................................................................................................................210
Capturing PDUs.........................................................................................................................................................211
PDU Counters...........................................................................................................................................................212
Sample Congurations...................................................................................................................................................212
10 Bare Metal Provisioning (BMP).................................................................................................................221
Prerequisites....................................................................................................................................................................221
Restrictions..................................................................................................................................................................... 221
Reconguring Jumpstart and Normal Modes............................................................................................................ 222
Jumpstart Mode............................................................................................................................................................ 223
DHCP Server/Conguration...................................................................................................................................223
MAC-Based IP Assignment.................................................................................................................................... 224
DHCP Retry Mechanism.........................................................................................................................................225
File Server.......................................................................................................................................................................225
Domain Name Server.................................................................................................................................................... 226
Switch Boot and Set-up Behavior in Jumpstart Mode.............................................................................................226
11 Content Addressable Memory (CAM)....................................................................................................... 228
CAM Allocation...............................................................................................................................................................228
Re-Allocating CAM for Ingress ACLs and QoS.......................................................................................................... 229
Re-Allocating CAM for Egress ACLs...........................................................................................................................230
Testing CAM Usage for QoS Policies...........................................................................................................................231
Displaying CAM-ACL Settings...................................................................................................................................... 231
Displaying CAM-ACL-Egress Settings.........................................................................................................................232
CAM Optimization......................................................................................................................................................... 232
Troubleshoot CAM Proling....................................................................................................................................232
12 Control Plane Policing (CoPP)..................................................................................................................233
Congure Control Plane Policing................................................................................................................................. 234
Conguring CoPP for Protocols.................................................................................................................................. 235
Conguring CoPP for CPU Queues.............................................................................................................................237
Show Commands...........................................................................................................................................................237
13 Data Center Bridging (DCB)..................................................................................................................... 239
Ethernet Enhancements in Data Center Bridging..................................................................................................... 239
Priority-Based Flow Control................................................................................................................................... 240
Enhanced Transmission Selection...........................................................................................................................241
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................242
Data Center Bridging in a Trac Flow...................................................................................................................243
Enabling Data Center Bridging..................................................................................................................................... 243
DCB Maps and its Attributes..................................................................................................................................244
Data Center Bridging: Default Conguration..............................................................................................................245
Conguring Priority-Based Flow Control....................................................................................................................245
Conguring Lossless Queues................................................................................................................................. 246
Conguring PFC in a DCB Map....................................................................................................................................247
PFC Conguration Notes........................................................................................................................................247
Contents
9
PFC Prerequisites and Restrictions....................................................................................................................... 248
Applying a DCB Map on a Port.................................................................................................................................... 248
Conguring PFC without a DCB Map.........................................................................................................................249
Conguring Lossless QueuesExample:..................................................................................................................249
Priority-Based Flow Control Using Dynamic Buer Method.................................................................................... 251
Pause and Resume of Trac...................................................................................................................................251
Buer Sizes for Lossless or PFC Packets............................................................................................................. 251
Behavior of Tagged Packets.........................................................................................................................................252
Conguration Example for DSCP and PFC Priorities................................................................................................252
Using PFC to Manage Converged Ethernet Trac...................................................................................................253
Congure Enhanced Transmission Selection..............................................................................................................253
ETS Prerequisites and Restrictions....................................................................................................................... 253
Creating an ETS Priority Group..............................................................................................................................253
ETS Operation with DCBx......................................................................................................................................255
Conguring Bandwidth Allocation for DCBx CIN................................................................................................ 255
Conguring ETS in a DCB Map..............................................................................................................................256
Hierarchical Scheduling in ETS Output Policies......................................................................................................... 257
Using ETS to Manage Converged Ethernet Trac...................................................................................................258
Applying DCB Policies in a Switch Stack.................................................................................................................... 258
Congure a DCBx Operation........................................................................................................................................258
DCBx Operation.......................................................................................................................................................258
DCBx Port Roles......................................................................................................................................................259
DCB Conguration Exchange................................................................................................................................ 260
Conguration Source Election............................................................................................................................... 260
Propagation of DCB Information............................................................................................................................ 261
Auto-Detection and Manual Conguration of the DCBx Version.......................................................................261
DCBx Example..........................................................................................................................................................262
DCBx Prerequisites and Restrictions.....................................................................................................................262
Conguring DCBx....................................................................................................................................................262
Verifying the DCB Conguration................................................................................................................................. 266
Sample DCB Conguration........................................................................................................................................... 274
PFC and ETS Conguration Command Examples...............................................................................................276
QoS dot1p Trac Classication and Queue Assignment.......................................................................................... 276
Conguring the Dynamic Buer Method....................................................................................................................277
14 Dynamic Host Conguration Protocol (DHCP)......................................................................................... 279
DHCP Packet Format and Options..............................................................................................................................279
Assign an IP Address using DHCP................................................................................................................................281
Implementation Information..........................................................................................................................................282
Conguration Tasks....................................................................................................................................................... 282
Congure the System to be a DHCP Server..............................................................................................................282
Conguration Tasks................................................................................................................................................. 283
Conguring the Server for Automatic Address Allocation..................................................................................283
Specifying a Default Gateway................................................................................................................................ 284
Enabling the DHCP Server..................................................................................................................................... 284
Congure a Method of Hostname Resolution..................................................................................................... 285
10
Contents
Creating Manual Binding Entries............................................................................................................................286
Debugging the DHCP Server.................................................................................................................................286
Using DHCP Clear Commands.............................................................................................................................. 286
Congure the System to be a Relay Agent.................................................................................................................287
Congure the System for User Port Stacking........................................................................................................... 289
Congure Secure DHCP...............................................................................................................................................289
Option 82..................................................................................................................................................................289
DHCP Snooping.......................................................................................................................................................290
Drop DHCP Packets on Snooped VLANs Only.................................................................................................... 291
Dynamic ARP Inspection.........................................................................................................................................292
Source Address Validation...................................................................................................................................... 294
Viewing the Number of SAV Dropped Packets......................................................................................................... 295
Clearing the Number of SAV Dropped Packets.........................................................................................................296
15 Equal Cost Multi-Path (ECMP)................................................................................................................ 297
ECMP for Flow-Based Anity..................................................................................................................................... 297
Conguring the Hash Algorithm...................................................................................................................................297
Enabling Deterministic ECMP Next Hop.....................................................................................................................297
Conguring the Hash Algorithm Seed........................................................................................................................ 298
Link Bundle Monitoring................................................................................................................................................. 298
Managing ECMP Group Paths.....................................................................................................................................299
Creating an ECMP Group Bundle................................................................................................................................299
Modifying the ECMP Group Threshold...................................................................................................................... 299
16 Fabric Services......................................................................................................................................... 301
Conguring Switch Mode to Fabric Services............................................................................................................ 302
Name Server.................................................................................................................................................................. 302
Link State Database.......................................................................................................................................................303
Inter Switch Link (ISL)............................................................................................................................................ 303
Principal Switch Selection and Domain ID Assignment.......................................................................................304
Route Table...............................................................................................................................................................304
Zoning............................................................................................................................................................................. 304
Creating Zone and Adding Members.................................................................................................................... 304
Creating Zone Alias and Adding Members........................................................................................................... 305
Creating Zonesets................................................................................................................................................... 305
Activating a Zoneset............................................................................................................................................... 305
Zone Merge (within ISL).........................................................................................................................................306
Conguring Fabric Parameters.............................................................................................................................. 306
Displaying the Fabric Parameters...........................................................................................................................307
17 FCoE Transit............................................................................................................................................. 312
Fibre Channel over Ethernet.........................................................................................................................................312
Ensure Robustness in a Converged Ethernet Network.............................................................................................312
FIP Snooping on Ethernet Bridges...............................................................................................................................314
FIP Snooping in a Switch Stack....................................................................................................................................316
Using FIP Snooping........................................................................................................................................................316
Contents
11
Enable the FCoE Transit Feature............................................................................................................................316
FIP Snooping Prerequisites......................................................................................................................................317
Important Points to Remember.............................................................................................................................. 317
Enabling the FCoE Transit Feature.........................................................................................................................318
Enable FIP Snooping on VLANs..............................................................................................................................318
Congure the FC-MAP Value................................................................................................................................. 318
Congure a Port for a Bridge-to-Bridge Link........................................................................................................319
Congure a Port for a Bridge-to-FCF Link............................................................................................................319
Impact on Other Software Features...................................................................................................................... 319
FIP Snooping on an NPIV Proxy Gateway............................................................................................................320
FIP Snooping in an S5000 Stack...........................................................................................................................320
Impact on Other Software Features..................................................................................................................... 320
FIP Snooping Restrictions...................................................................................................................................... 320
Conguring FIP Snooping........................................................................................................................................321
Displaying FIP Snooping Information.....................................................................................................................322
FCoE Transit Conguration Example...........................................................................................................................327
18 FIPS Cryptography...................................................................................................................................329
Conguration Tasks....................................................................................................................................................... 329
Preparing the System....................................................................................................................................................329
Enabling FIPS Mode...................................................................................................................................................... 330
Generating Host-Keys...................................................................................................................................................330
Monitoring FIPS Mode Status......................................................................................................................................330
Disabling FIPS Mode...................................................................................................................................................... 331
19 Fibre Channel Interface............................................................................................................................ 332
Congure Fibre Channel Interfaces.............................................................................................................................332
Enabling Fibre Channel Capability................................................................................................................................332
Conguring Fibre Channel Interfaces..........................................................................................................................333
Displaying Fibre Channel Information.......................................................................................................................... 333
Troubleshooting Fibre Channel Operation.................................................................................................................. 336
Conguring the Fibre Channel Port Group in Passthrough Ethernet Mode...........................................................337
Displaying Fibre Channel Port Group Mode Information...........................................................................................338
20 Force10 Resilient Ring Protocol (FRRP).................................................................................................. 339
Protocol Overview.........................................................................................................................................................339
Ring Status................................................................................................................................................................341
Multiple FRRP Rings................................................................................................................................................ 341
Important FRRP Points...........................................................................................................................................342
Important FRRP Concepts..................................................................................................................................... 343
Implementing FRRP.......................................................................................................................................................344
FRRP Conguration.......................................................................................................................................................344
Creating the FRRP Group.......................................................................................................................................344
Conguring the Control VLAN...............................................................................................................................345
Conguring and Adding the Member VLANs.......................................................................................................346
Setting the FRRP Timers........................................................................................................................................347
12
Contents
Clearing the FRRP Counters.................................................................................................................................. 347
Viewing the FRRP Conguration........................................................................................................................... 347
Viewing the FRRP Information...............................................................................................................................347
Troubleshooting FRRP.................................................................................................................................................. 348
Conguration Checks..............................................................................................................................................348
Sample Conguration and Topology............................................................................................................................348
FRRP Support on VLT.................................................................................................................................................. 350
Example Scenario..................................................................................................................................................... 351
Important Points to Remember............................................................................................................................. 352
21 GARP VLAN Registration Protocol (GVRP)..............................................................................................353
Important Points to Remember................................................................................................................................... 353
Congure GVRP............................................................................................................................................................ 353
Related Conguration Tasks...................................................................................................................................354
Enabling GVRP Globally................................................................................................................................................ 354
Enabling GVRP on a Layer 2 Interface........................................................................................................................355
Congure GVRP Registration...................................................................................................................................... 355
Congure a GARP Timer.............................................................................................................................................. 356
22 High Availability (HA)...............................................................................................................................357
High Availability on Stacks............................................................................................................................................ 357
Hitless Behavior..............................................................................................................................................................357
Graceful Restart............................................................................................................................................................ 358
Software Resiliency....................................................................................................................................................... 358
System Health Monitoring......................................................................................................................................358
Failure and Event Logging...................................................................................................................................... 358
Trace Log.................................................................................................................................................................. 358
Core Dumps..............................................................................................................................................................358
System Log...............................................................................................................................................................359
Hot-Lock Behavior.........................................................................................................................................................359
Component Redundancy.............................................................................................................................................. 359
Automatic and Manual Stack Unit Failover.......................................................................................................... 359
Synchronization between Management and Standby Units..............................................................................360
Forcing a Stack Unit Failover................................................................................................................................. 360
Specifying an Auto-Failover Limit..........................................................................................................................360
Disabling Auto-Reboot............................................................................................................................................ 360
Manually Synchronizing Management and Standby Units..................................................................................361
23 Internet Group Management Protocol (IGMP).........................................................................................362
IGMP Implementation Information.............................................................................................................................. 362
IGMP Protocol Overview..............................................................................................................................................362
IGMP Version 2........................................................................................................................................................ 362
Join a Multicast Group............................................................................................................................................ 363
Leaving a Multicast Group......................................................................................................................................363
IGMP Version 3........................................................................................................................................................ 364
Congure IGMP............................................................................................................................................................. 367
Contents
13
Related Conguration Tasks................................................................................................................................... 367
Viewing IGMP Enabled Interfaces...............................................................................................................................368
Selecting an IGMP Version...........................................................................................................................................368
Viewing IGMP Groups...................................................................................................................................................368
Adjusting Timers............................................................................................................................................................ 369
Adjusting Query and Response Timers................................................................................................................. 369
Enabling IGMP Immediate-Leave.................................................................................................................................370
IGMP Snooping.............................................................................................................................................................. 370
IGMP Snooping Implementation Information....................................................................................................... 370
Conguring IGMP Snooping...................................................................................................................................370
Removing a Group-Port Association......................................................................................................................371
Enabling IGMP Immediate-Leave............................................................................................................................371
Disabling Multicast Flooding................................................................................................................................... 372
Specifying a Port as Connected to a Multicast Router.......................................................................................372
Conguring the Switch as Querier.........................................................................................................................372
Fast Convergence after MSTP Topology Changes................................................................................................... 373
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................ 373
Protocol Separation................................................................................................................................................. 374
Enabling and Disabling Management Egress Interface Selection...................................................................... 375
Handling of Management Route Conguration................................................................................................... 375
Handling of Switch-Initiated Trac....................................................................................................................... 376
Handling of Switch-Destined Trac...................................................................................................................... 377
Handling of Transit Trac (Trac Separation).....................................................................................................377
Mapping of Management Applications and Trac Type..................................................................................... 377
Behavior of Various Applications for Switch-Initiated Trac ............................................................................ 378
Behavior of Various Applications for Switch-Destined Trac ...........................................................................379
Interworking of EIS With Various Applications.....................................................................................................380
Designating a Multicast Router Interface....................................................................................................................381
24 Interfaces.................................................................................................................................................382
Basic Interface Conguration.......................................................................................................................................382
Advanced Interface Conguration...............................................................................................................................382
Interface Types...............................................................................................................................................................383
View Basic Interface Information.................................................................................................................................383
Resetting an Interface to its Factory Default State...................................................................................................385
Enabling Energy Ecient Ethernet..............................................................................................................................386
View EEE Information................................................................................................................................................... 386
Clear EEE Counters.......................................................................................................................................................390
Enabling a Physical Interface........................................................................................................................................ 391
Physical Interfaces......................................................................................................................................................... 391
Conguration Task List for Physical Interfaces....................................................................................................392
Overview of Layer Modes...................................................................................................................................... 392
Conguring Layer 2 (Data Link) Mode..................................................................................................................392
Conguring Layer 2 (Interface) Mode.................................................................................................................. 393
Conguring Layer 3 (Network) Mode...................................................................................................................393
Conguring Layer 3 (Interface) Mode.................................................................................................................. 394
14
Contents
Egress Interface Selection (EIS)..................................................................................................................................394
Important Points to Remember............................................................................................................................. 394
Conguring EIS........................................................................................................................................................ 395
Management Interfaces................................................................................................................................................395
Conguring Management Interfaces.................................................................................................................... 395
Conguring a Management Interface on an Ethernet Port................................................................................397
VLAN Interfaces.............................................................................................................................................................397
Loopback Interfaces......................................................................................................................................................398
Null Interfaces................................................................................................................................................................ 399
Port Channel Interfaces................................................................................................................................................399
Port Channel Denition and Standards.................................................................................................................399
Port Channel Benets.............................................................................................................................................399
Port Channel Implementation.................................................................................................................................399
Interfaces in Port Channels....................................................................................................................................400
Conguration Tasks for Port Channel Interfaces.................................................................................................400
Creating a Port Channel.......................................................................................................................................... 401
Adding a Physical Interface to a Port Channel..................................................................................................... 401
Reassigning an Interface to a New Port Channel................................................................................................403
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 403
Adding or Removing a Port Channel from a VLAN............................................................................................. 404
Assigning an IP Address to a Port Channel.......................................................................................................... 405
Deleting or Disabling a Port Channel.....................................................................................................................405
Load Balancing Through Port Channels............................................................................................................... 405
Changing the Hash Algorithm................................................................................................................................406
Bulk Conguration......................................................................................................................................................... 407
Interface Range........................................................................................................................................................407
Bulk Conguration Examples..................................................................................................................................407
Dening Interface Range Macros................................................................................................................................ 409
Dene the Interface Range.................................................................................................................................... 409
Choosing an Interface-Range Macro....................................................................................................................409
Monitoring and Maintaining Interfaces....................................................................................................................... 409
Maintenance Using TDR..........................................................................................................................................410
Splitting QSFP Ports to SFP+ Ports.............................................................................................................................411
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port...................................................................................412
Important Points to Remember.............................................................................................................................. 412
Example Scenarios................................................................................................................................................... 412
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................ 416
Link Dampening.............................................................................................................................................................. 416
Important Points to Remember.............................................................................................................................. 417
Enabling Link Dampening.........................................................................................................................................417
Link Bundle Monitoring.................................................................................................................................................. 418
Using Ethernet Pause Frames for Flow Control......................................................................................................... 419
Enabling Pause Frames........................................................................................................................................... 420
Congure the MTU Size on an Interface....................................................................................................................420
Port-Pipes........................................................................................................................................................................421
Contents
15
Auto-Negotiation on Ethernet Interfaces....................................................................................................................421
Setting the Speed of Ethernet Interfaces.............................................................................................................421
Set Auto-Negotiation Options................................................................................................................................423
View Advanced Interface Information.........................................................................................................................423
Conguring the Interface Sampling Size...............................................................................................................424
Conguring the Trac Sampling Size Globally...........................................................................................................425
Dynamic Counters......................................................................................................................................................... 426
Clearing Interface Counters....................................................................................................................................427
25 Internet Protocol Security (IPSec).......................................................................................................... 428
Conguring IPSec .........................................................................................................................................................428
26 IPv4 Routing............................................................................................................................................430
IP Addresses....................................................................................................................................................................431
Implementation Information.................................................................................................................................... 431
Conguration Tasks for IP Addresses.......................................................................................................................... 431
Assigning IP Addresses to an Interface........................................................................................................................431
Conguring Static Routes.............................................................................................................................................432
Congure Static Routes for the Management Interface.......................................................................................... 433
IPv4 Path MTU Discovery Overview.......................................................................................................................... 434
Using the Congured Source IP Address in ICMP Messages..................................................................................434
Conguring the ICMP Source Interface............................................................................................................... 434
Conguring the Duration to Establish a TCP Connection........................................................................................ 435
Enabling Directed Broadcast........................................................................................................................................ 435
Resolution of Host Names............................................................................................................................................435
Enabling Dynamic Resolution of Host Names............................................................................................................436
Specifying the Local System Domain and a List of Domains................................................................................... 436
Conguring DNS with Traceroute................................................................................................................................437
ARP..................................................................................................................................................................................437
Conguration Tasks for ARP........................................................................................................................................ 438
Conguring Static ARP Entries....................................................................................................................................438
Enabling Proxy ARP.......................................................................................................................................................438
Clearing ARP Cache......................................................................................................................................................439
ARP Learning via Gratuitous ARP................................................................................................................................439
Enabling ARP Learning via Gratuitous ARP................................................................................................................439
ARP Learning via ARP Request................................................................................................................................... 439
Conguring ARP Retries...............................................................................................................................................440
ICMP................................................................................................................................................................................ 441
Conguration Tasks for ICMP.......................................................................................................................................441
Enabling ICMP Unreachable Messages....................................................................................................................... 441
UDP Helper..................................................................................................................................................................... 441
Congure UDP Helper............................................................................................................................................. 441
Important Points to Remember..............................................................................................................................442
Enabling UDP Helper.....................................................................................................................................................442
Conguring a Broadcast Address................................................................................................................................ 442
Congurations Using UDP Helper............................................................................................................................... 443
16
Contents
UDP Helper with Broadcast-All Addresses.................................................................................................................443
UDP Helper with Subnet Broadcast Addresses.........................................................................................................444
UDP Helper with Congured Broadcast Addresses.................................................................................................. 444
UDP Helper with No Congured Broadcast Addresses............................................................................................445
Troubleshooting UDP Helper........................................................................................................................................445
27 IPv6 Routing............................................................................................................................................ 446
Protocol Overview.........................................................................................................................................................446
Extended Address Space........................................................................................................................................446
Stateless Autoconguration................................................................................................................................... 446
IPv6 Headers............................................................................................................................................................447
IPv6 Header Fields...................................................................................................................................................447
Extension Header Fields..........................................................................................................................................449
Addressing................................................................................................................................................................450
Implementing IPv6 with Dell Networking OS..............................................................................................................451
ICMPv6......................................................................................................................................................................451
Path MTU Discovery................................................................................................................................................451
IPv6 Neighbor Discovery........................................................................................................................................ 452
Secure Shell (SSH) Over an IPv6 Transport........................................................................................................453
Conguration Tasks for IPv6........................................................................................................................................453
Adjusting Your CAM-Prole....................................................................................................................................454
Assigning an IPv6 Address to an Interface...........................................................................................................454
Assigning a Static IPv6 Route................................................................................................................................455
Conguring Telnet with IPv6..................................................................................................................................455
SNMP over IPv6......................................................................................................................................................456
Showing IPv6 Information...................................................................................................................................... 456
Showing an IPv6 Interface..................................................................................................................................... 456
Showing IPv6 Routes.............................................................................................................................................. 457
Showing the Running-Conguration for an Interface.........................................................................................458
Clearing IPv6 Routes...............................................................................................................................................459
Disabling ND Entry Timeout................................................................................................................................... 459
Conguring IPv6 RA Guard.......................................................................................................................................... 459
Conguring IPv6 RA Guard on an Interface..........................................................................................................461
Monitoring IPv6 RA Guard......................................................................................................................................462
28 iSCSI Optimization...................................................................................................................................463
iSCSI Optimization Overview....................................................................................................................................... 463
Monitoring iSCSI Trac Flows...............................................................................................................................464
Application of Quality of Service to iSCSI Trac Flows..................................................................................... 464
Information Monitored in iSCSI Trac Flows.......................................................................................................465
Detection and Auto-Conguration for Dell EqualLogic Arrays...........................................................................465
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................466
Enable and Disable iSCSI Optimization.................................................................................................................466
Default iSCSI Optimization Values............................................................................................................................... 467
iSCSI Optimization Prerequisites..................................................................................................................................467
Conguring iSCSI Optimization....................................................................................................................................467
Contents
17
Displaying iSCSI Optimization Information................................................................................................................. 469
29 Intermediate System to Intermediate System........................................................................................... 471
IS-IS Protocol Overview................................................................................................................................................ 471
IS-IS Addressing..............................................................................................................................................................471
Multi-Topology IS-IS.......................................................................................................................................................472
Transition Mode........................................................................................................................................................472
Interface Support.....................................................................................................................................................473
Adjacencies...............................................................................................................................................................473
Graceful Restart.............................................................................................................................................................473
Timers........................................................................................................................................................................473
Implementation Information..........................................................................................................................................474
Conguration Information............................................................................................................................................. 474
Conguration Tasks for IS-IS..................................................................................................................................475
Conguring the Distance of a Route.....................................................................................................................482
Changing the IS-Type.............................................................................................................................................. 483
IS-IS Metric Styles.........................................................................................................................................................487
Congure Metric Values............................................................................................................................................... 488
Maximum Values in the Routing Table.................................................................................................................. 488
Change the IS-IS Metric Style in One Level Only................................................................................................488
Leaks from One Level to Another..........................................................................................................................490
Sample Congurations..................................................................................................................................................490
30 Link Aggregation Control Protocol (LACP).............................................................................................. 493
Introduction to Dynamic LAGs and LACP.................................................................................................................. 493
Important Points to Remember............................................................................................................................. 493
LACP Modes............................................................................................................................................................ 494
Conguring LACP Commands............................................................................................................................... 494
LACP Conguration Tasks............................................................................................................................................495
Creating a LAG.........................................................................................................................................................495
Conguring the LAG Interfaces as Dynamic........................................................................................................495
Setting the LACP Long Timeout........................................................................................................................... 496
Monitoring and Debugging LACP..........................................................................................................................496
Shared LAG State Tracking...........................................................................................................................................497
Conguring Shared LAG State Tracking............................................................................................................... 497
Important Points about Shared LAG State Tracking........................................................................................... 498
LACP Basic Conguration Example............................................................................................................................ 499
Congure a LAG on ALPHA................................................................................................................................... 499
31 Layer 2..................................................................................................................................................... 507
Manage the MAC Address Table................................................................................................................................. 507
Clearing the MAC Address Table........................................................................................................................... 507
Setting the Aging Time for Dynamic Entries........................................................................................................507
Conguring a Static MAC Address........................................................................................................................508
Displaying the MAC Address Table........................................................................................................................508
MAC Learning Limit.......................................................................................................................................................508
18
Contents
mac learning-limit Dynamic.................................................................................................................................... 509
mac learning-limit mac-address-sticky................................................................................................................. 509
mac learning-limit station-move............................................................................................................................ 509
Learning Limit Violation Actions.............................................................................................................................509
Setting Station Move Violation Actions.................................................................................................................510
Recovering from Learning Limit and Station Move Violations............................................................................510
Disabling MAC Address Learning on the System.................................................................................................. 511
NIC Teaming.....................................................................................................................................................................511
Congure Redundant Pairs........................................................................................................................................... 512
Important Points about Conguring Redundant Pairs......................................................................................... 514
Far-End Failure Detection..............................................................................................................................................515
FEFD State Changes................................................................................................................................................516
Conguring FEFD..................................................................................................................................................... 517
Enabling FEFD on an Interface................................................................................................................................517
Debugging FEFD.......................................................................................................................................................518
32 Link Layer Discovery Protocol (LLDP)..................................................................................................... 520
802.1AB (LLDP) Overview............................................................................................................................................520
Protocol Data Units................................................................................................................................................. 520
Optional TLVs..................................................................................................................................................................521
Management TLVs................................................................................................................................................... 521
TIA-1057 (LLDP-MED) Overview.......................................................................................................................... 523
Congure LLDP..............................................................................................................................................................527
Related Conguration Tasks................................................................................................................................... 527
Important Points to Remember..............................................................................................................................527
LLDP Compatibility..................................................................................................................................................528
CONFIGURATION versus INTERFACE Congurations...................................................................................... 528
Enabling LLDP..........................................................................................................................................................528
Disabling and Undoing LLDP.................................................................................................................................. 529
Enabling LLDP on Management Ports........................................................................................................................529
Disabling and Undoing LLDP on Management Ports..........................................................................................529
Advertising TLVs............................................................................................................................................................ 529
Viewing the LLDP Conguration................................................................................................................................. 530
Viewing Information Advertised by Adjacent LLDP Agents...................................................................................... 531
Conguring LLDPDU Intervals..................................................................................................................................... 532
Conguring Transmit and Receive Mode....................................................................................................................532
Conguring a Time to Live............................................................................................................................................533
Debugging LLDP............................................................................................................................................................534
Relevant Management Objects................................................................................................................................... 535
33 Microsoft Network Load Balancing.......................................................................................................... 540
NLB Unicast Mode Scenario........................................................................................................................................540
NLB Multicast Mode Scenario.....................................................................................................................................540
Limitations of the NLB Feature.....................................................................................................................................541
Microsoft Clustering.......................................................................................................................................................541
Enable and Disable VLAN Flooding ............................................................................................................................. 541
Contents
19
Conguring a Switch for NLB ......................................................................................................................................541
Enabling a Switch for Multicast NLB.................................................................................................................... 542
34 Multicast Source Discovery Protocol (MSDP)......................................................................................... 543
Protocol Overview.........................................................................................................................................................543
Anycast RP.....................................................................................................................................................................544
Implementation Information......................................................................................................................................... 545
Congure Multicast Source Discovery Protocol........................................................................................................545
Related Conguration Tasks.........................................................................................................................................545
Enable MSDP................................................................................................................................................................. 549
Manage the Source-Active Cache..............................................................................................................................550
Viewing the Source-Active Cache........................................................................................................................ 550
Limiting the Source-Active Cache........................................................................................................................ 550
Clearing the Source-Active Cache.........................................................................................................................551
Enabling the Rejected Source-Active Cache........................................................................................................551
Accept Source-Active Messages that Fail the RFP Check...................................................................................... 551
Specifying Source-Active Messages.......................................................................................................................... 555
Limiting the Source-Active Messages from a Peer...................................................................................................556
Preventing MSDP from Caching a Local Source.......................................................................................................556
Preventing MSDP from Caching a Remote Source.................................................................................................. 557
Preventing MSDP from Advertising a Local Source..................................................................................................557
Logging Changes in Peership States...........................................................................................................................558
Terminating a Peership..................................................................................................................................................558
Clearing Peer Statistics.................................................................................................................................................559
Debugging MSDP..........................................................................................................................................................559
Conguring Anycast RP............................................................................................................................................... 560
Reducing Source-Active Message Flooding........................................................................................................ 560
Specifying the RP Address Used in SA Messages..............................................................................................560
MSDP Sample Congurations..................................................................................................................................... 563
35 Multiple Spanning Tree Protocol (MSTP)................................................................................................ 566
Protocol Overview.........................................................................................................................................................566
Congure Multiple Spanning Tree Protocol................................................................................................................ 567
Related Conguration Tasks...................................................................................................................................567
Enable Multiple Spanning Tree Globally.......................................................................................................................567
Adding and Removing Interfaces.................................................................................................................................568
Creating Multiple Spanning Tree Instances................................................................................................................568
Inuencing MSTP Root Selection................................................................................................................................569
Interoperate with Non-Dell Networking OS Bridges................................................................................................. 570
Modifying Global Parameters....................................................................................................................................... 570
Modifying the Interface Parameters............................................................................................................................ 571
Conguring an EdgePort.............................................................................................................................................. 572
Conguring Fast Hellos for Link State Detection.......................................................................................................573
Flush MAC Addresses after a Topology Change........................................................................................................573
MSTP Sample Congurations...................................................................................................................................... 573
20
Contents
/