PowerSwitch Z9100-ON

Dell PowerSwitch Z9100-ON Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch Z9100-ON Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Networking OS Conguration Guide for
the Z9100–ON System
9.14.1.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2018 - 11
Rev. A00
Contents
1 About this Guide...........................................................................................................................................37
Audience............................................................................................................................................................................37
Conventions...................................................................................................................................................................... 37
Related Documents..........................................................................................................................................................37
2 Conguration Fundamentals........................................................................................................................ 38
Accessing the Command Line........................................................................................................................................38
CLI Modes.........................................................................................................................................................................38
Navigating CLI Modes...............................................................................................................................................40
The do Command............................................................................................................................................................ 43
Undoing Commands........................................................................................................................................................ 43
Obtaining Help..................................................................................................................................................................44
Entering and Editing Commands....................................................................................................................................44
Command History............................................................................................................................................................45
Filtering show Command Outputs.................................................................................................................................45
Example of the grep Keyword..................................................................................................................................45
Multiple Users in Conguration Mode...........................................................................................................................46
Conguring alias command.............................................................................................................................................46
Viewing alias conguration........................................................................................................................................47
3 Getting Started............................................................................................................................................49
Console Access................................................................................................................................................................50
Serial Console.............................................................................................................................................................50
Micro USB-B Access..................................................................................................................................................51
Default Conguration...................................................................................................................................................... 52
Conguring a Host Name............................................................................................................................................... 52
Accessing the System Remotely....................................................................................................................................52
Accessing the System Remotely..............................................................................................................................52
Congure the Management Port IP Address......................................................................................................... 52
Congure a Management Route..............................................................................................................................53
Conguring a Username and Password.................................................................................................................. 53
Conguring the Enable Password..................................................................................................................................54
Conguration File Management.....................................................................................................................................54
Copy Files to and from the System......................................................................................................................... 54
Mounting an NFS File System..................................................................................................................................55
Save the Running-Conguration..............................................................................................................................57
Congure the Overload Bit for a Startup Scenario................................................................................................57
Viewing Files............................................................................................................................................................... 57
Managing the File System.............................................................................................................................................. 58
View Command History.................................................................................................................................................. 59
Upgrading Dell EMC Networking OS............................................................................................................................ 59
Using HTTP for File Transfers........................................................................................................................................ 59
Contents
3
Verify Software Images Before Installation...................................................................................................................60
4 Management................................................................................................................................................62
Conguring Privilege Levels............................................................................................................................................62
Creating a Custom Privilege Level...........................................................................................................................63
Removing a Command from EXEC Mode.............................................................................................................. 63
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................63
Allowing Access to CONFIGURATION Mode Commands....................................................................................63
Allowing Access to Dierent Modes........................................................................................................................63
Applying a Privilege Level to a Username...............................................................................................................65
Applying a Privilege Level to a Terminal Line.......................................................................................................... 65
Conguring Logging........................................................................................................................................................ 65
Audit and Security Logs............................................................................................................................................ 66
Conguring Logging Format ...................................................................................................................................67
Setting Up a Secure Connection to a Syslog Server.............................................................................................67
Log Messages in the Internal Buer..............................................................................................................................69
Conguration Task List for System Log Management..........................................................................................69
Disabling System Logging............................................................................................................................................... 69
Sending System Messages to a Syslog Server............................................................................................................69
Conguring a UNIX System as a Syslog Server.....................................................................................................69
Track Login Activity..........................................................................................................................................................70
Restrictions for Tracking Login Activity...................................................................................................................70
Conguring Login Activity Tracking......................................................................................................................... 70
Display Login Statistics...............................................................................................................................................71
Limit Concurrent Login Sessions....................................................................................................................................72
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................72
Conguring Concurrent Session Limit.....................................................................................................................72
Enabling the System to Clear Existing Sessions.................................................................................................... 73
Enabling Secured CLI Mode............................................................................................................................................74
Changing System Logging Settings............................................................................................................................... 74
Display the Logging Buer and the Logging Conguration........................................................................................75
Conguring a UNIX Logging Facility Level....................................................................................................................75
Synchronizing Log Messages......................................................................................................................................... 76
Enabling Timestamp on Syslog Messages.................................................................................................................... 77
File Transfer Services.......................................................................................................................................................77
Conguration Task List for File Transfer Services.................................................................................................. 77
Enabling the FTP Server........................................................................................................................................... 78
Conguring FTP Server Parameters........................................................................................................................78
Conguring FTP Client Parameters......................................................................................................................... 78
Terminal Lines................................................................................................................................................................... 79
Denying and Permitting Access to a Terminal Line................................................................................................79
Conguring Login Authentication for Terminal Lines.............................................................................................80
Setting Timeout for EXEC Privilege Mode....................................................................................................................81
Using Telnet to get to Another Network Device..........................................................................................................82
Lock CONFIGURATION Mode....................................................................................................................................... 82
Viewing the Conguration Lock Status...................................................................................................................82
4
Contents
Reloading the system...................................................................................................................................................... 83
Restoring the Factory Default Settings.........................................................................................................................84
Important Points to Remember................................................................................................................................84
Restoring Factory Default Environment Variables................................................................................................. 84
Viewing the Reason for Last System Reboot.............................................................................................................. 85
Disabling Syslog Messages for SNMP Authentication Failure Events...................................................................... 85
5 802.1X......................................................................................................................................................... 86
Port-Authentication Process..........................................................................................................................................88
EAP over RADIUS......................................................................................................................................................88
Conguring 802.1X...........................................................................................................................................................89
Related Conguration Tasks..................................................................................................................................... 89
Important Points to Remember......................................................................................................................................89
Enabling 802.1X................................................................................................................................................................ 90
Conguring dot1x Prole .................................................................................................................................................91
Conguring the Static MAB and MAB Prole .............................................................................................................92
Conguring Critical VLAN ..............................................................................................................................................92
Conguring MAC addresses for a do1x Prole.............................................................................................................93
Conguring Request Identity Re-Transmissions...........................................................................................................94
Conguring a Quiet Period after a Failed Authentication..................................................................................... 94
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 95
Re-Authenticating a Port................................................................................................................................................96
Conguring Timeouts...................................................................................................................................................... 97
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................98
Guest and Authentication-Fail VLANs.......................................................................................................................... 99
Conguring a Guest VLAN....................................................................................................................................... 99
Conguring an Authentication-Fail VLAN...............................................................................................................99
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)................................... 101
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................................................................101
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 102
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................102
Conguring ACL VLAN Groups.............................................................................................................................. 102
Conguring FP Blocks for VLAN Parameters....................................................................................................... 103
Viewing CAM Usage...................................................................................................................................................... 104
Allocating FP Blocks for VLAN Processes.................................................................................................................. 105
ACL Optimization to Increase Number of Supported IPv4 ACLs.............................................................................105
Restrictions for ACL Optimization..........................................................................................................................106
Optimizing ACL for More Number of IPv4 ACL Rules.........................................................................................106
7 Access Control Lists (ACLs)....................................................................................................................... 107
IP Access Control Lists (ACLs).....................................................................................................................................108
CAM Usage...............................................................................................................................................................109
Implementing ACLs on Dell EMC Networking OS................................................................................................ 110
Congure ACL Range Proles........................................................................................................................................111
Important Points to Remember..................................................................................................................................... 112
Contents
5
Conguration Task List for Route Maps.................................................................................................................112
Conguring Match Routes.......................................................................................................................................115
Conguring Set Conditions......................................................................................................................................116
Congure a Route Map for Route Redistribution..................................................................................................117
Congure a Route Map for Route Tagging............................................................................................................ 117
Continue Clause........................................................................................................................................................ 118
IP Fragment Handling..................................................................................................................................................... 118
IP Fragments ACL Examples................................................................................................................................... 118
Layer 4 ACL Rules Examples................................................................................................................................... 119
Congure a Standard IP ACL........................................................................................................................................120
Conguring a Standard IP ACL Filter......................................................................................................................121
Congure an Extended IP ACL......................................................................................................................................121
Conguring Filters with a Sequence Number....................................................................................................... 122
Conguring Filters Without a Sequence Number.................................................................................................124
Congure Layer 2 and Layer 3 ACLs............................................................................................................................125
Assign an IP ACL to an Interface..................................................................................................................................126
Applying an IP ACL.........................................................................................................................................................126
Counting ACL Hits.................................................................................................................................................... 127
Congure Ingress ACLs..................................................................................................................................................127
Congure Egress ACLs.................................................................................................................................................. 127
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 128
Conguring UDF ACL.................................................................................................................................................... 129
IP Prex Lists................................................................................................................................................................... 131
Implementation Information.................................................................................................................................... 132
Conguration Task List for Prex Lists.................................................................................................................. 132
ACL Remarks.................................................................................................................................................................. 135
Conguring a Remark.............................................................................................................................................. 135
Deleting a Remark.................................................................................................................................................... 136
ACL Resequencing......................................................................................................................................................... 137
Resequencing an ACL or Prex List....................................................................................................................... 137
Route Maps.....................................................................................................................................................................138
Implementation Information.................................................................................................................................... 138
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 140
How BFD Works............................................................................................................................................................. 140
BFD Packet Format.................................................................................................................................................. 141
BFD Sessions............................................................................................................................................................ 142
BFD Three-Way Handshake.................................................................................................................................... 143
Session State Changes............................................................................................................................................145
Important Points to Remember.................................................................................................................................... 145
Congure BFD................................................................................................................................................................ 145
Congure BFD for Physical Ports...........................................................................................................................146
Congure BFD for Static Routes............................................................................................................................147
Congure BFD for IPv6 Static Routes....................................................................................................................151
Congure BFD for OSPF.........................................................................................................................................153
Congure BFD for OSPFv3.....................................................................................................................................158
6
Contents
Congure BFD for IS-IS............................................................................................................................................161
Congure BFD for BGP........................................................................................................................................... 163
Congure BFD for VRRP..........................................................................................................................................171
Conguring Protocol Liveness................................................................................................................................ 173
9 Border Gateway Protocol (BGP).................................................................................................................174
BGP IP version 4 (BGPv4) Overview.......................................................................................................................... 174
BGP Autonomous Systems........................................................................................................................................... 175
AS4 Number Representation.................................................................................................................................. 176
Four-Byte AS Numbers............................................................................................................................................178
Multiprotocol BGP.......................................................................................................................................................... 178
Sessions and Peers.........................................................................................................................................................179
Establish a Session................................................................................................................................................... 179
BGP global and address family conguration..............................................................................................................180
BGP global conguration default values................................................................................................................180
BGP Attributes for selecting Best Path........................................................................................................................181
Best Path Selection Criteria.....................................................................................................................................181
Weight........................................................................................................................................................................183
Local Preference.......................................................................................................................................................183
Multi-Exit Discriminators (MEDs)...........................................................................................................................184
Origin..........................................................................................................................................................................185
AS Path......................................................................................................................................................................186
Next Hop................................................................................................................................................................... 186
Implement BGP with Dell EMC Networking OS.........................................................................................................186
Additional Path (Add-Path) Support......................................................................................................................186
Advertise IGP Cost as MED for Redistributed Routes.........................................................................................187
Ignore Router-ID in Best-Path Calculation.............................................................................................................187
AS Number Migration...............................................................................................................................................187
BGP4 Management Information Base (MIB)........................................................................................................188
Important Points to Remember.............................................................................................................................. 188
Conguration Information..............................................................................................................................................189
Basic BGP conguration tasks..................................................................................................................................... 190
Enabling BGP............................................................................................................................................................ 190
Conguring a BGP peer...........................................................................................................................................192
Conguring AS4 Number Representations........................................................................................................... 193
Conguring a BGP VRF address family.................................................................................................................195
Route-refresh and Soft-reconguration................................................................................................................196
Aggregating Routes..................................................................................................................................................199
Filtering BGP Routes...............................................................................................................................................200
Filtering BGP Routes Using Route Maps..............................................................................................................200
Filtering BGP Routes Using AS-PATH Information.............................................................................................. 201
Conguring Peer Groups........................................................................................................................................ 202
Conguring BGP Fast Fall-Over.............................................................................................................................210
Conguring Passive Peering.................................................................................................................................... 211
Maintaining Existing AS Numbers During an AS Migration................................................................................. 212
Allowing an AS Number to Appear in its Own AS Path....................................................................................... 213
Contents
7
Enabling Graceful Restart........................................................................................................................................214
Filtering on an AS-Path Attribute........................................................................................................................... 215
Regular Expressions as Filters.................................................................................................................................216
Redistributing Routes...............................................................................................................................................217
Redistributing iBGP Routes into IGP......................................................................................................................218
Enabling Additional Paths........................................................................................................................................ 221
Conguring IP Community Lists............................................................................................................................. 221
Conguring an IP Extended Community List....................................................................................................... 223
Filtering Routes with Community Lists................................................................................................................. 223
Manipulating the COMMUNITY Attribute............................................................................................................ 224
Changing MED Attributes.......................................................................................................................................226
Changing the LOCAL_PREFERENCE Attribute..................................................................................................226
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes.............227
Changing the WEIGHT Attribute........................................................................................................................... 227
Enabling Multipath...................................................................................................................................................228
Route Reectors...................................................................................................................................................... 228
Conguring BGP Confederations.......................................................................................................................... 230
Enabling Route Flap Dampening............................................................................................................................ 230
Changing BGP keepalive and hold timers.............................................................................................................232
Setting the extended timer.....................................................................................................................................233
Enabling or disabling BGP neighbors.....................................................................................................................234
Route Map Continue............................................................................................................................................... 235
Enabling MBGP Congurations................................................................................................................................... 236
MBGP support for IPv6................................................................................................................................................236
Conguring IPv6 MBGP between peers.................................................................................................................... 236
Example-Conguring IPv4 and IPv6 neighbors..........................................................................................................237
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor............................................... 239
BGP Regular Expression Optimization.........................................................................................................................241
Debugging BGP.............................................................................................................................................................. 241
Storing Last and Bad PDUs....................................................................................................................................242
Capturing PDUs....................................................................................................................................................... 243
PDU Counters.......................................................................................................................................................... 244
10 Content Addressable Memory (CAM).......................................................................................................245
CAM Allocation...............................................................................................................................................................245
Test CAM Usage............................................................................................................................................................ 247
View CAM-ACL Settings...............................................................................................................................................247
View CAM Usage...........................................................................................................................................................248
Conguring CAM Threshold and Silence Period........................................................................................................249
Setting CAM Threshold and Silence Period......................................................................................................... 249
CAM Optimization......................................................................................................................................................... 250
Troubleshoot CAM Proling..........................................................................................................................................250
QoS CAM Region Limitation.................................................................................................................................. 250
Syslog Error When the Table is Full........................................................................................................................ 251
Syslog Warning Upon 90 Percent Utilization of CAM..........................................................................................251
Syslog Warning for Discrepancies Between Congured Extended Prexes.....................................................251
8
Contents
Unied Forwarding Table (UFT) Modes...................................................................................................................... 251
Conguring UFT Modes..........................................................................................................................................252
IPv6 CAM ACL Region..................................................................................................................................................252
Important Points to Remember............................................................................................................................. 252
Convert the IPv6 ACL CAM to Double-Wide.......................................................................................................253
Sharing CAM space between IPv4 QoS and IPv6 ACLs.................................................................................... 253
11 Control Plane Policing (CoPP).................................................................................................................. 255
Congure Control Plane Policing................................................................................................................................. 256
Conguring CoPP for Protocols.............................................................................................................................257
Conguring CoPP for CPU Queues...................................................................................................................... 259
Protocol to CPU Queue Mapping..........................................................................................................................260
Conguring Protocol to CPU Queue Mapping.....................................................................................................260
Displaying CoPP Conguration ..............................................................................................................................261
12 Data Center Bridging (DCB).....................................................................................................................263
Ethernet Enhancements in Data Center Bridging..................................................................................................... 263
Priority-Based Flow Control................................................................................................................................... 264
Enhanced Transmission Selection..........................................................................................................................265
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................266
Data Center Bridging in a Trac Flow...................................................................................................................267
Buer Organization..................................................................................................................................................267
Enabling Data Center Bridging.....................................................................................................................................269
DCB Maps and its Attributes..................................................................................................................................270
Data Center Bridging: Default Conguration..............................................................................................................270
Conguring Priority-Based Flow Control..................................................................................................................... 271
Conguring Lossless Queues..................................................................................................................................272
Conguring PFC in a DCB Map....................................................................................................................................273
PFC Conguration Notes........................................................................................................................................273
PFC Prerequisites and Restrictions....................................................................................................................... 274
Applying a DCB Map on a Port.....................................................................................................................................274
Conguring PFC without a DCB Map.........................................................................................................................275
Conguring PFC Asymmetric.......................................................................................................................................275
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................276
Pause and Resume of Trac..................................................................................................................................276
Buer Sizes for Lossless or PFC Packets.............................................................................................................276
Shared headroom for lossless or PFC packets...........................................................................................................277
Example Scenario.....................................................................................................................................................277
Conguring Shared Head Room Buer.................................................................................................................279
Viewing Shared Head Room Usage.......................................................................................................................279
Monitoring Buer Statistics for Tracking Purposes.............................................................................................279
Behavior of Tagged Packets.........................................................................................................................................280
Conguration Example for DSCP and PFC Priorities................................................................................................280
SNMP Support for PFC and Buer Statistics Tracking............................................................................................ 281
Performing PFC Using DSCP Bits Instead of 802.1p Bits..........................................................................................281
PFC and ETS Conguration Examples........................................................................................................................282
Contents
9
Using PFC to Manage Converged Ethernet Trac...................................................................................................282
Operations on Untagged Packets................................................................................................................................282
Generation of PFC for a Priority for Untagged Packets...........................................................................................283
Congure Enhanced Transmission Selection..............................................................................................................283
Creating an ETS Priority Group..............................................................................................................................283
ETS Operation with DCBx...................................................................................................................................... 284
Conguring ETS in a DCB Map..............................................................................................................................285
Hierarchical Scheduling in ETS Output Policies......................................................................................................... 286
Using ETS to Manage Converged Ethernet Trac...................................................................................................286
Applying DCB Policies in a Switch Stack.................................................................................................................... 286
Congure a DCBx Operation........................................................................................................................................ 287
DCBx Operation....................................................................................................................................................... 287
DCBx Port Roles...................................................................................................................................................... 287
DCB Conguration Exchange................................................................................................................................ 289
Conguration Source Election................................................................................................................................289
Propagation of DCB Information........................................................................................................................... 290
Auto-Detection and Manual Conguration of the DCBx Version...................................................................... 290
DCBx Example......................................................................................................................................................... 290
DCBx Prerequisites and Restrictions..................................................................................................................... 291
Conguring DCBx.....................................................................................................................................................291
Verifying the DCB Conguration................................................................................................................................. 294
QoS dot1p Trac Classication and Queue Assignment..........................................................................................302
Conguring the Dynamic Buer Method................................................................................................................... 302
Sample DCB Conguration...........................................................................................................................................303
PFC and ETS Conguration Command Examples.............................................................................................. 305
13 Dynamic Host Conguration Protocol (DHCP).........................................................................................306
DHCP Packet Format and Options............................................................................................................................. 306
Assign an IP Address using DHCP...............................................................................................................................308
Implementation Information......................................................................................................................................... 309
Congure the System to be a DHCP Server............................................................................................................. 309
Conguring the Server for Automatic Address Allocation.................................................................................. 310
Specifying a Default Gateway..................................................................................................................................311
Congure a Method of Hostname Resolution.......................................................................................................311
Using DNS for Address Resolution..........................................................................................................................311
Using NetBIOS WINS for Address Resolution...................................................................................................... 312
Creating Manual Binding Entries.............................................................................................................................312
Debugging the DHCP Server..................................................................................................................................312
Using DHCP Clear Commands............................................................................................................................... 313
Congure the System to be a DHCP Client................................................................................................................313
Conguring the DHCP Client System....................................................................................................................313
DHCP Client on a Management Interface.............................................................................................................315
DHCP Client Operation with Other Features........................................................................................................315
DHCP Relay When DHCP Server and Client are in Dierent VRFs.........................................................................316
Conguring Route Leaking between VRFs on DHCP Relay Agent....................................................................316
Non-default VRF conguration for DHCPv6 helper address....................................................................................317
10
Contents
Conguring DHCP relay source interface....................................................................................................................318
Global DHCP relay source IPv4 or IPv6 conguration ........................................................................................318
Interface level DHCP relay source IPv4 or IPv6 conguration .......................................................................... 319
Congure Secure DHCP...............................................................................................................................................320
Option 82..................................................................................................................................................................320
DHCP Snooping........................................................................................................................................................321
Drop DHCP Packets on Snooped VLANs Only....................................................................................................325
Dynamic ARP Inspection.........................................................................................................................................326
Conguring Dynamic ARP Inspection................................................................................................................... 326
Source Address Validation............................................................................................................................................ 328
Enabling IP Source Address Validation..................................................................................................................328
DHCP MAC Source Address Validation................................................................................................................ 329
Enabling IP+MAC Source Address Validation.......................................................................................................329
Viewing the Number of SAV Dropped Packets................................................................................................... 330
Clearing the Number of SAV Dropped Packets...................................................................................................330
14 Equal Cost Multi-Path (ECMP).................................................................................................................331
ECMP for Flow-Based Anity......................................................................................................................................331
Conguring the Hash Algorithm............................................................................................................................. 331
Enabling Deterministic ECMP Next Hop............................................................................................................... 331
Conguring the Hash Algorithm Seed.................................................................................................................. 332
Link Bundle Monitoring................................................................................................................................................. 332
Managing ECMP Group Paths...............................................................................................................................333
Creating an ECMP Group Bundle..........................................................................................................................333
Modifying the ECMP Group Threshold.................................................................................................................333
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................334
Support for ECMP in host table............................................................................................................................ 335
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 335
15 FIP Snooping............................................................................................................................................336
Fibre Channel over Ethernet........................................................................................................................................ 336
Ensure Robustness in a Converged Ethernet Network............................................................................................336
FIP Snooping on Ethernet Bridges.............................................................................................................................. 338
Using FIP Snooping....................................................................................................................................................... 340
FIP Snooping Prerequisites.....................................................................................................................................340
Important Points to Remember............................................................................................................................. 340
Enabling the FCoE Transit Feature.........................................................................................................................341
Enable FIP Snooping on VLANs.............................................................................................................................342
Congure the FC-MAP Value................................................................................................................................ 342
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 342
Congure a Port for a Bridge-to-FCF Link...........................................................................................................342
Impact on Other Software Features..................................................................................................................... 342
FIP Snooping Restrictions...................................................................................................................................... 343
Conguring FIP Snooping.......................................................................................................................................343
Displaying FIP Snooping Information...........................................................................................................................344
FCoE Transit Conguration Example...........................................................................................................................349
Contents
11
16 Flex Hash and Optimized Boot-Up............................................................................................................ 351
Flex Hash Capability Overview..................................................................................................................................... 351
Conguring the Flex Hash Mechanism........................................................................................................................351
Conguring Fast Boot and LACP Fast Switchover...................................................................................................352
Optimizing the Boot Time.............................................................................................................................................352
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................352
Guidelines for Conguring Optimized Booting Mechanism................................................................................353
Interoperation of Applications with Fast Boot and System States..........................................................................354
LACP and IPv4 Routing.......................................................................................................................................... 354
LACP and IPv6 Routing..........................................................................................................................................354
BGP Graceful Restart............................................................................................................................................. 355
Cold Boot Caused by Power Cycling the System............................................................................................... 355
Unexpected Reload of the System........................................................................................................................355
Software Upgrade................................................................................................................................................... 355
LACP Fast Switchover............................................................................................................................................355
Changes to BGP Multipath.................................................................................................................................... 356
Delayed Installation of ECMP Routes Into BGP...................................................................................................356
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 356
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 357
17 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 358
Protocol Overview.........................................................................................................................................................358
Ring Status............................................................................................................................................................... 359
Multiple FRRP Rings............................................................................................................................................... 359
Important FRRP Points...........................................................................................................................................360
Important FRRP Concepts......................................................................................................................................361
Implementing FRRP.......................................................................................................................................................362
FRRP Conguration...................................................................................................................................................... 362
Creating the FRRP Group.......................................................................................................................................362
Conguring the Control VLAN...............................................................................................................................362
Conguring and Adding the Member VLANs.......................................................................................................364
Setting the FRRP Timers........................................................................................................................................365
Clearing the FRRP Counters..................................................................................................................................365
Viewing the FRRP Conguration...........................................................................................................................365
Viewing the FRRP Information.............................................................................................................................. 365
Troubleshooting FRRP.................................................................................................................................................. 366
Conguration Checks..............................................................................................................................................366
Sample Conguration and Topology............................................................................................................................366
FRRP Support on VLT...................................................................................................................................................367
Example Scenario.................................................................................................................................................... 368
Important Points to Remember............................................................................................................................. 369
18 GARP VLAN Registration Protocol (GVRP).............................................................................................. 370
Important Points to Remember....................................................................................................................................370
Congure GVRP............................................................................................................................................................. 371
12
Contents
Related Conguration Tasks....................................................................................................................................371
Enabling GVRP Globally................................................................................................................................................ 372
Enabling GVRP on a Layer 2 Interface........................................................................................................................ 372
Congure GVRP Registration.......................................................................................................................................372
Congure a GARP Timer...............................................................................................................................................373
19 Internet Group Management Protocol (IGMP)..........................................................................................374
IGMP Implementation Information...............................................................................................................................374
IGMP Protocol Overview.............................................................................................................................................. 374
IGMP Version 2.........................................................................................................................................................374
IGMP Version 3........................................................................................................................................................ 376
Congure IGMP............................................................................................................................................................. 379
Related Conguration Tasks................................................................................................................................... 379
Viewing IGMP Enabled Interfaces...............................................................................................................................380
Selecting an IGMP Version...........................................................................................................................................380
Viewing IGMP Groups....................................................................................................................................................381
Adjusting Timers............................................................................................................................................................. 381
Adjusting Query and Response Timers.................................................................................................................. 381
Enabling IGMP Immediate-Leave.................................................................................................................................382
IGMP Snooping..............................................................................................................................................................383
IGMP Snooping Implementation Information....................................................................................................... 383
Conguring IGMP Snooping...................................................................................................................................383
Removing a Group-Port Association..................................................................................................................... 384
Disabling Multicast Flooding...................................................................................................................................384
Specifying a Port as Connected to a Multicast Router...................................................................................... 384
Conguring the Switch as Querier........................................................................................................................ 385
Fast Convergence after MSTP Topology Changes...................................................................................................385
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................385
Protocol Separation.................................................................................................................................................386
Enabling and Disabling Management Egress Interface Selection...................................................................... 387
Handling of Management Route Conguration................................................................................................... 388
Handling of Switch-Initiated Trac....................................................................................................................... 388
Handling of Switch-Destined Trac......................................................................................................................389
Handling of Transit Trac (Trac Separation).................................................................................................... 390
Mapping of Management Applications and Trac Type.....................................................................................390
Behavior of Various Applications for Switch-Initiated Trac .............................................................................391
Behavior of Various Applications for Switch-Destined Trac ...........................................................................392
Interworking of EIS With Various Applications.....................................................................................................392
Designating a Multicast Router Interface................................................................................................................... 393
20 Interfaces................................................................................................................................................ 394
Basic Interface Conguration.......................................................................................................................................394
Advanced Interface Conguration...............................................................................................................................394
Interface Types...............................................................................................................................................................395
View Basic Interface Information.................................................................................................................................395
Resetting an Interface to its Factory Default State...................................................................................................397
Contents
13
Enabling a Physical Interface........................................................................................................................................398
Physical Interfaces.........................................................................................................................................................398
Conguration Task List for Physical Interfaces....................................................................................................398
Overview of Layer Modes...................................................................................................................................... 399
Conguring Layer 2 (Data Link) Mode..................................................................................................................399
Conguring Layer 2 (Interface) Mode.................................................................................................................. 399
Conguring Layer 3 (Network) Mode...................................................................................................................400
Conguring Layer 3 (Interface) Mode.................................................................................................................. 400
Automatic recovery of an Err-disabled interface........................................................................................................401
Conguring an automatic recovery for an Err-disabled interface......................................................................402
Egress Interface Selection (EIS)..................................................................................................................................402
Important Points to Remember............................................................................................................................. 402
Conguring EIS........................................................................................................................................................ 403
Management Interfaces................................................................................................................................................403
Conguring Management Interfaces.....................................................................................................................403
Conguring a Management Interface on an Ethernet Port............................................................................... 404
VLAN Interfaces............................................................................................................................................................ 404
Loopback Interfaces......................................................................................................................................................405
Null Interfaces................................................................................................................................................................ 406
Port Channel Interfaces................................................................................................................................................406
Port Channel Denition and Standards.................................................................................................................406
Port Channel Benets.............................................................................................................................................406
Port Channel Implementation................................................................................................................................ 406
Interfaces in Port Channels.................................................................................................................................... 407
Conguration Tasks for Port Channel Interfaces.................................................................................................407
Creating a Port Channel......................................................................................................................................... 408
Adding a Physical Interface to a Port Channel.....................................................................................................408
Reassigning an Interface to a New Port Channel.................................................................................................410
Conguring the Minimum Oper Up Links in a Port Channel............................................................................... 410
Adding or Removing a Port Channel from a VLAN...............................................................................................411
Assigning an IP Address to a Port Channel........................................................................................................... 412
Deleting or Disabling a Port Channel......................................................................................................................412
Load Balancing Through Port Channels................................................................................................................ 412
Load-Balancing Method...........................................................................................................................................413
Changing the Hash Algorithm.................................................................................................................................413
Bulk Conguration.......................................................................................................................................................... 414
Interface Range........................................................................................................................................................ 414
Bulk Conguration Examples.................................................................................................................................. 415
Dening Interface Range Macros.................................................................................................................................416
Dene the Interface Range..................................................................................................................................... 417
Choosing an Interface-Range Macro..................................................................................................................... 417
Monitoring and Maintaining Interfaces........................................................................................................................ 417
Maintenance Using TDR..........................................................................................................................................418
Non Dell-Qualied Transceivers....................................................................................................................................419
Splitting 100G Ports....................................................................................................................................................... 419
14
Contents
Link Dampening..............................................................................................................................................................420
Important Points to Remember.............................................................................................................................. 421
Conguration Example of Link Dampening........................................................................................................... 421
Enabling Link Dampening........................................................................................................................................423
Link Bundle Monitoring..................................................................................................................................................424
Using Ethernet Pause Frames for Flow Control........................................................................................................ 425
Enabling Pause Frames........................................................................................................................................... 425
Congure the MTU Size on an Interface....................................................................................................................426
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................ 427
Port-Pipes....................................................................................................................................................................... 427
CR4 Auto-Negotiation...................................................................................................................................................427
Setting the Speed of Ethernet Interfaces.................................................................................................................. 428
Syslog Warning Upon Connecting SFP28 Optics with QSA....................................................................................429
FEC Conguration......................................................................................................................................................... 429
View Advanced Interface Information..........................................................................................................................431
Conguring the Interface Sampling Size............................................................................................................... 431
Conguring the Trac Sampling Size Globally...........................................................................................................433
Dynamic Counters......................................................................................................................................................... 434
Clearing Interface Counters....................................................................................................................................434
Enhanced Validation of Interface Ranges...................................................................................................................435
Compressing Conguration Files................................................................................................................................. 435
OUI on 25G and 50G Interfaces.................................................................................................................................. 438
Conguring OUI on 25G and 50G Interfaces.......................................................................................................438
21 IPv4 Routing.............................................................................................................................................439
IP Addresses...................................................................................................................................................................440
Implementation Information....................................................................................................................................440
Conguration Tasks for IP Addresses..........................................................................................................................440
Assigning IP Addresses to an Interface.......................................................................................................................440
Conguring Static Routes............................................................................................................................................. 441
Congure Static Routes for the Management Interface.......................................................................................... 442
IPv4 Path MTU Discovery Overview.......................................................................................................................... 443
Packet handling during MTU mismatch................................................................................................................443
Using the Congured Source IP Address in ICMP Messages..................................................................................443
Conguring the ICMP Source Interface............................................................................................................... 443
Conguring the Duration to Establish a TCP Connection........................................................................................ 444
Enabling Directed Broadcast........................................................................................................................................ 444
Resolution of Host Names............................................................................................................................................445
Enabling Dynamic Resolution of Host Names............................................................................................................445
Specifying the Local System Domain and a List of Domains................................................................................... 445
Conguring DNS with Traceroute................................................................................................................................446
ARP..................................................................................................................................................................................447
Conguration Tasks for ARP........................................................................................................................................ 447
Conguring Static ARP Entries....................................................................................................................................447
Enabling Proxy ARP.......................................................................................................................................................448
Clearing ARP Cache......................................................................................................................................................448
Contents
15
ARP Learning via Gratuitous ARP................................................................................................................................448
Enabling ARP Learning via Gratuitous ARP................................................................................................................448
ARP Learning via ARP Request................................................................................................................................... 449
Conguring ARP Retries...............................................................................................................................................449
ICMP............................................................................................................................................................................... 450
Conguration Tasks for ICMP......................................................................................................................................450
Enabling ICMP Unreachable Messages...................................................................................................................... 450
UDP Helper..................................................................................................................................................................... 451
Congure UDP Helper............................................................................................................................................. 451
Important Points to Remember.............................................................................................................................. 451
Enabling UDP Helper......................................................................................................................................................451
Conguring a Broadcast Address................................................................................................................................. 451
Congurations Using UDP Helper............................................................................................................................... 452
UDP Helper with Broadcast-All Addresses.................................................................................................................452
UDP Helper with Subnet Broadcast Addresses.........................................................................................................453
UDP Helper with Congured Broadcast Addresses..................................................................................................453
UDP Helper with No Congured Broadcast Addresses............................................................................................454
Troubleshooting UDP Helper........................................................................................................................................454
22 IPv6 Routing............................................................................................................................................455
Protocol Overview.........................................................................................................................................................455
Extended Address Space........................................................................................................................................456
Stateless Autoconguration................................................................................................................................... 456
IPv6 Headers............................................................................................................................................................456
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support....................................................................457
IPv6 Header Fields...................................................................................................................................................458
Extension Header Fields......................................................................................................................................... 460
Addressing.................................................................................................................................................................461
Implementing IPv6 with Dell EMC Networking OS................................................................................................... 462
ICMPv6...........................................................................................................................................................................462
Path MTU discovery......................................................................................................................................................462
IPv6 Neighbor Discovery.............................................................................................................................................. 463
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................464
Conguring the IPv6 Recursive DNS Server....................................................................................................... 464
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................465
Displaying IPv6 RDNSS Information......................................................................................................................465
Secure Shell (SSH) Over an IPv6 Transport..............................................................................................................466
Conguration Tasks for IPv6........................................................................................................................................466
Adjusting Your CAM-Prole....................................................................................................................................466
Assigning an IPv6 Address to an Interface........................................................................................................... 467
Assigning a Static IPv6 Route................................................................................................................................468
Conguring Telnet with IPv6..................................................................................................................................468
SNMP over IPv6......................................................................................................................................................469
Displaying IPv6 Information....................................................................................................................................469
Displaying an IPv6 Interface Information.............................................................................................................. 469
Showing IPv6 Routes.............................................................................................................................................. 470
16
Contents
Showing the Running-Conguration for an Interface.......................................................................................... 471
Clearing IPv6 Routes............................................................................................................................................... 472
Conguring IPv6 RA Guard.......................................................................................................................................... 472
23 iSCSI Optimization...................................................................................................................................475
iSCSI Optimization Overview....................................................................................................................................... 475
Monitoring iSCSI Trac Flows............................................................................................................................... 477
Application of Quality of Service to iSCSI Trac Flows......................................................................................477
Information Monitored in iSCSI Trac Flows....................................................................................................... 477
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 478
Conguring Detection and Ports for Dell Compellent Arrays............................................................................. 478
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................479
Enable and Disable iSCSI Optimization................................................................................................................. 479
Default iSCSI Optimization Values...............................................................................................................................480
iSCSI Optimization Prerequisites................................................................................................................................. 480
Conguring iSCSI Optimization................................................................................................................................... 480
Displaying iSCSI Optimization Information..................................................................................................................482
24 Intermediate System to Intermediate System.......................................................................................... 484
IS-IS Protocol Overview................................................................................................................................................484
IS-IS Addressing.............................................................................................................................................................484
Multi-Topology IS-IS...................................................................................................................................................... 485
Transition Mode....................................................................................................................................................... 485
Interface Support.....................................................................................................................................................486
Adjacencies...............................................................................................................................................................486
Graceful Restart.............................................................................................................................................................486
Timers....................................................................................................................................................................... 486
Implementation Information..........................................................................................................................................486
Conguration Information............................................................................................................................................. 487
Conguration Tasks for IS-IS..................................................................................................................................488
Conguring the Distance of a Route.....................................................................................................................495
Changing the IS-Type.............................................................................................................................................. 496
Redistributing IPv4 Routes.....................................................................................................................................498
Redistributing IPv6 Routes.....................................................................................................................................499
Conguring Authentication Passwords.................................................................................................................500
Setting the Overload Bit.........................................................................................................................................500
Debugging IS-IS........................................................................................................................................................501
IS-IS Metric Styles.........................................................................................................................................................502
Congure Metric Values............................................................................................................................................... 502
Maximum Values in the Routing Table.................................................................................................................. 503
Change the IS-IS Metric Style in One Level Only................................................................................................503
Leaks from One Level to Another..........................................................................................................................504
Sample Congurations..................................................................................................................................................505
25 In-Service Software Upgrade.................................................................................................................. 508
ISSU Introduction.......................................................................................................................................................... 508
Contents
17
Warmboot Limitations.............................................................................................................................................508
Fastboot 2.0 (Zero Loss Upgrade).............................................................................................................................. 508
L2 ISSU...........................................................................................................................................................................509
L3 ISSU...........................................................................................................................................................................509
CoPP................................................................................................................................................................................510
Mirroring ow control packets......................................................................................................................................510
PFC.................................................................................................................................................................................. 510
QoS.................................................................................................................................................................................. 510
Tunnel Conguration...................................................................................................................................................... 510
26 Link Aggregation Control Protocol (LACP)............................................................................................... 512
Introduction to Dynamic LAGs and LACP................................................................................................................... 512
Important Points to Remember.............................................................................................................................. 512
LACP Modes.............................................................................................................................................................513
Conguring LACP Commands................................................................................................................................513
LACP Conguration Tasks.............................................................................................................................................514
Creating a LAG..........................................................................................................................................................514
Conguring the LAG Interfaces as Dynamic.........................................................................................................514
Setting the LACP Long Timeout............................................................................................................................ 515
Monitoring and Debugging LACP...........................................................................................................................515
Shared LAG State Tracking........................................................................................................................................... 516
Conguring Shared LAG State Tracking................................................................................................................516
Important Points about Shared LAG State Tracking............................................................................................518
LACP Basic Conguration Example............................................................................................................................. 518
Congure a LAG on ALPHA....................................................................................................................................518
27 Layer 2..................................................................................................................................................... 527
Manage the MAC Address Table..................................................................................................................................527
Clearing the MAC Address Table........................................................................................................................... 527
Setting the Aging Time for Dynamic Entries........................................................................................................ 527
Conguring a Static MAC Address........................................................................................................................528
Displaying the MAC Address Table........................................................................................................................ 528
MAC Learning Limit.......................................................................................................................................................528
Setting the MAC Learning Limit............................................................................................................................ 529
mac learning-limit Dynamic.................................................................................................................................... 529
mac learning-limit mac-address-sticky................................................................................................................. 529
mac learning-limit station-move............................................................................................................................ 530
mac learning-limit no-station-move...................................................................................................................... 530
Learning Limit Violation Actions.............................................................................................................................530
Setting Station Move Violation Actions.................................................................................................................531
Recovering from Learning Limit and Station Move Violations............................................................................531
Disabling MAC Address Learning on the System.......................................................................................................532
Enabling port security................................................................................................................................................... 532
NIC Teaming................................................................................................................................................................... 532
Congure Redundant Pairs...........................................................................................................................................533
Important Points about Conguring Redundant Pairs........................................................................................535
18
Contents
Far-End Failure Detection.............................................................................................................................................536
FEFD State Changes...............................................................................................................................................537
Conguring FEFD.................................................................................................................................................... 538
Enabling FEFD on an Interface.............................................................................................................................. 538
Debugging FEFD......................................................................................................................................................539
28 Link Layer Discovery Protocol (LLDP)......................................................................................................541
802.1AB (LLDP) Overview............................................................................................................................................ 541
Protocol Data Units.................................................................................................................................................. 541
Optional TLVs................................................................................................................................................................. 542
Management TLVs.................................................................................................................................................. 542
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 544
TIA Organizationally Specic TLVs........................................................................................................................ 544
Congure LLDP..............................................................................................................................................................547
Related Conguration Tasks................................................................................................................................... 547
Important Points to Remember............................................................................................................................. 548
LLDP Compatibility..................................................................................................................................................548
CONFIGURATION versus INTERFACE Congurations............................................................................................ 548
Enabling LLDP................................................................................................................................................................549
Disabling and Undoing LLDP..................................................................................................................................549
Enabling LLDP on Management Ports........................................................................................................................549
Disabling and Undoing LLDP on Management Ports..........................................................................................549
Advertising TLVs............................................................................................................................................................550
Storing and Viewing Unrecognized LLDP TLVs..........................................................................................................551
Reserved Unrecognized LLDP TLVs...................................................................................................................... 551
Organizational Specic Unrecognized LLDP TLVs...............................................................................................551
Viewing Unrecognized LLDP TLVs........................................................................................................................ 552
Viewing the LLDP Conguration................................................................................................................................. 552
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................552
Examples of Viewing Information Advertised by Neighbors.............................................................................. 553
Conguring LLDPDU Intervals.....................................................................................................................................554
Conguring LLDP Notication Interval.......................................................................................................................555
Conguring Transmit and Receive Mode................................................................................................................... 555
Conguring the Time to Live Value............................................................................................................................. 556
Debugging LLDP............................................................................................................................................................557
Relevant Management Objects................................................................................................................................... 558
29 Microsoft Network Load Balancing..........................................................................................................562
NLB Unicast Mode Scenario........................................................................................................................................562
NLB Multicast Mode Scenario.....................................................................................................................................562
Limitations of the NLB Feature....................................................................................................................................563
Microsoft Clustering......................................................................................................................................................563
Enable and Disable VLAN Flooding ............................................................................................................................ 563
Conguring a Switch for NLB .....................................................................................................................................563
Enabling a Switch for Multicast NLB.................................................................................................................... 564
Contents
19
30 Multicast Source Discovery Protocol (MSDP).........................................................................................565
Protocol Overview.........................................................................................................................................................565
Anycast RP.....................................................................................................................................................................566
Implementation Information..........................................................................................................................................567
Congure Multicast Source Discovery Protocol........................................................................................................ 567
Related Conguration Tasks................................................................................................................................... 567
Enable MSDP.................................................................................................................................................................. 571
Manage the Source-Active Cache.............................................................................................................................. 572
Viewing the Source-Active Cache.........................................................................................................................572
Limiting the Source-Active Cache......................................................................................................................... 572
Clearing the Source-Active Cache........................................................................................................................ 573
Enabling the Rejected Source-Active Cache....................................................................................................... 573
Accept Source-Active Messages that Fail the RFP Check......................................................................................573
Specifying Source-Active Messages...........................................................................................................................576
Limiting the Source-Active Messages from a Peer................................................................................................... 577
Preventing MSDP from Caching a Local Source....................................................................................................... 577
Preventing MSDP from Caching a Remote Source...................................................................................................578
Preventing MSDP from Advertising a Local Source..................................................................................................578
Logging Changes in Peership States...........................................................................................................................579
Terminating a Peership..................................................................................................................................................579
Clearing Peer Statistics.................................................................................................................................................580
Debugging MSDP..........................................................................................................................................................580
MSDP with Anycast RP.................................................................................................................................................581
Conguring Anycast RP................................................................................................................................................582
Reducing Source-Active Message Flooding.........................................................................................................583
Specifying the RP Address Used in SA Messages.............................................................................................. 583
MSDP Sample Congurations..................................................................................................................................... 585
31 Multiple Spanning Tree Protocol (MSTP)................................................................................................. 588
Protocol Overview.........................................................................................................................................................588
Spanning Tree Variations.............................................................................................................................................. 589
Implementation Information................................................................................................................................... 589
Congure Multiple Spanning Tree Protocol................................................................................................................589
Related Conguration Tasks...................................................................................................................................589
Enable Multiple Spanning Tree Globally...................................................................................................................... 590
Adding and Removing Interfaces.................................................................................................................................590
Creating Multiple Spanning Tree Instances................................................................................................................590
Inuencing MSTP Root Selection................................................................................................................................592
Interoperate with Non-Dell Bridges.............................................................................................................................592
Changing the Region Name or Revision..................................................................................................................... 593
Modifying Global Parameters....................................................................................................................................... 593
Modifying the Interface Parameters........................................................................................................................... 594
Conguring an EdgePort.............................................................................................................................................. 595
Flush MAC Addresses after a Topology Change....................................................................................................... 596
MSTP Sample Congurations......................................................................................................................................596
20
Contents
/