Force10 MXL Blade

Dell Force10 MXL Blade User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell Force10 MXL Blade User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Networking Configuration Guide for the
MXL 10/40GbE Switch I/O Module
9.5(0.0)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 06
Rev. A00
Contents
1 About this Guide......................................................................................................32
Audience..............................................................................................................................................32
Conventions........................................................................................................................................ 32
Information Symbols...........................................................................................................................32
Related Documents............................................................................................................................ 33
2 Configuration Fundamentals.............................................................................. 34
Accessing the Command Line............................................................................................................34
CLI Modes............................................................................................................................................34
Navigating CLI Modes................................................................................................................... 36
The do Command...............................................................................................................................39
Undoing Commands...........................................................................................................................39
Obtaining Help....................................................................................................................................40
Entering and Editing Commands....................................................................................................... 40
Command History............................................................................................................................... 41
Filtering show Command Outputs.....................................................................................................42
Multiple Users in Configuration Mode............................................................................................... 43
3 Getting Started........................................................................................................44
Console Access...................................................................................................................................45
Serial Console................................................................................................................................45
External Serial Port with a USB Connector...................................................................................47
Accessing the CLI Interface and Running Scripts Using SSH............................................................ 47
Entering CLI commands Using an SSH Connection....................................................................47
Executing Local CLI Scripts Using an SSH Connection...............................................................47
Boot Process....................................................................................................................................... 48
Default Configuration......................................................................................................................... 50
Configuring a Host Name...................................................................................................................50
Configuring a Host Name...................................................................................................................50
Accessing the System Remotely.........................................................................................................51
Accessing the MXL Switch Remotely............................................................................................51
Configure the Management Port IP Address................................................................................51
Configure a Management Route...................................................................................................51
Configuring a Username and Password.......................................................................................52
Configuring the Enable Password...................................................................................................... 52
Configuration File Management.........................................................................................................53
Copy Files to and from the System.............................................................................................. 53
Save the Running-Configuration..................................................................................................54
Viewing Files.................................................................................................................................. 55
Managing the File System...................................................................................................................56
View the Command History................................................................................................................57
Using HTTP for File Transfers............................................................................................................. 58
Upgrading and Downgrading the Dell Networking OS.....................................................................58
Using Hashes to Validate Software Images........................................................................................58
4 Management............................................................................................................60
Configuring Privilege Levels............................................................................................................... 60
Creating a Custom Privilege Level............................................................................................... 60
Customizing a Privilege Level....................................................................................................... 61
Applying a Privilege Level to a Username.................................................................................... 62
Applying a Privilege Level to a Terminal Line...............................................................................63
Configuring Logging...........................................................................................................................63
Audit and Security Logs.................................................................................................................63
Configuring Logging Format ...................................................................................................... 65
Setting Up a Secure Connection to a Syslog Server....................................................................66
Display the Logging Buffer and the Logging Configuration..............................................................67
Log Messages in the Internal Buffer...................................................................................................68
Configuration Task List for System Log Management................................................................ 68
Disabling System Logging.................................................................................................................. 68
Sending System Messages to a Syslog Server................................................................................... 68
Configuring a UNIX System as a Syslog Server............................................................................68
Changing System Logging Settings................................................................................................... 69
Display the Logging Buffer and the Logging Configuration............................................................. 70
Configuring a UNIX Logging Facility Level.........................................................................................70
Synchronizing Log Messages..............................................................................................................72
Enabling Timestamp on Syslog Messages..........................................................................................72
File Transfer Services...........................................................................................................................73
Configuration Task List for File Transfer Services........................................................................ 73
Enabling the FTP Server.................................................................................................................73
Configuring FTP Server Parameters..............................................................................................73
Configuring FTP Client Parameters.............................................................................................. 74
Terminal Lines..................................................................................................................................... 74
Denying and Permitting Access to a Terminal Line..................................................................... 74
Configuring Login Authentication for Terminal Lines..................................................................75
Setting Time Out of EXEC Privilege Mode......................................................................................... 76
Using Telnet to get to Another Network Device................................................................................77
Lock CONFIGURATION Mode............................................................................................................ 77
Viewing the Configuration Lock Status........................................................................................78
Recovering from a Forgotten Password............................................................................................ 78
Recovering from a Forgotten Enable Password................................................................................ 79
Recovering from a Failed Start........................................................................................................... 80
5 802.1X........................................................................................................................ 81
The Port-Authentication Process.......................................................................................................82
EAP over RADIUS...........................................................................................................................84
Configuring 802.1X............................................................................................................................. 84
Related Configuration Tasks.........................................................................................................84
Important Points to Remember..........................................................................................................85
Enabling 802.1X...................................................................................................................................86
Configuring Request Identity Re-Transmissions......................................................................... 88
Configuring a Quiet Period after a Failed Authentication........................................................... 88
Forcibly Authorizing or Unauthorizing a Port....................................................................................89
Re-Authenticating a Port....................................................................................................................90
Configuring Timeouts......................................................................................................................... 91
Configuring Dynamic VLAN Assignment with Port Authentication..................................................92
Guest and Authentication-Fail VLANs.......................................................................................... 93
Configuring a Guest VLAN............................................................................................................94
Configuring an Authentication-Fail VLAN....................................................................................94
6 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)............................................................................................................96
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...........................................96
Guidelines for Configuring ACL VLAN groups................................................................................... 97
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters..........................98
Configuring ACL VLAN Groups.................................................................................................... 98
Configuring FP Blocks for VLAN Parameters............................................................................... 99
Viewing CAM Usage..........................................................................................................................100
Allocating FP Blocks for VLAN Processes.........................................................................................101
7 Access Control Lists (ACLs)................................................................................ 103
IP Access Control Lists (ACLs).......................................................................................................... 103
Implementing ACL on the Dell Networking OS.............................................................................. 104
ACLs and VLANs................................................................................................................................104
ACL Optimization..............................................................................................................................104
Determine the Order in which ACLs are Used to Classify Traffic...................................................104
Example of the order Keyword to Determine ACL Sequence...................................................105
IP Fragment Handling....................................................................................................................... 105
IP Fragments ACL Examples............................................................................................................. 105
Layer 4 ACL Rules Examples.............................................................................................................106
Configure a Standard IP ACL............................................................................................................ 107
Configuring a Standard IP ACL Filter................................................................................................108
Configure an Extended IP ACL.........................................................................................................109
Configuring Filters with a Sequence Number..................................................................................109
Configuring Filters Without a Sequence Number............................................................................110
Established Flag................................................................................................................................. 110
Configure Layer 2 and Layer 3 ACLs................................................................................................. 111
Assign an IP ACL to an Interface....................................................................................................... 111
Applying an IP ACL.............................................................................................................................112
Counting ACL Hits............................................................................................................................. 112
Configure Ingress ACLs..................................................................................................................... 113
Configure Egress ACLs...................................................................................................................... 113
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................114
IP Prefix Lists...................................................................................................................................... 115
Implementation Information.......................................................................................................115
Configuration Task List for Prefix Lists..............................................................................................115
Creating a Prefix List..........................................................................................................................116
Creating a Prefix List Without a Sequence Number.........................................................................117
Viewing Prefix Lists............................................................................................................................ 117
Applying a Prefix List for Route Redistribution.................................................................................118
Applying a Filter to a Prefix List (OSPF)............................................................................................. 119
ACL Resequencing............................................................................................................................ 119
Resequencing an ACL or Prefix List..................................................................................................120
Route Maps........................................................................................................................................ 121
Implementation Information.......................................................................................................122
Important Points to Remember........................................................................................................122
Configuration Task List for Route Maps........................................................................................... 122
Creating a Route Map....................................................................................................................... 122
Configure Route Map Filters.............................................................................................................124
Configuring Match Routes................................................................................................................125
Configuring Set Conditions.............................................................................................................. 126
Configure a Route Map for Route Redistribution............................................................................ 126
Configure a Route Map for Route Tagging...................................................................................... 127
Continue Clause................................................................................................................................127
Logging of ACL Processes................................................................................................................ 128
Guidelines for Configuring ACL Logging......................................................................................... 129
Configuring ACL Logging................................................................................................................. 130
Flow-Based Monitoring Support for ACLs.......................................................................................130
Behavior of Flow-Based Monitoring........................................................................................... 131
Enabling Flow-Based Monitoring..................................................................................................... 132
8 Bidirectional Forwarding Detection (BFD).....................................................134
How BFD Works................................................................................................................................ 134
BFD Packet Format......................................................................................................................135
BFD Sessions................................................................................................................................137
BFD Three-Way Handshake........................................................................................................ 137
Session State Changes................................................................................................................ 138
Important Points to Remember........................................................................................................139
Configure BFD...................................................................................................................................139
Configure BFD for Physical Ports............................................................................................... 140
Enabling BFD Globally.................................................................................................................140
Establishing a Session on Physical Ports.....................................................................................141
Changing Physical Port Session Parameters..............................................................................142
Disabling and Re-Enabling BFD..................................................................................................143
Configure BFD for Static Routes.......................................................................................................143
Related Configuration Tasks.......................................................................................................144
Establishing Sessions for Static Routes...................................................................................... 144
Changing Static Route Session Parameters............................................................................... 145
Disabling BFD for Static Routes.................................................................................................. 145
Configure BFD for OSPF................................................................................................................... 145
Related Configuration Tasks.......................................................................................................145
Establishing Sessions with OSPF Neighbors.............................................................................. 146
Changing OSPF Session Parameters.......................................................................................... 147
Disabling BFD for OSPF...............................................................................................................147
Configure BFD for OSPFv3............................................................................................................... 148
Related Configuration Tasks.......................................................................................................148
Establishing Sessions with OSPFv3 Neighbors...........................................................................148
Changing OSPFv3 Session Parameters...................................................................................... 148
Disabling BFD for OSPFv3...........................................................................................................149
Configure BFD for BGP.....................................................................................................................149
Prerequisites................................................................................................................................ 149
Establishing Sessions with BGP Neighbors................................................................................ 150
Disabling BFD for BGP.................................................................................................................152
Use BFD in a BGP Peer Group.................................................................................................... 152
Displaying BFD for BGP Information.......................................................................................... 152
Configure BFD for VRRP................................................................................................................... 156
Related Configuration Tasks....................................................................................................... 157
Establishing Sessions with All VRRP Neighbors..........................................................................157
Establishing VRRP Sessions on VRRP Neighbors....................................................................... 158
Changing VRRP Session Parameters.......................................................................................... 159
Disabling BFD for VRRP...............................................................................................................159
Configure BFD for VLANs................................................................................................................. 159
Related Configuration Task........................................................................................................ 160
Establish Sessions with VLAN Neighbors................................................................................... 160
Changing VLAN Session Parameters...........................................................................................161
Disabling BFD for VLANs............................................................................................................. 161
Configure BFD for Port-Channels.................................................................................................... 161
Related Configuration Tasks.......................................................................................................162
Establish Sessions on Port-Channels......................................................................................... 162
Changing Physical Port Session Parameters..............................................................................163
Disabling BFD for Port-Channels................................................................................................163
Configuring Protocol Liveness......................................................................................................... 163
Troubleshooting BFD........................................................................................................................163
9 Border Gateway Protocol IPv4 (BGPv4)......................................................... 165
Autonomous Systems (AS)................................................................................................................165
Sessions and Peers............................................................................................................................ 167
Establish a Session.......................................................................................................................168
Route Reflectors................................................................................................................................169
Communities...............................................................................................................................169
BGP Attributes................................................................................................................................... 170
Best Path Selection Criteria.........................................................................................................170
Weight.......................................................................................................................................... 172
Local Preference..........................................................................................................................172
Multi-Exit Discriminators (MEDs)................................................................................................ 173
Origin........................................................................................................................................... 174
AS Path......................................................................................................................................... 175
Next Hop......................................................................................................................................175
Multiprotocol BGP.............................................................................................................................175
Implement BGP with the Dell Networking OS.................................................................................176
Additional Path (Add-Path) Support............................................................................................176
Advertise IGP Cost as MED for Redistributed Routes................................................................ 176
Ignore Router-ID for Some Best-Path Calculations.................................................................. 177
Four-Byte AS Numbers................................................................................................................177
AS4 Number Representation.......................................................................................................178
AS Number Migration.................................................................................................................. 179
BGP4 Management Information Base (MIB)...............................................................................181
Important Points to Remember.................................................................................................. 181
Configuration Information................................................................................................................182
BGP Configuration............................................................................................................................ 182
Enabling BGP...............................................................................................................................183
Enabling MBGP Configurations.................................................................................................. 218
BGP Regular Expression Optimization............................................................................................. 219
Debugging BGP.................................................................................................................................219
Storing Last and Bad PDUs.........................................................................................................220
PDU Counters............................................................................................................................. 220
Sample Configurations......................................................................................................................221
10 Content Addressable Memory (CAM)........................................................... 230
CAM Allocation................................................................................................................................. 230
Test CAM Usage................................................................................................................................ 231
View CAM-ACL Settings....................................................................................................................231
CAM Optimization............................................................................................................................ 232
11 Control Plane Policing (CoPP).........................................................................233
Configure Control Plane Policing.................................................................................................... 234
Configuring CoPP for Protocols.................................................................................................235
Configuring CoPP for CPU Queues........................................................................................... 237
Show Commands....................................................................................................................... 238
12 Data Center Bridging (DCB)............................................................................ 240
Ethernet Enhancements in Data Center Bridging...........................................................................240
Priority-Based Flow Control....................................................................................................... 241
Enhanced Transmission Selection............................................................................................. 242
Data Center Bridging Exchange Protocol (DCBx)..................................................................... 243
Data Center Bridging in a Traffic Flow.......................................................................................244
Enabling Data Center Bridging.........................................................................................................244
QoS dot1p Traffic Classification and Queue Assignment...............................................................245
Configuring Priority-Based Flow Control........................................................................................246
Configuring Lossless Queues.....................................................................................................248
Configuring the PFC Buffer in a Switch Stack........................................................................... 249
Configure Enhanced Transmission Selection................................................................................. 250
ETS Prerequisites and Restrictions............................................................................................. 250
Creating a QoS ETS Output Policy............................................................................................. 251
Creating an ETS Priority Group...................................................................................................253
Applying an ETS Output Policy for a Priority Group to an Interface.........................................254
ETS Operation with DCBx...........................................................................................................255
Configuring Bandwidth Allocation for DCBx CIN..................................................................... 256
Applying DCB Policies in a Switch Stack..........................................................................................257
Applying DCB Policies with an ETS Configuration.......................................................................... 257
Configure a DCBx Operation............................................................................................................257
DCBx Operation..........................................................................................................................258
DCBx Port Roles..........................................................................................................................258
DCB Configuration Exchange....................................................................................................260
Configuration Source Election...................................................................................................260
Propagation of DCB Information................................................................................................261
Auto-Detection and Manual Configuration of the DCBx Version.............................................261
DCBx Example.............................................................................................................................262
DCBx Prerequisites and Restrictions..........................................................................................263
Configuring DCBx.......................................................................................................................264
Verifying the DCB Configuration..................................................................................................... 268
PFC and ETS Configuration Examples............................................................................................. 278
Using PFC and ETS to Manage Data Center Traffic...................................................................278
Using PFC and ETS to Manage Converged Ethernet Traffic in a Switch Stack........................ 282
Hierarchical Scheduling in ETS Output Policies........................................................................ 282
Configuring DCB Maps and its Attributes........................................................................................283
DCB Map: Configuration Procedure..........................................................................................283
Important Points to Remember................................................................................................. 284
Applying a DCB Map on a Port...................................................................................................284
Configuring PFC without a DCB Map........................................................................................ 285
Configuring Lossless Queues.....................................................................................................285
Priority-Based Flow Control Using Dynamic Buffer Method..........................................................286
Pause and Resume of Traffic......................................................................................................286
Buffer Sizes for Lossless or PFC Packets....................................................................................287
Interworking of DCB Map With DCB Buffer Threshold Settings.................................................... 288
Configuring the Dynamic Buffer Method........................................................................................289
13 Debugging and Diagnostics.............................................................................291
Offline Diagnostics............................................................................................................................291
Important Points to Remember..................................................................................................291
Running Offline Diagnostics.......................................................................................................292
Trace Logs.........................................................................................................................................294
Auto Save on Crash or Rollover................................................................................................. 295
Using the Show Hardware Commands........................................................................................... 295
Enabling Environmental Monitoring................................................................................................ 297
Recognize an Over-Temperature Condition............................................................................ 298
Troubleshoot an Over-Temperature Condition........................................................................298
Recognize an Under-Voltage Condition................................................................................... 299
Troubleshoot an Under-Voltage Condition.............................................................................. 299
Buffer Tuning....................................................................................................................................300
Deciding to Tune Buffers............................................................................................................301
Using a Pre-Defined Buffer Profile.............................................................................................304
Sample Buffer Profile Configuration..........................................................................................304
Troubleshooting Packet Loss...........................................................................................................305
Displaying Drop Counters.......................................................................................................... 305
Dataplane Statistics.....................................................................................................................306
Display Stack Port Statistics........................................................................................................ 307
Display Stack Member Counters................................................................................................308
Enabling Application Core Dumps...................................................................................................308
Mini Core Dumps..............................................................................................................................309
Enabling TCP Dumps........................................................................................................................ 310
14 Dynamic Host Configuration Protocol (DHCP)...........................................311
DHCP Packet Format and Options................................................................................................... 311
Assign an IP Address using DHCP...............................................................................................313
Implementation Information............................................................................................................ 314
Configure the System to be a DHCP Server.................................................................................... 315
Configuring the Server for Automatic Address Allocation.........................................................315
Configuration Tasks.................................................................................................................... 316
Specifying a Default Gateway..................................................................................................... 317
Enabling the DHCP Server...........................................................................................................317
Configure a Method of Hostname Resolution...........................................................................318
Creating Manual Binding Entries................................................................................................ 318
Debugging the DHCP Server...................................................................................................... 319
Using DHCP Clear Commands...................................................................................................319
Configure the System to be a Relay Agent......................................................................................320
Configure the System to be a DHCP Client.....................................................................................322
Configuring the DHCP Client System........................................................................................ 322
DHCP Client on a Management Interface................................................................................. 326
DHCP Client Operation with Other Features.............................................................................327
Configure Secure DHCP...................................................................................................................328
Option 82.................................................................................................................................... 328
DHCP Snooping..........................................................................................................................329
Drop DHCP Packets on Snooped VLANs Only.......................................................................... 331
Dynamic ARP Inspection.............................................................................................................331
Configuring Dynamic ARP Inspection........................................................................................332
Source Address Validation.......................................................................................................... 333
15 Equal Cost Multi-Path (ECMP)........................................................................ 336
ECMP for Flow-Based Affinity.......................................................................................................... 336
Enabling Deterministic ECMP Next Hop....................................................................................336
Link Bundle Monitoring.................................................................................................................... 336
Managing ECMP Group Paths.......................................................................................................... 337
16 FCoE Transit.........................................................................................................338
Fibre Channel over Ethernet............................................................................................................ 338
Ensure Robustness in a Converged Ethernet Network...................................................................338
FIP Snooping on Ethernet Bridges...................................................................................................340
FIP Snooping in a Switch Stack........................................................................................................ 342
Using FIP Snooping...........................................................................................................................342
Important Points to Remember................................................................................................. 342
Enabling the FCoE Transit Feature.............................................................................................343
Enable FIP Snooping on VLANs..................................................................................................343
Configure the FC-MAP Value..................................................................................................... 343
Configure a Port for a Bridge-to-Bridge Link............................................................................343
Configure a Port for a Bridge-to-FCF Link................................................................................ 344
Impact on Other Software Features...........................................................................................344
FIP Snooping Prerequisites.........................................................................................................344
FIP Snooping Restrictions...........................................................................................................345
Configuring FIP Snooping.......................................................................................................... 345
Displaying FIP Snooping Information.............................................................................................. 346
FCoE Transit Configuration Example...............................................................................................352
17 FIPS Cryptography............................................................................................. 354
Preparing the System........................................................................................................................354
Enabling FIPS Mode.......................................................................................................................... 354
Generating Host-Keys...................................................................................................................... 355
Monitoring FIPS Mode Status........................................................................................................... 355
Disabling FIPS Mode......................................................................................................................... 356
18 Force10 Resilient Ring Protocol (FRRP)........................................................357
Protocol Overview............................................................................................................................ 357
Ring Status...................................................................................................................................358
Multiple FRRP Rings.................................................................................................................... 359
Important FRRP Points................................................................................................................360
Important FRRP Concepts.......................................................................................................... 361
Implementing FRRP.......................................................................................................................... 362
FRRP Configuration.......................................................................................................................... 362
Creating the FRRP Group........................................................................................................... 363
Configuring the Control VLAN................................................................................................... 363
Configuring and Adding the Member VLANs.............................................................................365
Setting the FRRP Timers............................................................................................................. 366
Clearing the FRRP Counters.......................................................................................................366
Viewing the FRRP Configuration................................................................................................ 367
Viewing the FRRP Information....................................................................................................367
Troubleshooting FRRP......................................................................................................................367
Configuration Checks.................................................................................................................367
Sample Configuration and Topology.............................................................................................. 368
19 GARP VLAN Registration Protocol (GVRP).................................................. 370
Important Points to Remember....................................................................................................... 370
Configure GVRP................................................................................................................................370
Related Configuration Tasks....................................................................................................... 371
Enabling GVRP Globally.................................................................................................................... 371
Enabling GVRP on a Layer 2 Interface..............................................................................................372
Configure GVRP Registration........................................................................................................... 372
Configure a GARP Timer...................................................................................................................373
20 Internet Group Management Protocol (IGMP)...........................................375
IGMP Protocol Overview.................................................................................................................. 375
IGMP Version 2............................................................................................................................375
IGMP Version 3............................................................................................................................ 377
IGMP Snooping.................................................................................................................................380
IGMP Snooping Implementation Information...........................................................................380
Configuring IGMP Snooping.......................................................................................................381
Enabling IGMP Immediate-Leave...............................................................................................381
Disabling Multicast Flooding...................................................................................................... 382
Specifying a Port as Connected to a Multicast Router..............................................................382
Configuring the Switch as Querier.............................................................................................382
Fast Convergence after MSTP Topology Changes......................................................................... 383
Designating a Multicast Router Interface.........................................................................................383
21 Interfaces..............................................................................................................384
Basic Interface Configuration.......................................................................................................... 384
Advanced Interface Configuration...................................................................................................384
Interface Types..................................................................................................................................385
View Basic Interface Information.....................................................................................................385
Enabling a Physical Interface............................................................................................................387
Physical Interfaces............................................................................................................................388
Configuration Task List for Physical Interfaces......................................................................... 388
Overview of Layer Modes...........................................................................................................388
Configuring Layer 2 (Data Link) Mode....................................................................................... 389
Configuring Layer 2 (Interface) Mode........................................................................................389
Configuring Layer 3 (Network) Mode........................................................................................ 389
Configuring Layer 3 (Interface) Mode........................................................................................390
Management Interfaces.................................................................................................................... 391
Configuring Management Interfaces on the XML Switch..........................................................391
VLAN Interfaces.................................................................................................................................393
Loopback Interfaces......................................................................................................................... 394
Null Interfaces...................................................................................................................................394
Port Channel Interfaces....................................................................................................................394
Port Channel Definition and Standards......................................................................................395
Port Channel Benefits.................................................................................................................395
Port Channel Implementation....................................................................................................395
100/1000/10000 Mbps Interfaces in Port Channels.................................................................396
Configuration Tasks for Port Channel Interfaces......................................................................396
Creating a Port Channel............................................................................................................. 396
Adding a Physical Interface to a Port Channel.......................................................................... 397
Reassigning an Interface to a New Port Channel......................................................................399
Configuring the Minimum Oper Up Links in a Port Channel....................................................399
Adding or Removing a Port Channel from a VLAN...................................................................400
Assigning an IP Address to a Port Channel............................................................................... 400
Deleting or Disabling a Port Channel.........................................................................................401
Server Ports....................................................................................................................................... 401
Default Configuration without Start-up Config.........................................................................401
Bulk Configuration............................................................................................................................402
Interface Range...........................................................................................................................402
Bulk Configuration Examples.....................................................................................................402
Defining Interface Range Macros.................................................................................................... 404
Define the Interface Range........................................................................................................ 404
Choosing an Interface-Range Macro........................................................................................ 404
Monitoring and Maintaining Interfaces............................................................................................405
Maintenance Using TDR.............................................................................................................406
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 406
Merging SFP+ Ports to QSFP 40G Ports.................................................................................... 407
Configure the MTU Size on an Interface...................................................................................408
Layer 2 Flow Control Using Ethernet Pause Frames.......................................................................408
Enabling Pause Frames...............................................................................................................409
Configure MTU Size on an Interface............................................................................................... 409
Port-Pipes..........................................................................................................................................410
Auto-Negotiation on Ethernet Interfaces........................................................................................410
Setting the Speed and Duplex Mode of Ethernet Interfaces..................................................... 411
View Advanced Interface Information..............................................................................................413
Configuring the Interface Sampling Size....................................................................................414
Dynamic Counters...................................................................................................................... 415
Enhanced Validation of Interface Ranges........................................................................................416
22 Internet Protocol Security (IPSec)..................................................................417
Configuring IPSec ............................................................................................................................ 418
23 IPv4 Routing........................................................................................................ 419
IP Addresses...................................................................................................................................... 419
Implementation Information...................................................................................................... 419
Configuration Tasks for IP Addresses.........................................................................................419
IPv4 Path MTU Discovery Overview.................................................................................................422
Using the Configured Source IP Address in ICMP Messages..........................................................423
Configuring the ICMP Source Interface.....................................................................................423
Configuring the Duration to Establish a TCP Connection..............................................................424
Enabling Directed Broadcast............................................................................................................424
Resolution of Host Names............................................................................................................... 424
Enabling Dynamic Resolution of Host Names...........................................................................425
Specifying the Local System Domain and a List of Domains....................................................425
Configuring DNS with Traceroute............................................................................................. 426
ARP.................................................................................................................................................... 427
Configuration Tasks for ARP.......................................................................................................427
ARP Learning via Gratuitous ARP..................................................................................................... 429
ARP Learning via ARP Request......................................................................................................... 429
Configuring ARP Retries...................................................................................................................430
ICMP.................................................................................................................................................. 431
Configuration Tasks for ICMP.....................................................................................................431
UDP Helper........................................................................................................................................431
Configure UDP Helper................................................................................................................ 431
Important Points to Remember..................................................................................................431
Enabling UDP Helper.................................................................................................................. 432
Configurations Using UDP Helper................................................................................................... 432
UDP Helper with Broadcast-All Addresses................................................................................ 432
UDP Helper with Subnet Broadcast Addresses..........................................................................433
UDP Helper with Configured Broadcast Addresses.................................................................. 434
UDP Helper with No Configured Broadcast Addresses............................................................ 434
Troubleshooting UDP Helper...........................................................................................................435
24 IPv6 Addressing..................................................................................................436
Protocol Overview............................................................................................................................436
Extended Address Space............................................................................................................ 436
Stateless Autoconfiguration....................................................................................................... 436
IPv6 Header Fields............................................................................................................................ 438
Version (4 bits)............................................................................................................................ 438
Traffic Class (8 bits).....................................................................................................................438
Flow Label (20 bits).....................................................................................................................438
Payload Length (16 bits)..............................................................................................................438
Next Header (8 bits).................................................................................................................... 438
Hop Limit (8 bits).........................................................................................................................439
Source Address (128 bits)........................................................................................................... 439
Destination Address (128 bits).................................................................................................... 439
Extension Header Fields................................................................................................................... 439
Hop-by-Hop Options Header....................................................................................................440
Addressing........................................................................................................................................ 440
Link-local Addresses................................................................................................................... 441
Static and Dynamic Addressing.................................................................................................. 441
Implementing IPv6 with the Dell Networking OS........................................................................... 442
ICMPv6..............................................................................................................................................444
Path MTU Discovery......................................................................................................................... 445
IPv6 Neighbor Discovery..................................................................................................................445
IPv6 Neighbor Discovery of MTU Packets.................................................................................446
Configuring the IPv6 Recursive DNS Server..............................................................................446
Debugging IPv6 RDNSS Information Sent to the Host .............................................................447
Displaying IPv6 RDNSS Information...........................................................................................448
IPv6 Multicast....................................................................................................................................448
Secure Shell (SSH) Over an IPv6 Transport..................................................................................... 449
Configuration Task List for IPv6.......................................................................................................449
Adjusting Your CAM-Profile....................................................................................................... 449
Assigning an IPv6 Address to an Interface.................................................................................450
Assigning a Static IPv6 Route......................................................................................................451
Configuring Telnet with IPv6...................................................................................................... 451
SNMP over IPv6...........................................................................................................................452
Showing IPv6 Information.......................................................................................................... 452
Showing an IPv6 Interface..........................................................................................................452
Showing IPv6 Routes.................................................................................................................. 453
Showing the Running-Configuration for an Interface..............................................................454
Clearing IPv6 Routes...................................................................................................................455
25 iSCSI Optimization............................................................................................ 456
iSCSI Optimization Overview........................................................................................................... 456
Monitoring iSCSI Traffic Flows................................................................................................... 458
Information Monitored in iSCSI Traffic Flows............................................................................458
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................ 458
Configuring Detection and Ports for Dell Compellent Arrays.................................................. 459
iSCSI Optimization: Operation................................................................................................... 459
Default iSCSI Optimization Values............................................................................................. 459
Displaying iSCSI Optimization Information.....................................................................................460
26 Intermediate System to Intermediate System............................................462
IS-IS Protocol Overview................................................................................................................... 462
IS-IS Addressing................................................................................................................................462
Multi-Topology IS-IS........................................................................................................................ 463
Transition Mode..........................................................................................................................464
Interface Support........................................................................................................................464
Adjacencies................................................................................................................................. 464
Graceful Restart................................................................................................................................464
Timers..........................................................................................................................................465
Implementation Information............................................................................................................465
Configuration Information............................................................................................................... 466
Configuration Tasks for IS-IS..................................................................................................... 466
IS-IS Metric Styles............................................................................................................................. 482
Configure Metric Values...................................................................................................................483
Maximum Values in the Routing Table...................................................................................... 483
Change the IS-IS Metric Style in One Level Only......................................................................483
Leaks from One Level to Another.............................................................................................. 485
Sample Configurations.....................................................................................................................486
27 Link Aggregation Control Protocol (LACP)................................................. 491
Introduction to Dynamic LAGs and LACP........................................................................................491
Important Points to Remember..................................................................................................491
LACP Modes................................................................................................................................492
Configuring LACP Commands...................................................................................................492
LACP Configuration Tasks................................................................................................................493
Creating a LAG............................................................................................................................ 493
Configuring the LAG Interfaces as Dynamic............................................................................. 494
Setting the LACP Long Timeout.................................................................................................494
Shared LAG State Tracking...............................................................................................................495
Configuring Shared LAG State Tracking.......................................................................................... 496
Important Points about Shared LAG State Tracking..................................................................497
LACP Basic Configuration Example.................................................................................................498
Configure a LAG on ALPHA........................................................................................................498
28 Layer 2...................................................................................................................507
Manage the MAC Address Table...................................................................................................... 507
Clearing the MAC Address Table................................................................................................507
Setting the Aging Time for Dynamic Entries..............................................................................507
Configuring a Static MAC Address............................................................................................. 508
Displaying the MAC Address Table............................................................................................ 508
MAC Learning Limit.......................................................................................................................... 508
Setting the MAC Learning Limit..................................................................................................509
mac learning-limit Dynamic.......................................................................................................509
mac learning-limit station-move...............................................................................................509
Learning Limit Violation Actions.................................................................................................510
Setting Station Move Violation Actions...................................................................................... 510
Recovering from Learning Limit and Station Move Violations..................................................510
NIC Teaming......................................................................................................................................511
MAC Move Optimization.............................................................................................................512
29 Link Layer Discovery Protocol (LLDP)...........................................................513
802.1AB (LLDP) Overview..................................................................................................................513
Protocol Data Units..................................................................................................................... 513
Optional TLVs.................................................................................................................................... 514
Management TLVs.......................................................................................................................514
TIA-1057 (LLDP-MED) Overview...................................................................................................... 516
TIA Organizationally Specific TLVs..............................................................................................517
Extended Power via MDI TLV......................................................................................................521
Configure LLDP................................................................................................................................. 521
Related Configuration Tasks....................................................................................................... 521
Important Points to Remember..................................................................................................522
LLDP Compatibility......................................................................................................................522
CONFIGURATION versus INTERFACE Configurations....................................................................522
Enabling LLDP................................................................................................................................... 523
Disabling and Undoing LLDP......................................................................................................523
Advertising TLVs................................................................................................................................523
Viewing the LLDP Configuration......................................................................................................525
Viewing Information Advertised by Adjacent LLDP Agents.............................................................525
Configuring LLDPDU Intervals......................................................................................................... 526
Configuring Transmit and Receive Mode........................................................................................ 527
Configuring a Time to Live...............................................................................................................528
Debugging LLDP...............................................................................................................................529
Relevant Management Objects........................................................................................................530
30 Microsoft Network Load Balancing.............................................................. 536
NLB Unicast Mode Scenario.............................................................................................................536
NLB Multicast Mode Scenario...........................................................................................................537
Limitations With Enabling NLB on Switches.................................................................................... 537
Benefits and Working of Microsoft Clustering.................................................................................537
Enable and Disable VLAN Flooding .................................................................................................538
Configuring a Switch for NLB ..........................................................................................................538
..................................................................................................................................................... 538
31 Multicast Source Discovery Protocol (MSDP).............................................539
Protocol Overview............................................................................................................................539
Anycast RP.........................................................................................................................................541
Implementation Information............................................................................................................ 541
Configure the Multicast Source Discovery Protocol....................................................................... 541
Related Configuration Tasks.......................................................................................................541
Enabling MSDP..................................................................................................................................545
Manage the Source-Active Cache...................................................................................................546
Viewing the Source-Active Cache............................................................................................. 546
Limiting the Source-Active Cache............................................................................................. 547
Clearing the Source-Active Cache.............................................................................................547
Enabling the Rejected Source-Active Cache.............................................................................547
Accept Source-Active Messages that Fail the RFP Check...............................................................547
Specifying Source-Active Messages.................................................................................................551
Limiting the Source-Active Messages from a Peer..........................................................................552
Preventing MSDP from Caching a Local Source............................................................................. 552
Preventing MSDP from Caching a Remote Source.........................................................................553
Preventing MSDP from Advertising a Local Source.........................................................................554
Logging Changes in Peership States................................................................................................555
Terminating a Peership.....................................................................................................................555
Clearing Peer Statistics..................................................................................................................... 555
Debugging MSDP..............................................................................................................................556
MSDP with Anycast RP......................................................................................................................556
Configuring Anycast RP....................................................................................................................558
Reducing Source-Active Message Flooding..............................................................................558
Specifying the RP Address Used in SA Messages.......................................................................558
MSDP Sample Configurations...........................................................................................................561
32 Multiple Spanning Tree Protocol (MSTP).................................................... 564
Protocol Overview............................................................................................................................564
Spanning Tree Variations..................................................................................................................565
Implementation Information............................................................................................................565
Configure Multiple Spanning Tree Protocol....................................................................................565
Related Configuration Tasks.......................................................................................................565
Enable Multiple Spanning Tree Globally..........................................................................................566
Creating Multiple Spanning Tree Instances.....................................................................................566
Influencing MSTP Root Selection.....................................................................................................567
Interoperate with Non-Dell Networking OS Bridges...................................................................... 568
Changing the Region Name or Revision......................................................................................... 568
Modifying Global Parameters...........................................................................................................569
Enable BPDU Filtering Globally.........................................................................................................571
Modifying the Interface Parameters................................................................................................. 571
Configuring an EdgePort.................................................................................................................. 572
Flush MAC Addresses after a Topology Change..............................................................................573
MSTP Sample Configurations........................................................................................................... 573
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration.............................................................574
Debugging and Verifying MSTP Configurations.............................................................................. 577
33 Multicast Features..............................................................................................579
Enabling IP Multicast.........................................................................................................................579
Multicast with ECMP......................................................................................................................... 579
Implementation Information............................................................................................................580
First Packet Forwarding for Lossless Multicast................................................................................ 581
Multicast Policies...............................................................................................................................581
IPv4 Multicast Policies.......................................................................................................................581
Limiting the Number of Multicast Routes.................................................................................. 581
Preventing a Host from Joining a Group...................................................................................582
Rate Limiting IGMP Join Requests............................................................................................. 585
Preventing a PIM Router from Forming an Adjacency..............................................................585
Preventing a Source from Registering with the RP................................................................... 585
Preventing a PIM Router from Processing a Join......................................................................588
34 Open Shortest Path First (OSPFv2 and OSPFv3)........................................589
Protocol Overview............................................................................................................................589
Autonomous System (AS) Areas................................................................................................. 589
Area Types...................................................................................................................................590
Networks and Neighbors............................................................................................................ 591
Router Types................................................................................................................................591
Link-State Advertisements (LSAs)............................................................................................... 593
Router Priority and Cost............................................................................................................. 594
OSPF with the Dell Networking OS..................................................................................................595
Graceful Restart.......................................................................................................................... 596
Fast Convergence (OSPFv2, IPv4 Only)......................................................................................597
Multi-Process OSPFv2 (IPv4 only).............................................................................................. 597
RFC-2328 Compliant OSPF Flooding........................................................................................ 598
OSPF ACK Packing......................................................................................................................599
Setting OSPF Adjacency with Cisco Routers............................................................................. 599
Configuration Information...............................................................................................................600
Configuration Task List for OSPFv2 (OSPF for IPv4)................................................................. 600
Troubleshooting OSPFv2............................................................................................................614
Configuration Task List for OSPFv3 (OSPF for IPv6)........................................................................ 617
Enabling IPv6 Unicast Routing....................................................................................................618
Assigning IPv6 Addresses on an Interface..................................................................................618
Assigning Area ID on an Interface.............................................................................................. 618
Assigning OSPFv3 Process ID and Router ID Globally...............................................................619
Configuring Stub Areas............................................................................................................... 619
Configuring Passive-Interface.................................................................................................... 619
Redistributing Routes................................................................................................................. 620
Configuring a Default Route...................................................................................................... 620
Enabling OSPFv3 Graceful Restart..............................................................................................621
Displaying Graceful Restart........................................................................................................ 622
OSPFv3 Authentication Using IPsec...........................................................................................623
35 Policy-based Routing (PBR)............................................................................ 632
Overview........................................................................................................................................... 632
Implementing Policy-based Routing with Dell Networking OS.....................................................634
Configuration Task List for Policy-based Routing.......................................................................... 634
PBR Exceptions (Permit)............................................................................................................. 637
/