Force10 MXL Blade

Dell Force10 MXL Blade Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell Force10 MXL Blade Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Networking Conguration Guide for the MXL
10/40GbE Switch I/O Module
9.14.1.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2018 - 11
Rev. A00
Contents
1 About this Guide...........................................................................................................................................33
Audience............................................................................................................................................................................33
Conventions......................................................................................................................................................................33
Information Symbols........................................................................................................................................................33
Related Documents......................................................................................................................................................... 34
2 Conguration Fundamentals........................................................................................................................ 35
Accessing the Command Line........................................................................................................................................35
CLI Modes.........................................................................................................................................................................35
Navigating CLI Modes............................................................................................................................................... 36
The do Command............................................................................................................................................................ 39
Undoing Commands........................................................................................................................................................ 39
Obtaining Help..................................................................................................................................................................40
Entering and Editing Commands................................................................................................................................... 40
Command History.............................................................................................................................................................41
Filtering show Command Outputs..................................................................................................................................41
Multiple Users in Conguration Mode...........................................................................................................................42
3 Getting Started............................................................................................................................................44
Console Access................................................................................................................................................................45
Serial Console.............................................................................................................................................................45
External Serial Port with a USB Connector............................................................................................................47
Accessing the CLI Interface and Running Scripts Using SSH.................................................................................... 47
Entering CLI commands Using an SSH Connection..............................................................................................47
Executing Local CLI Scripts Using an SSH Connection........................................................................................47
Boot Process.................................................................................................................................................................... 48
Default Conguration...................................................................................................................................................... 49
Conguring a Host Name............................................................................................................................................... 49
Conguring a Unique Host Name on the System........................................................................................................50
Accessing the System Remotely................................................................................................................................... 50
Accessing the Switch Remotely.............................................................................................................................. 50
Congure the Management Port IP Address.........................................................................................................50
Congure a Management Route...............................................................................................................................51
Conguring a Username and Password...................................................................................................................51
Conguring the Enable Password..................................................................................................................................52
Conguration File Management.....................................................................................................................................52
Copy Files to and from the System......................................................................................................................... 53
Save the Running-Conguration..............................................................................................................................54
Viewing Files...............................................................................................................................................................55
Managing the File System.............................................................................................................................................. 56
View the Command History............................................................................................................................................57
Using HTTP for File Transfers........................................................................................................................................ 57
Contents
3
Upgrading and Downgrading the Dell Networking OS................................................................................................58
Verify Software Images Before Installation...................................................................................................................58
4 Management............................................................................................................................................... 60
Conguring Privilege Levels........................................................................................................................................... 60
Creating a Custom Privilege Level............................................................................................................................61
Customizing a Privilege Level....................................................................................................................................61
Applying a Privilege Level to a Username............................................................................................................... 63
Applying a Privilege Level to a Terminal Line.......................................................................................................... 63
Conguring Logging........................................................................................................................................................ 63
Audit and Security Logs............................................................................................................................................ 64
Conguring Logging Format ...................................................................................................................................65
Setting Up a Secure Connection to a Syslog Server.............................................................................................66
Display the Logging Buer and the Logging Conguration........................................................................................ 67
Log Messages in the Internal Buer..............................................................................................................................67
Conguration Task List for System Log Management..........................................................................................68
Disabling System Logging............................................................................................................................................... 68
Sending System Messages to a Syslog Server............................................................................................................68
Conguring a UNIX System as a Syslog Server.....................................................................................................68
Changing System Logging Settings.............................................................................................................................. 69
Display the Logging Buer and the Logging Conguration........................................................................................ 70
Conguring a UNIX Logging Facility Level....................................................................................................................70
Synchronizing Log Messages..........................................................................................................................................71
Enabling Timestamp on Syslog Messages.................................................................................................................... 72
Enabling Secure Management Mode.............................................................................................................................72
Enabling Secured CLI Mode............................................................................................................................................73
File Transfer Services.......................................................................................................................................................73
Conguration Task List for File Transfer Services..................................................................................................73
Enabling the FTP Server........................................................................................................................................... 73
Conguring FTP Server Parameters........................................................................................................................74
Conguring FTP Client Parameters......................................................................................................................... 74
Terminal Lines................................................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line................................................................................................75
Conguring Login Authentication for Terminal Lines............................................................................................. 75
Setting Time Out of EXEC Privilege Mode...................................................................................................................76
Using Telnet to get to Another Network Device.......................................................................................................... 77
Lock CONFIGURATION Mode....................................................................................................................................... 77
Viewing the Conguration Lock Status...................................................................................................................78
Limit Concurrent Login Sessions....................................................................................................................................78
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................78
Conguring Concurrent Session Limit.....................................................................................................................78
Enabling the System to Clear Existing Sessions.................................................................................................... 79
Track Login Activity......................................................................................................................................................... 80
Restrictions for Tracking Login Activity.................................................................................................................. 80
Conguring Login Activity Tracking......................................................................................................................... 80
Display Login Statistics..............................................................................................................................................80
4
Contents
Recovering from a Forgotten Password....................................................................................................................... 82
Recovering from a Forgotten Enable Password...........................................................................................................83
Recovering from a Failed Start.......................................................................................................................................83
Viewing the Reason for Last System Reboot...............................................................................................................84
5 802.1X......................................................................................................................................................... 85
The Port-Authentication Process.................................................................................................................................. 88
EAP over RADIUS......................................................................................................................................................89
Conguring 802.1X...........................................................................................................................................................89
Related Conguration Tasks..................................................................................................................................... 89
Important Points to Remember......................................................................................................................................90
Enabling 802.1X................................................................................................................................................................ 90
Conguring Request Identity Re-Transmissions......................................................................................................91
Conguring a Quiet Period after a Failed Authentication..................................................................................... 92
Conguring dot1x Prole ................................................................................................................................................93
Conguring MAC addresses for a do1x Prole.............................................................................................................93
Conguring the Static MAB and MAB Prole .............................................................................................................94
Conguring Critical VLAN ..............................................................................................................................................94
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 95
Re-Authenticating a Port................................................................................................................................................96
Conguring Timeouts...................................................................................................................................................... 97
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................98
Guest and Authentication-Fail VLANs.................................................................................................................... 99
Conguring a Guest VLAN......................................................................................................................................100
Conguring an Authentication-Fail VLAN............................................................................................................. 100
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 102
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 102
Guidelines for Conguring ACL VLAN groups............................................................................................................ 103
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................104
Conguring ACL VLAN Groups.............................................................................................................................. 104
Conguring FP Blocks for VLAN Parameters.......................................................................................................105
Viewing CAM Usage...................................................................................................................................................... 105
Allocating FP Blocks for VLAN Processes...................................................................................................................107
7 Access Control Lists (ACLs)....................................................................................................................... 108
IP Access Control Lists (ACLs).....................................................................................................................................109
Implementing ACL on the Dell Networking OS.......................................................................................................... 109
ACLs and VLANs.............................................................................................................................................................110
ACL Optimization............................................................................................................................................................ 110
Determine the Order in which ACLs are Used to Classify Trac..............................................................................110
Example of the order Keyword to Determine ACL Sequence............................................................................. 110
IP Fragment Handling...................................................................................................................................................... 111
IP Fragments ACL Examples.......................................................................................................................................... 111
Layer 4 ACL Rules Examples.......................................................................................................................................... 111
Congure a Standard IP ACL.........................................................................................................................................112
Contents
5
Conguring a Standard IP ACL Filter............................................................................................................................113
Congure an Extended IP ACL......................................................................................................................................114
Conguring Filters with a Sequence Number..............................................................................................................114
Conguring Filters Without a Sequence Number....................................................................................................... 114
Established Flag...............................................................................................................................................................115
Congure Layer 2 and Layer 3 ACLs............................................................................................................................ 115
Assign an IP ACL to an Interface...................................................................................................................................116
Applying an IP ACL..........................................................................................................................................................116
Counting ACL Hits...........................................................................................................................................................117
Congure Ingress ACLs.................................................................................................................................................. 117
Congure Egress ACLs...................................................................................................................................................117
Applying Egress Layer 3 ACLs (Control-Plane)...........................................................................................................118
IP Prex Lists...................................................................................................................................................................118
Implementation Information.....................................................................................................................................119
Conguration Task List for Prex Lists.........................................................................................................................119
Creating a Prex List...................................................................................................................................................... 119
Creating a Prex List Without a Sequence Number..................................................................................................120
Viewing Prex Lists.........................................................................................................................................................121
Applying a Prex List for Route Redistribution............................................................................................................121
Applying a Filter to a Prex List (OSPF)......................................................................................................................122
ACL Remarks.................................................................................................................................................................. 122
Conguring a Remark.............................................................................................................................................. 123
Deleting a Remark.................................................................................................................................................... 123
ACL Resequencing......................................................................................................................................................... 124
Resequencing an ACL or Prex List.............................................................................................................................124
Route Maps.....................................................................................................................................................................126
Implementation Information.................................................................................................................................... 126
Important Points to Remember.................................................................................................................................... 126
Conguration Task List for Route Maps...................................................................................................................... 126
Creating a Route Map....................................................................................................................................................126
Congure Route Map Filters......................................................................................................................................... 128
Conguring Match Routes............................................................................................................................................ 128
Conguring Set Conditions........................................................................................................................................... 129
Congure a Route Map for Route Redistribution.......................................................................................................130
Congure a Route Map for Route Tagging................................................................................................................. 130
Continue Clause...............................................................................................................................................................131
Logging of ACL Processes............................................................................................................................................. 131
Guidelines for Conguring ACL Logging......................................................................................................................132
Conguring ACL Logging...............................................................................................................................................132
Flow-Based Monitoring Support for ACLs.................................................................................................................. 133
Behavior of Flow-Based Monitoring.......................................................................................................................133
Enabling Flow-Based Monitoring..................................................................................................................................134
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 136
How BFD Works............................................................................................................................................................. 136
BFD Packet Format..................................................................................................................................................137
6
Contents
BFD Sessions............................................................................................................................................................ 138
BFD Three-Way Handshake.................................................................................................................................... 139
Session State Changes.............................................................................................................................................141
Important Points to Remember..................................................................................................................................... 141
Congure BFD................................................................................................................................................................. 141
Congure BFD for Physical Ports...........................................................................................................................142
Enabling BFD Globally.............................................................................................................................................. 142
Changing Physical Port Session Parameters........................................................................................................ 143
Disabling and Re-Enabling BFD...............................................................................................................................143
Congure BFD for Static Routes..................................................................................................................................144
Related Conguration Tasks....................................................................................................................................144
Establishing Sessions for Static Routes.................................................................................................................144
Establishing Static Route Sessions on Specic Neighbors................................................................................. 145
Changing Static Route Session Parameters......................................................................................................... 146
Disabling BFD for Static Routes............................................................................................................................. 146
Congure BFD for OSPF...............................................................................................................................................146
Related Conguration Tasks....................................................................................................................................147
Establishing Sessions with OSPF Neighbors.........................................................................................................147
Establishing Sessions with OSPF Neighbors for nondefault VRFs.................................................................... 148
Changing OSPF Session Parameters.....................................................................................................................149
Disabling BFD for OSPF...........................................................................................................................................149
Congure BFD for OSPFv3...........................................................................................................................................149
Related Conguration Tasks....................................................................................................................................150
Establishing Sessions with OSPFv3 Neighbors....................................................................................................150
Establishing BFD Sessions with OSPFv3 Neighbors for nondefault VRFs....................................................... 150
Changing OSPFv3 Session Parameters................................................................................................................. 151
Disabling BFD for OSPFv3...................................................................................................................................... 152
Congure BFD for BGP................................................................................................................................................. 152
Prerequisites..............................................................................................................................................................152
Establishing Sessions with BGP Neighbors...........................................................................................................152
Disabling BFD for BGP.............................................................................................................................................157
Use BFD in a BGP Peer Group................................................................................................................................157
Displaying BFD for BGP Information...................................................................................................................... 157
Congure BFD for VRRP............................................................................................................................................... 161
Related Conguration Tasks.................................................................................................................................... 161
Establishing Sessions with All VRRP Neighbors...................................................................................................162
Establishing VRRP Sessions on VRRP Neighbors................................................................................................162
Changing VRRP Session Parameters.....................................................................................................................163
Disabling BFD for VRRP.......................................................................................................................................... 163
Congure BFD for VLANs............................................................................................................................................. 164
Related Conguration Task......................................................................................................................................164
Establish Sessions with VLAN Neighbors............................................................................................................. 165
Changing VLAN Session Parameters.....................................................................................................................165
Disabling BFD for VLANs.........................................................................................................................................166
Congure BFD for Port-Channels................................................................................................................................166
Contents
7
Related Conguration Tasks....................................................................................................................................166
Establish Sessions on Port-Channels.....................................................................................................................167
Changing Physical Port Session Parameters.........................................................................................................167
Disabling BFD for Port-Channels............................................................................................................................168
Conguring Protocol Liveness...................................................................................................................................... 168
9 Border Gateway Protocol IPv4 (BGPv4).................................................................................................... 169
Autonomous Systems (AS)........................................................................................................................................... 169
Sessions and Peers......................................................................................................................................................... 171
Establish a Session....................................................................................................................................................171
Route Reectors.............................................................................................................................................................172
Communities..............................................................................................................................................................173
BGP Attributes................................................................................................................................................................173
Best Path Selection Criteria.................................................................................................................................... 173
Weight........................................................................................................................................................................175
Local Preference.......................................................................................................................................................175
Multi-Exit Discriminators (MEDs)...........................................................................................................................176
Origin.......................................................................................................................................................................... 177
AS Path...................................................................................................................................................................... 178
Next Hop................................................................................................................................................................... 178
Multiprotocol BGP.......................................................................................................................................................... 178
Implement BGP with the Dell Networking OS............................................................................................................ 179
Additional Path (Add-Path) Support......................................................................................................................179
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 179
Ignore Router-ID for Some Best-Path Calculations............................................................................................. 180
Four-Byte AS Numbers........................................................................................................................................... 180
AS4 Number Representation.................................................................................................................................. 180
AS Number Migration.............................................................................................................................................. 182
BGP4 Management Information Base (MIB)........................................................................................................183
Important Points to Remember.............................................................................................................................. 183
Conguration Information..............................................................................................................................................184
BGP Conguration......................................................................................................................................................... 184
Enabling BGP............................................................................................................................................................ 185
Enabling MBGP Congurations.............................................................................................................................. 216
BGP Regular Expression Optimization.........................................................................................................................218
Debugging BGP.............................................................................................................................................................. 218
Storing Last and Bad PDUs.....................................................................................................................................219
PDU Counters.......................................................................................................................................................... 220
Sample Congurations.................................................................................................................................................. 220
10 Content Addressable Memory (CAM).......................................................................................................229
CAM Allocation.............................................................................................................................................................. 229
Test CAM Usage............................................................................................................................................................230
View CAM-ACL Settings.............................................................................................................................................. 230
Conguring CAM Threshold and Silence Period.........................................................................................................231
Setting CAM Threshold and Silence Period.......................................................................................................... 231
8
Contents
CAM Optimization......................................................................................................................................................... 232
11 Control Plane Policing (CoPP).................................................................................................................. 233
Congure Control Plane Policing................................................................................................................................. 234
Conguring CoPP for Protocols............................................................................................................................ 235
Conguring CoPP for CPU Queues...................................................................................................................... 236
Show Commands.....................................................................................................................................................237
12 Data Center Bridging (DCB).....................................................................................................................239
Ethernet Enhancements in Data Center Bridging..................................................................................................... 239
Priority-Based Flow Control................................................................................................................................... 240
Enhanced Transmission Selection...........................................................................................................................241
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................242
Data Center Bridging in a Trac Flow...................................................................................................................243
Enabling Data Center Bridging..................................................................................................................................... 243
Conguring DCB Maps and its Attributes............................................................................................................ 244
Data Center Bridging: Default Conguration..............................................................................................................247
Interworking of DCB Map With DCB Buer Threshold Settings.............................................................................247
Conguring Priority-Based Flow Control.................................................................................................................... 248
Conguring Lossless Queues................................................................................................................................. 249
Conguring the PFC Buer in a Switch Stack.................................................................................................... 250
Priority-Based Flow Control Using Dynamic Buer Method............................................................................. 250
Congure Enhanced Transmission Selection..............................................................................................................252
ETS Prerequisites and Restrictions....................................................................................................................... 252
Creating an ETS Priority Group..............................................................................................................................252
ETS Operation with DCBx......................................................................................................................................253
Conguring Bandwidth Allocation for DCBx CIN................................................................................................ 254
Hierarchical Scheduling in ETS Output Policies...................................................................................................255
Applying DCB Policies with an ETS Conguration.................................................................................................... 255
PFC and ETS Conguration Examples....................................................................................................................... 255
Using PFC and ETS to Manage Data Center Trac...........................................................................................256
Using PFC and ETS to Manage Converged Ethernet Trac in a Switch Stack..............................................258
Applying DCB Policies in a Switch Stack....................................................................................................................258
Congure a DCBx Operation........................................................................................................................................258
DCBx Operation.......................................................................................................................................................258
DCBx Port Roles...................................................................................................................................................... 259
DCB Conguration Exchange................................................................................................................................ 260
Conguration Source Election............................................................................................................................... 260
Propagation of DCB Information............................................................................................................................ 261
Auto-Detection and Manual Conguration of the DCBx Version....................................................................... 261
DCBx Example..........................................................................................................................................................262
DCBx Prerequisites and Restrictions.....................................................................................................................263
Conguring DCBx....................................................................................................................................................263
Verifying the DCB Conguration................................................................................................................................. 266
QoS dot1p Trac Classication and Queue Assignment.......................................................................................... 274
Conguring the Dynamic Buer Method....................................................................................................................275
Contents
9
13 Debugging and Diagnostics.......................................................................................................................277
Oine Diagnostics......................................................................................................................................................... 277
Important Points to Remember..............................................................................................................................277
Running Oine Diagnostics....................................................................................................................................278
Trace Logs...................................................................................................................................................................... 280
Auto Save on Crash or Rollover.............................................................................................................................280
Using the Show Hardware Commands.......................................................................................................................280
Enabling Environmental Monitoring............................................................................................................................. 282
Recognize an Over-Temperature Condition..........................................................................................................283
Troubleshoot an Over-Temperature Condition..................................................................................................... 283
Recognize an Under-Voltage Condition................................................................................................................ 284
Troubleshoot an Under-Voltage Condition............................................................................................................284
Troubleshooting Packet Loss........................................................................................................................................285
Displaying Drop Counters........................................................................................................................................285
Dataplane Statistics.................................................................................................................................................286
Display Stack Port Statistics...................................................................................................................................287
Displaying Stack Member Counters...................................................................................................................... 288
Enabling Application Core Dumps................................................................................................................................289
Mini Core Dumps........................................................................................................................................................... 289
Enabling TCP Dumps.................................................................................................................................................... 290
Enabling Buer Statistics Tracking ..............................................................................................................................291
14 Dynamic Host Conguration Protocol (DHCP).........................................................................................293
DHCP Packet Format and Options............................................................................................................................. 293
Assign an IP Address using DHCP.........................................................................................................................295
Implementation Information......................................................................................................................................... 295
Congure the System to be a DHCP Server............................................................................................................. 296
Conguring the Server for Automatic Address Allocation..................................................................................296
Conguration Tasks................................................................................................................................................. 297
Specifying a Default Gateway................................................................................................................................ 298
Enabling the DHCP Server.....................................................................................................................................298
Congure a Method of Hostname Resolution..................................................................................................... 299
Creating Manual Binding Entries........................................................................................................................... 300
Debugging the DHCP Server.................................................................................................................................300
Using DHCP Clear Commands.............................................................................................................................. 300
Congure the System to be a Relay Agent.................................................................................................................301
Congure the System to be a DHCP Client............................................................................................................... 303
Conguring the DHCP Client System...................................................................................................................303
DHCP Client on a Management Interface............................................................................................................306
DHCP Client Operation with Other Features....................................................................................................... 307
Conguring DHCP relay source interface...................................................................................................................308
Global DHCP relay source IPv4 or IPv6 conguration .......................................................................................308
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................308
Congure Secure DHCP................................................................................................................................................310
Option 82...................................................................................................................................................................310
10
Contents
DHCP Snooping........................................................................................................................................................310
Conguring the DHCP secondary-subnet.............................................................................................................314
Drop DHCP Packets on Snooped VLANs Only.................................................................................................... 315
Dynamic ARP Inspection......................................................................................................................................... 315
Conguring Dynamic ARP Inspection....................................................................................................................316
Source Address Validation....................................................................................................................................... 317
15 Equal Cost Multi-Path (ECMP)................................................................................................................ 320
ECMP for Flow-Based Anity.....................................................................................................................................320
Enabling Deterministic ECMP Next Hop.............................................................................................................. 320
Link Bundle Monitoring................................................................................................................................................. 320
Managing ECMP Group Paths......................................................................................................................................321
RTAG7..............................................................................................................................................................................321
Flow-based Hashing for ECMP....................................................................................................................................322
16 FC FPORT................................................................................................................................................326
FC FPORT.......................................................................................................................................................................327
Conguring Switch Mode to FCF Port Mode............................................................................................................ 327
Name Server.................................................................................................................................................................. 328
FCoE Maps.....................................................................................................................................................................329
Creating an FCoE Map..................................................................................................................................................329
Zoning............................................................................................................................................................................. 330
Creating Zone and Adding Members........................................................................................................................... 331
Creating Zone Alias and Adding Members.................................................................................................................. 331
Creating Zonesets.......................................................................................................................................................... 331
Activating a Zoneset......................................................................................................................................................332
Displaying the Fabric Parameters................................................................................................................................ 332
17 FCoE Transit.............................................................................................................................................335
Supported Modes..........................................................................................................................................................335
Fibre Channel over Ethernet........................................................................................................................................ 335
Ensure Robustness in a Converged Ethernet Network............................................................................................335
FIP Snooping on Ethernet Bridges.............................................................................................................................. 337
FIP Snooping in a Switch Stack...................................................................................................................................338
Using FIP Snooping....................................................................................................................................................... 339
Important Points to Remember............................................................................................................................. 339
Enabling the FCoE Transit Feature........................................................................................................................339
Enable FIP Snooping on VLANs.............................................................................................................................339
Congure the FC-MAP Value................................................................................................................................ 340
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................340
Congure a Port for a Bridge-to-FCF Link...........................................................................................................340
Impact on Other Software Features..................................................................................................................... 340
FIP Snooping Prerequisites......................................................................................................................................341
FIP Snooping Restrictions....................................................................................................................................... 341
Conguring FIP Snooping........................................................................................................................................341
Displaying FIP Snooping Information...........................................................................................................................342
Contents
11
FCoE Transit Conguration Example...........................................................................................................................347
18 FIPS Cryptography...................................................................................................................................349
Preparing the System....................................................................................................................................................349
Enabling FIPS Mode...................................................................................................................................................... 349
Generating Host-Keys...................................................................................................................................................350
Monitoring FIPS Mode Status..................................................................................................................................... 350
Disabling FIPS Mode...................................................................................................................................................... 351
19 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 352
Protocol Overview......................................................................................................................................................... 352
Ring Status............................................................................................................................................................... 353
Multiple FRRP Rings............................................................................................................................................... 354
Important FRRP Points...........................................................................................................................................355
Important FRRP Concepts.....................................................................................................................................356
Implementing FRRP.......................................................................................................................................................357
FRRP Conguration.......................................................................................................................................................357
Creating the FRRP Group.......................................................................................................................................357
Conguring the Control VLAN............................................................................................................................... 357
Conguring and Adding the Member VLANs...................................................................................................... 359
Setting the FRRP Timers........................................................................................................................................360
Clearing the FRRP Counters..................................................................................................................................360
Viewing the FRRP Conguration...........................................................................................................................360
Viewing the FRRP Information.............................................................................................................................. 360
Troubleshooting FRRP................................................................................................................................................... 361
Conguration Checks.............................................................................................................................................. 361
Sample Conguration and Topology.............................................................................................................................361
FRRP Support on VLT...................................................................................................................................................363
Example Scenario.................................................................................................................................................... 364
Important Points to Remember............................................................................................................................. 365
20 GARP VLAN Registration Protocol (GVRP)............................................................................................. 366
Important Points to Remember................................................................................................................................... 366
Congure GVRP............................................................................................................................................................ 366
Related Conguration Tasks................................................................................................................................... 367
Enabling GVRP Globally................................................................................................................................................ 367
Enabling GVRP on a Layer 2 Interface........................................................................................................................368
Congure GVRP Registration...................................................................................................................................... 368
Congure a GARP Timer.............................................................................................................................................. 369
21 Internet Group Management Protocol (IGMP)..........................................................................................370
IGMP Protocol Overview.............................................................................................................................................. 370
IGMP Version 2........................................................................................................................................................ 370
IGMP Version 3........................................................................................................................................................ 372
IGMP Snooping.............................................................................................................................................................. 375
IGMP Snooping Implementation Information....................................................................................................... 375
12
Contents
Conguring IGMP Snooping...................................................................................................................................376
Enabling IGMP Immediate-Leave...........................................................................................................................376
Disabling Multicast Flooding................................................................................................................................... 377
Specifying a Port as Connected to a Multicast Router.......................................................................................377
Conguring the Switch as Querier.........................................................................................................................377
Fast Convergence after MSTP Topology Changes................................................................................................... 378
Designating a Multicast Router Interface................................................................................................................... 378
22 Interfaces.................................................................................................................................................379
Basic Interface Conguration....................................................................................................................................... 379
Advanced Interface Conguration...............................................................................................................................379
Interface Types...............................................................................................................................................................380
View Basic Interface Information.................................................................................................................................380
Conguring the Default Interface................................................................................................................................ 382
Enabling a Physical Interface........................................................................................................................................383
Physical Interfaces.........................................................................................................................................................383
Conguration Task List for Physical Interfaces....................................................................................................383
Overview of Layer Modes...................................................................................................................................... 384
Conguring Layer 2 (Data Link) Mode..................................................................................................................384
Conguring Layer 2 (Interface) Mode.................................................................................................................. 384
Conguring Layer 3 (Network) Mode...................................................................................................................385
Conguring Layer 3 (Interface) Mode.................................................................................................................. 385
Automatic recovery of an Err-disabled interface....................................................................................................... 386
Conguring an automatic recovery for an Err-disabled interface......................................................................387
Management Interfaces................................................................................................................................................ 387
Conguring Management Interfaces on the Switch........................................................................................... 388
VLAN Interfaces............................................................................................................................................................ 389
Loopback Interfaces......................................................................................................................................................390
Null Interfaces................................................................................................................................................................ 390
Port Channel Interfaces................................................................................................................................................390
Port Channel Denition and Standards..................................................................................................................391
Port Channel Benets..............................................................................................................................................391
Port Channel Implementation................................................................................................................................. 391
100/1000/10000 Mbps Interfaces in Port Channels...........................................................................................392
Conguration Tasks for Port Channel Interfaces.................................................................................................392
Creating a Port Channel..........................................................................................................................................392
Adding a Physical Interface to a Port Channel.....................................................................................................393
Reassigning an Interface to a New Port Channel................................................................................................394
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 395
Adding or Removing a Port Channel from a VLAN............................................................................................. 395
Assigning an IP Address to a Port Channel.......................................................................................................... 396
Deleting or Disabling a Port Channel.....................................................................................................................396
Load Balancing through Port Channels...................................................................................................................... 396
Changing the Hash Algorithm...................................................................................................................................... 397
Server Ports................................................................................................................................................................... 398
Default Conguration without Start-up Cong................................................................................................... 398
Contents
13
Bulk Conguration......................................................................................................................................................... 398
Interface Range........................................................................................................................................................398
Bulk Conguration Examples..................................................................................................................................399
Dening Interface Range Macros................................................................................................................................400
Dene the Interface Range..................................................................................................................................... 401
Choosing an Interface-Range Macro.....................................................................................................................401
Monitoring and Maintaining Interfaces........................................................................................................................ 401
Maintenance Using TDR......................................................................................................................................... 402
QSFP+ High-Power Optics Usage.............................................................................................................................. 403
High-Power Optics is Inserted and Peer Port has No OpticsHigh-Power Optics is Inserted and Peer
Port has High / Low Power OpticsLow-Power Optics is Inserted and Peer Port has High-Power Optics. 403
Splitting QSFP Ports to SFP+ Ports........................................................................................................................... 403
Merging SFP+ Ports to QSFP 40G Ports.............................................................................................................404
Congure the MTU Size on an Interface..............................................................................................................404
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................405
Important Points to Remember............................................................................................................................. 405
Example Scenarios.................................................................................................................................................. 405
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................406
Layer 2 Flow Control Using Ethernet Pause Frames................................................................................................ 406
Enabling Pause Frames........................................................................................................................................... 407
Congure MTU Size on an Interface...........................................................................................................................407
Port-Pipes.......................................................................................................................................................................408
Auto-Negotiation on Ethernet Interfaces...................................................................................................................408
Setting the Speed and Duplex Mode of Ethernet Interfaces.............................................................................408
View Advanced Interface Information..........................................................................................................................410
Conguring the Interface Sampling Size................................................................................................................ 411
Conguring the Trac Sampling Size Globally..................................................................................................... 412
Dynamic Counters.................................................................................................................................................... 413
Enhanced Control of Remote Fault Indication Processing........................................................................................414
Assigning a Front-end Port to a Management VRF...................................................................................................415
23 Internet Protocol Security (IPSec)........................................................................................................... 416
Conguring IPSec ..........................................................................................................................................................416
24 IPv4 Routing.............................................................................................................................................418
IP Addresses....................................................................................................................................................................418
Implementation Information.................................................................................................................................... 419
Conguration Tasks for IP Addresses.................................................................................................................... 419
IPv4 Path MTU Discovery Overview........................................................................................................................... 421
Packet handling during MTU mismatch ...............................................................................................................422
Using the Congured Source IP Address in ICMP Messages..................................................................................422
Conguring the ICMP Source Interface............................................................................................................... 422
Conguring the Duration to Establish a TCP Connection........................................................................................ 423
Enabling Directed Broadcast........................................................................................................................................ 423
Resolution of Host Names............................................................................................................................................423
Enabling Dynamic Resolution of Host Names......................................................................................................424
14
Contents
Specifying the Local System Domain and a List of Domains..............................................................................424
Conguring DNS with Traceroute..........................................................................................................................425
ARP................................................................................................................................................................................. 425
Conguration Tasks for ARP.................................................................................................................................. 426
ARP Learning via Gratuitous ARP................................................................................................................................427
ARP Learning via ARP Request....................................................................................................................................427
Conguring ARP Retries............................................................................................................................................... 428
ICMP............................................................................................................................................................................... 429
Conguration Tasks for ICMP................................................................................................................................ 429
UDP Helper.....................................................................................................................................................................429
Congure UDP Helper.............................................................................................................................................429
Important Points to Remember............................................................................................................................. 430
Enabling UDP Helper...............................................................................................................................................430
Congurations Using UDP Helper............................................................................................................................... 430
UDP Helper with Broadcast-All Addresses............................................................................................................431
UDP Helper with Subnet Broadcast Addresses....................................................................................................431
UDP Helper with Congured Broadcast Addresses............................................................................................432
UDP Helper with No Congured Broadcast Addresses......................................................................................432
Troubleshooting UDP Helper........................................................................................................................................ 433
25 IPv6 Addressing.......................................................................................................................................434
Protocol Overview......................................................................................................................................................... 434
Extended Address Space........................................................................................................................................435
Stateless Autoconguration................................................................................................................................... 435
IPv6 Header Fields.........................................................................................................................................................436
Version (4 bits).........................................................................................................................................................436
Trac Class (8 bits).................................................................................................................................................436
Flow Label (20 bits).................................................................................................................................................436
Payload Length (16 bits)......................................................................................................................................... 436
Next Header (8 bits)................................................................................................................................................437
Hop Limit (8 bits)..................................................................................................................................................... 437
Source Address (128 bits).......................................................................................................................................438
Destination Address (128 bits)............................................................................................................................... 438
Extension Header Fields................................................................................................................................................438
Hop-by-Hop Options Header................................................................................................................................. 438
Addressing...................................................................................................................................................................... 439
Link-local Addresses................................................................................................................................................439
Static and Dynamic Addressing............................................................................................................................. 439
Implementing IPv6 with the Dell Networking OS...................................................................................................... 440
ICMPv6............................................................................................................................................................................441
Path MTU Discovery..................................................................................................................................................... 442
IPv6 Neighbor Discovery.............................................................................................................................................. 442
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................443
Conguring the IPv6 Recursive DNS Server....................................................................................................... 443
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................444
Displaying IPv6 RDNSS Information......................................................................................................................444
Contents
15
IPv6 Multicast................................................................................................................................................................ 444
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 445
Conguration Task List for IPv6...................................................................................................................................445
Adjusting Your CAM-Prole....................................................................................................................................445
Assigning an IPv6 Address to an Interface...........................................................................................................446
Assigning a Static IPv6 Route................................................................................................................................446
Conguring Telnet with IPv6.................................................................................................................................. 447
SNMP over IPv6......................................................................................................................................................447
Showing IPv6 Information.......................................................................................................................................447
Showing an IPv6 Interface..................................................................................................................................... 448
Showing IPv6 Routes..............................................................................................................................................448
Showing the Running-Conguration for an Interface......................................................................................... 449
Clearing IPv6 Routes...............................................................................................................................................450
Disabling ND Entry Timeout...................................................................................................................................450
26 iSCSI Optimization................................................................................................................................... 451
iSCSI Optimization Overview........................................................................................................................................451
Monitoring iSCSI Trac Flows...............................................................................................................................453
Information Monitored in iSCSI Trac Flows.......................................................................................................453
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 453
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................454
iSCSI Optimization: Operation............................................................................................................................... 454
Default iSCSI Optimization Values.........................................................................................................................454
Displaying iSCSI Optimization Information................................................................................................................. 455
27 Intermediate System to Intermediate System...........................................................................................457
IS-IS Protocol Overview................................................................................................................................................457
IS-IS Addressing.............................................................................................................................................................457
Multi-Topology IS-IS...................................................................................................................................................... 458
Transition Mode....................................................................................................................................................... 458
Interface Support.....................................................................................................................................................459
Adjacencies...............................................................................................................................................................459
Graceful Restart............................................................................................................................................................ 459
Timers....................................................................................................................................................................... 459
Implementation Information......................................................................................................................................... 460
Conguration Information.............................................................................................................................................460
Conguration Tasks for IS-IS.................................................................................................................................. 461
IS-IS Metric Styles.........................................................................................................................................................475
Congure Metric Values................................................................................................................................................475
Maximum Values in the Routing Table...................................................................................................................475
Change the IS-IS Metric Style in One Level Only................................................................................................475
Leaks from One Level to Another.......................................................................................................................... 477
Sample Congurations.................................................................................................................................................. 478
28 Link Aggregation Control Protocol (LACP).............................................................................................. 482
Introduction to Dynamic LAGs and LACP...................................................................................................................482
16
Contents
Important Points to Remember..............................................................................................................................482
LACP Modes............................................................................................................................................................ 483
Conguring LACP Commands............................................................................................................................... 483
LACP Conguration Tasks............................................................................................................................................484
Creating a LAG.........................................................................................................................................................484
Conguring the LAG Interfaces as Dynamic........................................................................................................ 484
Setting the LACP Long Timeout........................................................................................................................... 485
Shared LAG State Tracking.......................................................................................................................................... 486
Conguring Shared LAG State Tracking.....................................................................................................................486
Important Points about Shared LAG State Tracking........................................................................................... 488
LACP Basic Conguration Example............................................................................................................................ 488
Congure a LAG on ALPHA................................................................................................................................... 488
LACP Fast Switchover..................................................................................................................................................496
Conguring LACP Fast Switchover...................................................................................................................... 496
29 Layer 2.....................................................................................................................................................498
Manage the MAC Address Table................................................................................................................................. 498
Clearing the MAC Address Table........................................................................................................................... 498
Setting the Aging Time for Dynamic Entries........................................................................................................498
Conguring a Static MAC Address........................................................................................................................499
Displaying the MAC Address Table........................................................................................................................499
MAC Learning Limit.......................................................................................................................................................499
Setting the MAC Learning Limit............................................................................................................................ 500
mac learning-limit Dynamic.................................................................................................................................... 500
mac learning-limit station-move............................................................................................................................ 500
Learning Limit Violation Actions.............................................................................................................................500
Setting Station Move Violation Actions.................................................................................................................501
Recovering from Learning Limit and Station Move Violations............................................................................501
Disabling MAC Address Learning on the System................................................................................................ 502
Enabling port security............................................................................................................................................. 502
NIC Teaming................................................................................................................................................................... 502
MAC Move Optimization........................................................................................................................................504
30 Link Layer Discovery Protocol (LLDP)..................................................................................................... 505
802.1AB (LLDP) Overview........................................................................................................................................... 505
Protocol Data Units................................................................................................................................................. 505
Optional TLVs.................................................................................................................................................................506
Management TLVs.................................................................................................................................................. 506
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 508
TIA Organizationally Specic TLVs........................................................................................................................508
Extended Power via MDI TLV................................................................................................................................. 512
Congure LLDP.............................................................................................................................................................. 512
Related Conguration Tasks....................................................................................................................................512
Important Points to Remember.............................................................................................................................. 513
LLDP Compatibility...................................................................................................................................................513
CONFIGURATION versus INTERFACE Congurations............................................................................................. 513
Contents
17
Enabling LLDP.................................................................................................................................................................514
Disabling and Undoing LLDP...................................................................................................................................514
Advertising TLVs.............................................................................................................................................................514
Viewing the LLDP Conguration.................................................................................................................................. 515
Viewing Information Advertised by Adjacent LLDP Agents...................................................................................... 516
Conguring LLDPDU Intervals...................................................................................................................................... 517
Conguring Transmit and Receive Mode.....................................................................................................................517
Conguring a Time to Live............................................................................................................................................ 518
Debugging LLDP.............................................................................................................................................................519
Relevant Management Objects................................................................................................................................... 520
31 Microsoft Network Load Balancing...........................................................................................................525
NLB Unicast Mode Scenario........................................................................................................................................525
NLB Multicast Mode Scenario.....................................................................................................................................525
Limitations With Enabling NLB on Switches.............................................................................................................. 526
Benets and Working of Microsoft Clustering...........................................................................................................526
Enable and Disable VLAN Flooding ............................................................................................................................ 526
Conguring a Switch for NLB .....................................................................................................................................526
Multicast NLB Mode............................................................................................................................................... 527
32 Multicast Source Discovery Protocol (MSDP)......................................................................................... 528
Protocol Overview......................................................................................................................................................... 528
Anycast RP.....................................................................................................................................................................530
Implementation Information.......................................................................................................................................... 531
Congure the Multicast Source Discovery Protocol..................................................................................................531
Related Conguration Tasks....................................................................................................................................531
Enabling MSDP..............................................................................................................................................................535
Manage the Source-Active Cache..............................................................................................................................536
Viewing the Source-Active Cache.........................................................................................................................536
Limiting the Source-Active Cache.........................................................................................................................536
Clearing the Source-Active Cache........................................................................................................................ 537
Enabling the Rejected Source-Active Cache....................................................................................................... 537
Accept Source-Active Messages that Fail the RFP Check......................................................................................537
Specifying Source-Active Messages........................................................................................................................... 541
Limiting the Source-Active Messages from a Peer...................................................................................................542
Preventing MSDP from Caching a Local Source.......................................................................................................542
Preventing MSDP from Caching a Remote Source.................................................................................................. 543
Preventing MSDP from Advertising a Local Source..................................................................................................543
Logging Changes in Peership States...........................................................................................................................544
Terminating a Peership..................................................................................................................................................544
Clearing Peer Statistics.................................................................................................................................................545
Debugging MSDP..........................................................................................................................................................545
MSDP with Anycast RP................................................................................................................................................546
Conguring Anycast RP................................................................................................................................................547
Reducing Source-Active Message Flooding.........................................................................................................548
Specifying the RP Address Used in SA Messages.............................................................................................. 548
18
Contents
MSDP Sample Congurations..................................................................................................................................... 550
33 Multiple Spanning Tree Protocol (MSTP)................................................................................................ 553
Protocol Overview.........................................................................................................................................................553
Spanning Tree Variations.............................................................................................................................................. 554
Implementation Information......................................................................................................................................... 554
Congure Multiple Spanning Tree Protocol................................................................................................................554
Related Conguration Tasks...................................................................................................................................554
Enable Multiple Spanning Tree Globally...................................................................................................................... 555
Creating Multiple Spanning Tree Instances................................................................................................................555
Inuencing MSTP Root Selection............................................................................................................................... 556
Interoperate with Non-Dell Networking OS Bridges................................................................................................. 557
Changing the Region Name or Revision..................................................................................................................... 557
Modifying Global Parameters....................................................................................................................................... 557
Enable BPDU Filtering Globally.................................................................................................................................... 559
Modifying the Interface Parameters........................................................................................................................... 559
Conguring an EdgePort.............................................................................................................................................. 560
Flush MAC Addresses after a Topology Change........................................................................................................561
MSTP Sample Congurations.......................................................................................................................................561
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................562
Debugging and Verifying MSTP Congurations........................................................................................................ 564
34 Multicast Features................................................................................................................................... 567
Enabling IP Multicast.....................................................................................................................................................567
Implementation Information..........................................................................................................................................567
First Packet Forwarding for Lossless Multicast.........................................................................................................568
Multicast Policies...........................................................................................................................................................568
IPv4 Multicast Policies..................................................................................................................................................568
Limiting the Number of Multicast Routes............................................................................................................ 568
Preventing a Host from Joining a Group.............................................................................................................. 569
Rate Limiting IGMP Join Requests.........................................................................................................................571
Preventing a PIM Router from Forming an Adjacency........................................................................................572
Preventing a Source from Registering with the RP............................................................................................ 572
Preventing a PIM Router from Processing a Join................................................................................................575
Understanding Multicast Traceroute (mtrace)...........................................................................................................575
Important Points to Remember..............................................................................................................................576
Printing Multicast Traceroute (mtrace) Paths............................................................................................................576
Supported Error Codes................................................................................................................................................. 577
mtrace Scenarios........................................................................................................................................................... 578
35 Object Tracking....................................................................................................................................... 584
Object Tracking Overview............................................................................................................................................ 584
Track Layer 2 Interfaces......................................................................................................................................... 585
Track Layer 3 Interfaces......................................................................................................................................... 585
Track IPv4 and IPv6 Routes...................................................................................................................................585
Contents
19
Set Tracking Delays................................................................................................................................................. 585
VRRP Object Tracking............................................................................................................................................ 586
Object Tracking Conguration..................................................................................................................................... 586
Tracking a Layer 2 Interface...................................................................................................................................586
Tracking a Layer 3 Interface................................................................................................................................... 587
Track an IPv4/IPv6 Route...................................................................................................................................... 588
Conguring track reachability refresh interval..................................................................................................... 589
Displaying Tracked Objects...........................................................................................................................................590
36 Open Shortest Path First (OSPFv2 and OSPFv3)....................................................................................592
Protocol Overview.........................................................................................................................................................592
Autonomous System (AS) Areas........................................................................................................................... 592
Area Types................................................................................................................................................................ 593
Networks and Neighbors........................................................................................................................................594
Router Types............................................................................................................................................................ 594
Link-State Advertisements (LSAs)........................................................................................................................596
Router Priority and Cost......................................................................................................................................... 597
OSPF with the Dell Networking OS............................................................................................................................598
Graceful Restart...................................................................................................................................................... 599
Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................600
Processing SNMP and Sending SNMP Traps......................................................................................................600
OSPF ACK Packing................................................................................................................................................. 600
Setting OSPF Adjacency with Cisco Routers...................................................................................................... 600
Conguration Information............................................................................................................................................. 601
Conguration Task List for OSPFv2 (OSPF for IPv4).........................................................................................601
Troubleshooting OSPFv2.........................................................................................................................................612
OSPFv3 NSSA................................................................................................................................................................616
NSSA Options...........................................................................................................................................................616
Conguration Task List for OSPFv3 (OSPF for IPv6)............................................................................................... 616
Enabling IPv6 Unicast Routing................................................................................................................................617
Applying cost for OSPFv3....................................................................................................................................... 617
Assigning IPv6 Addresses on an Interface............................................................................................................ 618
Assigning Area ID on an Interface...........................................................................................................................618
Assigning OSPFv3 Process ID and Router ID Globally.........................................................................................618
Conguring Stub Areas............................................................................................................................................619
Conguring Passive-Interface................................................................................................................................ 619
Redistributing Routes..............................................................................................................................................620
Conguring a Default Route...................................................................................................................................620
Enabling OSPFv3 Graceful Restart....................................................................................................................... 620
Displaying Graceful Restart.....................................................................................................................................621
OSPFv3 Authentication Using IPsec.....................................................................................................................622
MIB Support for OSPFv3............................................................................................................................................. 630
Viewing the OSPFv3 MIB.......................................................................................................................................630
37 Policy-based Routing (PBR)..................................................................................................................... 631
Overview......................................................................................................................................................................... 631
20
Contents
/