Dell C1048P Port Extender User guide

Category
Software
Type
User guide
Dell Networking Configuration Guide
for the C9000 Series
Version 9.10(0.0)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how
to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other
marks and names mentioned herein may be trademarks of their respective companies.
2016 - 04
Rev. A00
Contents
1 About this Guide......................................................................................................................37
Audience.....................................................................................................................................37
Conventions...............................................................................................................................37
Related Documents................................................................................................................. 38
2 Configuration Fundamentals............................................................................................... 39
Accessing the Command Line...............................................................................................39
CLI Modes..................................................................................................................................40
Navigating CLI Modes........................................................................................................42
The do Command....................................................................................................................45
Undoing Commands...............................................................................................................46
Obtaining Help..........................................................................................................................46
Entering and Editing Commands.......................................................................................... 47
Command History....................................................................................................................48
Filtering show Command Outputs.......................................................................................48
Multiple Users in Configuration Mode.................................................................................50
3 Getting Started........................................................................................................................ 51
Console Access.........................................................................................................................51
Serial Console......................................................................................................................52
Mounting an NFS File System................................................................................................ 53
Important Points to Remember...................................................................................... 54
Default Configuration..............................................................................................................55
Configuring a Host Name.......................................................................................................55
Accessing the System Remotely........................................................................................... 55
Accessing the System Remotely..................................................................................... 55
Configure the Management Port IP Address................................................................56
Configure a Management Route.....................................................................................56
Configuring a Username and Password........................................................................ 56
Configuring the Enable Password.........................................................................................57
Manage Configuration Files....................................................................................................57
File Storage.......................................................................................................................... 58
Copy Files to and from the System................................................................................ 58
Save the Running-Configuration.................................................................................... 59
Configure the Overload Bit for a Startup Scenario..................................................... 60
Viewing Files........................................................................................................................60
Changes in Configuration Files........................................................................................61
Viewing Command History.................................................................................................... 62
Version 9.10(0.0)
3
Upgrading the Dell Networking OS......................................................................................62
4 Switch Management.............................................................................................................. 63
Configuring Privilege Levels...................................................................................................63
Creating a Custom Privilege Level..................................................................................63
Removing a Command from EXEC Mode.................................................................... 63
Moving a Command from EXEC Privilege Mode to EXEC Mode.............................64
Allowing Access to CONFIGURATION Mode Commands........................................ 64
Allowing Access to the Following Modes..................................................................... 64
Applying a Privilege Level to a Username..................................................................... 66
Applying a Privilege Level to a Terminal Line............................................................... 66
Configuring Logging................................................................................................................66
Audit and Security Logs.....................................................................................................67
Configuring Logging Format ......................................................................................... 69
Setting Up a Secure Connection to a Syslog Server...................................................69
Track Login Activity.................................................................................................................. 71
Restrictions for Tracking Login Activity..........................................................................71
Configuring Login Activity Tracking................................................................................71
Display Login Statistics...................................................................................................... 72
Limit Concurrent Login Sessions.......................................................................................... 74
Restrictions for Limiting the Number of Concurrent Sessions.................................74
Configuring Concurrent Session Limit...........................................................................74
Enabling the System to Clear Existing Sessions...........................................................74
Log Messages in the Internal Buffer..................................................................................... 75
Configuration Task List for System Log Management................................................75
Disabling System Logging.......................................................................................................76
Sending System Messages to a Syslog Server.................................................................... 76
Configuring a UNIX System as a Syslog Server.............................................................77
Display the Logging Buffer and the Logging Configuration............................................77
Changing System Logging Settings......................................................................................78
Configuring a UNIX Logging Facility Level..........................................................................79
Synchronizing Log Messages................................................................................................ 80
Enabling Timestamp on Syslog Messages..........................................................................80
File Transfer Services................................................................................................................81
Configuration Task List for File Transfer Services........................................................81
Enabling the FTP Server.....................................................................................................81
Configuring FTP Server Parameters............................................................................... 82
Configuring FTP Client Parameters................................................................................82
Terminal Lines...........................................................................................................................83
Denying and Permitting Access to a Terminal Line.................................................... 83
Configuring Login Authentication for Terminal Lines................................................84
Setting Time Out of EXEC Privilege Mode.......................................................................... 85
Version 9.10(0.0)
4
Using Telnet to Access Another Network Device............................................................. 85
Lock CONFIGURATION Mode...............................................................................................86
Viewing the Configuration Lock Status......................................................................... 86
Recovering from a Forgotten Password .............................................................................87
Ignoring the Startup Configuration and Booting from the Factory-Default
Configuration............................................................................................................................88
Recovering from a Failed Start.............................................................................................. 88
Restoring Factory-Default Settings...................................................................................... 89
Important Point to Remember........................................................................................ 89
Restoring Factory-Default Boot Environment Variables............................................90
Using Hashes to Verify Software Images Before Installation.......................................... 91
Verifying System Images on C9010 Components............................................................ 93
When System Images on C9010 Components Do Not Match................................ 93
Manually Resetting the System Image on a C9010 Component.............................94
Logging in to the Virtual Console of a C9010 Component...................................... 95
Booting the C9010 from an Image on a Network Server..........................................95
Configuring C9010 Components to Boot from the RPM CP Image.......................95
5 802.1X....................................................................................................................................... 97
The Port-Authentication Process......................................................................................... 99
EAP over RADIUS...............................................................................................................101
Configuring 802.1X.................................................................................................................101
Related Configuration Tasks...........................................................................................101
Important Points to Remember.......................................................................................... 102
Enabling 802.1X...................................................................................................................... 103
Configuring dot1x Profile .....................................................................................................105
Configuring MAC addresses for a do1x Profile................................................................106
Configuring the Static MAB and MAB Profile .................................................................. 106
Configuring Critical VLAN ....................................................................................................107
Configuring Request Identity Re-Transmissions.............................................................108
Configuring a Quiet Period after a Failed Authentication............................................. 109
Forcibly Authorizing or Unauthorizing a Port...................................................................110
Re-Authenticating a Port.......................................................................................................111
Configuring Dynamic VLAN Assignment with Port Authentication............................. 112
Guest and Authentication-Fail VLANs................................................................................ 113
Configuring a Guest VLAN.............................................................................................. 114
Configuring an Authentication-Fail VLAN................................................................... 115
Configuring Timeouts...................................................................................................... 116
Multi-Host Authentication.....................................................................................................117
Configuring Multi-Host AuthenticationConfiguring Single-Host
Authentication...................................................................................................................120
Multi-Supplicant Authentication..........................................................................................121
Version 9.10(0.0)
5
Configuring Multi-Supplicant AuthenticationRestricting Multi-Supplicant
Authentication................................................................................................................... 121
MAC Authentication Bypass................................................................................................. 122
MAB in Single-host and Multi-Host Mode.................................................................. 123
MAB in Multi-Supplicant Authentication Mode..........................................................123
Configuring MAC Authentication Bypass.................................................................... 124
Dynamic CoS with 802.1X.................................................................................................... 125
6 Access Control Lists (ACLs).................................................................................................127
IP Access Control Lists (ACLs)............................................................................................. 128
CAM Usage.........................................................................................................................128
User-Configurable CAM Allocation..............................................................................130
Allocating CAM for Ingress ACLs on the Port Extender........................................... 130
Allocating CAM for Egress ACLs on the Port Extender.............................................132
Implementing ACLs .........................................................................................................133
IP Fragment Handling............................................................................................................134
IP Fragments ACL Examples...........................................................................................135
Layer 4 ACL Rules Examples.......................................................................................... 135
Configure a Standard IP ACL............................................................................................... 136
Configuring a Standard IP ACL Filter............................................................................ 137
Configure an Extended IP ACL............................................................................................ 138
Configuring Filters with a Sequence Number............................................................ 138
Configuring Filters Without a Sequence Number..................................................... 140
Configure Layer 2 and Layer 3 ACLs...................................................................................141
Using ACL VLAN Groups....................................................................................................... 141
Guidelines for Configuring ACL VLAN Groups...........................................................142
Configuring an ACL VLAN Group..................................................................................142
Allocating ACL VLAN CAM..............................................................................................143
Applying an IP ACL to an Interface.....................................................................................144
Applying Ingress ACLs on the Port Extender.............................................................. 145
Applying Egress ACLs.......................................................................................................145
Applying Layer 3 Egress ACLs on Control-Plane Traffic..........................................146
Counting ACL Hits............................................................................................................ 147
IP Prefix Lists............................................................................................................................147
Implementation Information..........................................................................................148
Configuration Task List for Prefix Lists.........................................................................148
ACL Resequencing................................................................................................................. 152
Resequencing an ACL or Prefix List.............................................................................. 152
Route Maps..............................................................................................................................154
Implementation Information..........................................................................................154
Important Points to Remember.......................................................................................... 154
Configuration Task List for Route Maps.......................................................................155
Version 9.10(0.0)
6
Configuring Match Routes..............................................................................................157
Configuring Set Conditions............................................................................................159
Configure a Route Map for Route Redistribution......................................................160
Configure a Route Map for Route Tagging................................................................ 160
Continue Clause................................................................................................................161
Configuring a UDF ACL......................................................................................................... 161
Hot-Lock Behavior.................................................................................................................163
7 Bidirectional Forwarding Detection (BFD).......................................................................164
How BFD Works......................................................................................................................164
BFD Packet Format...........................................................................................................166
BFD Sessions......................................................................................................................168
BFD Three-Way Handshake...........................................................................................168
Session State Changes.....................................................................................................170
Important Points to Remember.......................................................................................... 170
Configure BFD......................................................................................................................... 171
Configure BFD for Static Routes....................................................................................171
Configure BFD for OSPF..................................................................................................173
Configure BFD for OSPFv3............................................................................................. 176
Configure BFD for IS-IS................................................................................................... 177
Configure BFD for BGP................................................................................................... 180
Configure BFD for VRRP..................................................................................................187
Configuring Protocol Liveness...................................................................................... 190
8 Border Gateway Protocol IPv4 (BGPv4)...........................................................................191
Autonomous Systems (AS)....................................................................................................191
Sessions and Peers.................................................................................................................194
Establish a Session............................................................................................................194
Route Reflectors..................................................................................................................... 195
Communities.....................................................................................................................196
BGP Attributes.........................................................................................................................196
Best Path Selection Criteria............................................................................................196
Weight.................................................................................................................................198
Local Preference...............................................................................................................199
Multi-Exit Discriminators (MEDs)...................................................................................199
Origin..................................................................................................................................200
AS Path................................................................................................................................201
Next Hop............................................................................................................................ 201
Multiprotocol BGP................................................................................................................. 202
Implement BGP .....................................................................................................................202
Additional Path (Add-Path) Support.............................................................................202
Advertise IGP Cost as MED for Redistributed Routes...............................................202
Version 9.10(0.0)
7
Ignore Router-ID for Some Best-Path Calculations.................................................203
Four-Byte AS Numbers................................................................................................... 203
AS4 Number Representation.........................................................................................204
AS Number Migration......................................................................................................206
BGP4 Management Information Base (MIB).............................................................. 208
Important Points to Remember....................................................................................208
Configuration Information...................................................................................................209
BGP Configuration.................................................................................................................209
Enabling BGP.....................................................................................................................210
Configuring AS4 Number Representations.................................................................214
Configuring Peer Groups................................................................................................216
Configuring BGP Fast Fail-Over.................................................................................... 218
Configuring Passive Peering.......................................................................................... 220
Maintaining Existing AS Numbers During an AS Migration...................................... 221
Allowing an AS Number to Appear in its Own AS Path............................................ 222
Enabling Neighbor Graceful Restart.............................................................................223
Filtering on an AS-Path Attribute.................................................................................. 224
Regular Expressions as Filters........................................................................................ 225
Redistributing Routes.......................................................................................................227
Enabling Additional Paths............................................................................................... 227
Configuring IP Community Lists...................................................................................228
Configuring an IP Extended Community List.............................................................229
Filtering Routes with Community Lists........................................................................230
Manipulating the COMMUNITY Attribute.................................................................... 231
Changing MED Attributes............................................................................................... 233
Changing the LOCAL_PREFERENCE Attribute.......................................................... 233
Changing the NEXT_HOP Attribute............................................................................. 234
Changing the WEIGHT Attribute...................................................................................234
Enabling Multipath........................................................................................................... 235
Filtering BGP Routes........................................................................................................235
Filtering BGP Routes Using Route Maps......................................................................237
Filtering BGP Routes Using AS-PATH Information....................................................237
Configuring BGP Route Reflectors...............................................................................238
Aggregating Routes......................................................................................................... 239
Configuring BGP Confederations.................................................................................239
Enabling Route Flap Dampening.................................................................................. 240
Changing BGP Timers.....................................................................................................243
Enabling BGP Neighbor Soft-Reconfiguration.......................................................... 243
Route Map Continue....................................................................................................... 245
Enabling MBGP Configurations...........................................................................................245
BGP Regular Expression Optimization.............................................................................. 246
Debugging BGP......................................................................................................................246
Version 9.10(0.0)
8
Storing Last and Bad PDUs.............................................................................................247
Capturing PDUs................................................................................................................248
PDU Counters...................................................................................................................250
Sample Configurations......................................................................................................... 250
9 Content Addressable Memory (CAM)...............................................................................260
CAM Allocation.......................................................................................................................260
Test CAM Usage..................................................................................................................... 262
View CAM-ACL Settings....................................................................................................... 262
View CAM Usage....................................................................................................................263
Return to the Default CAM Configuration........................................................................264
CAM Optimization................................................................................................................. 265
Applications for CAM Profiling............................................................................................ 265
LAG HashingLAG Hashing Based on Bidirectional Flow..........................................265
Unified Forwarding Table (UFT) Modes.............................................................................265
Configuring UFT Modes..................................................................................................266
10 Control Plane Policing (CoPP).........................................................................................268
CoPP Implementation.......................................................................................................... 268
Protocol-based Control Plane Policing...................................................................... 268
Queue-based Control Plane Policing..........................................................................269
CoPP Example.........................................................................................................................271
Configure Control Plane Policing.......................................................................................273
Configuring CoPP for Protocols................................................................................... 273
Examples of Configuring CoPP for Protocols............................................................274
Configuring CoPP for CPU Queues............................................................................. 275
Examples of Configuring CoPP for CPU Queues......................................................276
Displaying CoPP Configuration.....................................................................................276
Troubleshooting CoPP Operation......................................................................................281
Enabling CPU Traffic Statistics.......................................................................................281
Viewing CPU Traffic Statistics........................................................................................282
Troubleshooting CPU Packet Loss...............................................................................282
Viewing Per-Protocol CoPP Counters........................................................................ 284
Viewing Per-Queue CoPP Counters........................................................................... 288
11 Data Center Bridging (DCB)............................................................................................. 290
Enabling Data Center Bridging............................................................................................290
Ethernet Enhancements in Data Center Bridging........................................................... 291
Priority-Based Flow Control.......................................................................................... 292
Enhanced Transmission Selection................................................................................294
Data Center Bridging Exchange Protocol (DCBx).....................................................295
Data Center Bridging in a Traffic Flow........................................................................ 296
Version 9.10(0.0)
9
QoS dot1p Traffic Classification and Queue Assignment............................................. 296
SNMP Support for PFC and Buffer Statistics Tracking....................................................297
DCB Maps and its Attributes................................................................................................298
DCB Map: Configuration Procedure............................................................................298
Important Points to Remember.................................................................................... 299
Applying a DCB Map on a Port......................................................................................299
Configuring PFC without a DCB Map..........................................................................300
Configuring Lossless Queues........................................................................................ 301
Applying a DCB Map on a Line Card............................................................................302
Data Center Bridging: Default Configuration.................................................................. 302
Configuration Notes: PFC and ETS in a DCB Map..........................................................303
PFC Configuration Notes............................................................................................... 303
ETS Configuration Notes................................................................................................304
ETS Prerequisites and Restrictions............................................................................... 305
Priority-Group Configuration Notes............................................................................305
Configuring Priority-Based Flow Control.........................................................................306
Configuring Lossless Queues........................................................................................ 307
Configuring Enhanced Transmission Selection.............................................................. 308
Creating an ETS Priority Group.....................................................................................308
ETS Operation with DCBx.............................................................................................. 309
Configure a DCBx Operation...............................................................................................310
DCBx Operation................................................................................................................310
DCBx Port Roles............................................................................................................... 310
DCB Configuration Exchange........................................................................................312
Configuration Source Election...................................................................................... 313
Propagation of DCB Information.................................................................................. 313
Auto-Detection and Manual Configuration of the DCBx Version......................... 314
Behavior of Tagged Packets...........................................................................................314
Configuration Example for DSCP and PFC Priorities................................................ 315
DCBx Example...................................................................................................................316
DCBx Prerequisites and Restrictions.............................................................................317
Configuring DCBx.............................................................................................................317
Verifying the DCB Configuration.........................................................................................321
Performing PFC Using DSCP Bits Instead of 802.1p Bits...............................................332
PFC and ETS Configuration Examples...............................................................................333
Using PFC and ETS to Manage Data Center Traffic........................................................333
PFC and ETS Configuration Command Examples.................................................... 335
Using PFC and ETS to Manage Converged Ethernet Traffic...................................336
Hierarchical Scheduling in ETS Output Policies........................................................ 336
Priority-Based Flow Control Using Dynamic Buffer Method........................................337
Pause and Resume of Traffic......................................................................................... 337
Buffer Sizes for Lossless or PFC Packets..................................................................... 337
Version 9.10(0.0)
10
Configuring the Dynamic Buffer Method......................................................................... 338
12 Debugging and Diagnostics.............................................................................................340
Offline Diagnostics................................................................................................................ 340
Running Port Extender Offline Diagnostics on the Switch......................................341
Running Offline Diagnostics on a Standalone Switch..............................................348
TRACE Logs..............................................................................................................................371
Auto Save on Reload, Crash, or Rollover.....................................................................371
Uploading Trace Logs......................................................................................................371
Last Restart Reason................................................................................................................372
show hardware Commands.................................................................................................372
Environmental Monitoring....................................................................................................375
Displaying Port Extender Environment Information ................................................375
Display Power Supply Status..........................................................................................376
Display Fan Status.............................................................................................................377
Display Transceiver Type.................................................................................................377
Recognize an Over-Temperature Condition............................................................. 379
Troubleshoot an Over-Temperature Condition....................................................... 380
Troubleshooting Packet Loss.............................................................................................. 382
Displaying Drop Counters.............................................................................................. 383
Displaying Dataplane Statistics......................................................................................384
Displaying Line-Card Counters.....................................................................................386
Accessing Application Core Dumps...................................................................................387
Mini Core Dumps...................................................................................................................388
Full Kernel Core Dumps....................................................................................................... 388
Enabling TCP Dumps............................................................................................................ 389
Accessing Port Extender Core and Mini Core Dumps...................................................390
13 Dynamic Host Configuration Protocol (DHCP)............................................................ 391
DHCP Packet Format and Options.....................................................................................391
Assign an IP Address using DHCP...................................................................................... 393
Implementation Information...............................................................................................394
Configure the System to be a DHCP Server.....................................................................395
Configuring the Server for Automatic Address Allocation...................................... 396
Specifying a Default Gateway........................................................................................397
Configure a Method of Hostname Resolution...........................................................397
Using DNS for Address Resolution...............................................................................398
Using NetBIOS WINS for Address Resolution............................................................ 398
Creating Manual Binding Entries...................................................................................398
Debugging the DHCP Server.........................................................................................399
Using DHCP Clear Commands..................................................................................... 399
Configure the System to be a Relay Agent.......................................................................399
Version 9.10(0.0)
11
Configure the System to be a DHCP Client..................................................................... 401
DHCP Client on a Management Interface.................................................................. 401
DHCP Client Operation with Other Features.............................................................402
Configure Secure DHCP...................................................................................................... 403
Option 82...........................................................................................................................403
DHCP Snooping............................................................................................................... 404
Drop DHCP Packets on Snooped VLANs Only..........................................................406
Dynamic ARP Inspection................................................................................................ 407
Configuring Dynamic ARP Inspection.........................................................................408
Source Address Validation................................................................................................... 409
Enabling IP Source Address Validation........................................................................409
DHCP MAC Source Address Validation....................................................................... 410
Enabling IP+MAC Source Address Validation.............................................................410
Viewing the Number of SAV Dropped Packets...........................................................411
Clearing the Number of SAV Dropped Packets......................................................... 412
14 Equal Cost Multi-Path (ECMP)......................................................................................... 413
ECMP for Flow-Based Affinity..............................................................................................413
Enabling Deterministic ECMP Next Hop......................................................................413
Configuring the Hash Algorithm Seed......................................................................... 413
Link Bundle Monitoring...................................................................................................414
Managing ECMP Group Paths............................................................................................. 415
Creating an ECMP Group Bundle....................................................................................... 415
Modifying the ECMP Group Threshold..............................................................................416
BGP Multipath Operation with Link Bankwidth............................................................... 416
Dynamic Re-calculation of Link Bankwidth..................................................................... 419
Weighted ECMP for Static Routes...................................................................................... 419
ECMP Support in L3 Host and LPM Tables.......................................................................420
15 FCoE Transit.........................................................................................................................421
Fibre Channel over Ethernet................................................................................................ 421
Ensure Robustness in a Converged Ethernet Network..................................................421
FIP Snooping on Ethernet Bridges..................................................................................... 423
FIP Snooping in a Switch Stack...........................................................................................426
Using FIP Snooping............................................................................................................... 426
FIP Snooping Prerequisites............................................................................................ 426
Important Points to Remember.................................................................................... 427
Enabling the FCoE Transit Feature............................................................................... 427
Enable FIP Snooping on VLANs.....................................................................................428
Configure the FC-MAP Value........................................................................................ 428
Configure a Port for a Bridge-to-Bridge Link............................................................ 428
Configure a Port for a Bridge-to-FCF Link.................................................................428
Version 9.10(0.0)
12
Impact on Other Software Features.............................................................................429
FIP Snooping Restrictions.............................................................................................. 429
Configuring FIP Snooping....................................................................................................430
Displaying FIP Snooping Information.................................................................................431
FCoE Transit Configuration Example.................................................................................437
16 FIPS Cryptography.............................................................................................................439
Configuration Tasks...............................................................................................................439
Preparing the System............................................................................................................440
Enabling FIPS Mode...............................................................................................................440
Generating Host-Keys...........................................................................................................441
Monitoring FIPS Mode Status...............................................................................................441
Disabling FIPS Mode..............................................................................................................442
17 Flex Hash and Optimized Boot-Up................................................................................. 443
Flex Hash Capability Overview............................................................................................443
Configuring the Flex Hash Mechanism.............................................................................444
LACP Fast Switchover........................................................................................................... 444
Configuring LACP Fast Switchover.................................................................................... 445
LACP......................................................................................................................................... 445
LACP Fast Switchover......................................................................................................445
RDMA Over Converged Ethernet (RoCE) Overview....................................................... 445
Sample Configurations......................................................................................................... 447
..............................................................................................................................................447
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...........................................450
18 Force10 Resilient Ring Protocol (FRRP).........................................................................452
Protocol Overview.................................................................................................................452
Ring Status......................................................................................................................... 453
Multiple FRRP Rings.........................................................................................................454
Important FRRP Points....................................................................................................454
Implementing FRRP......................................................................................................... 455
Important FRRP Concepts..............................................................................................455
FRRP Configuration............................................................................................................... 456
Creating the FRRP Group............................................................................................... 457
Configuring the Control VLAN...................................................................................... 457
Configuring and Adding the Member VLANs.............................................................458
Setting the FRRP Timers................................................................................................. 459
Clearing the FRRP Counters..........................................................................................460
Viewing the FRRP Configuration.................................................................................. 460
Viewing the FRRP Information......................................................................................460
Troubleshooting FRRP.......................................................................................................... 461
Version 9.10(0.0)
13
Configuration Checks......................................................................................................461
Sample Configuration and Topology.................................................................................461
19 GARP VLAN Registration Protocol (GVRP)....................................................................463
Important Points to Remember..........................................................................................463
Configure GVRP..................................................................................................................... 464
Related Configuration Tasks..........................................................................................465
Enabling GVRP Globally........................................................................................................465
Enabling GVRP on a Layer 2 Interface...............................................................................465
Configure GVRP Registration..............................................................................................466
Configure a GARP Timer...................................................................................................... 466
20 High Availability (HA)........................................................................................................ 468
High Availability on Chassis................................................................................................. 468
High Availability in a PE Stack..............................................................................................469
Online Insertion and Removal............................................................................................ 469
RPM Online Insertion...................................................................................................... 469
Line Card Online Insertion............................................................................................. 469
Pre-configuring a Slot for a Line-Card Type..............................................................470
Replacing a Line Card..................................................................................................... 470
Hitless Behavior.......................................................................................................................471
Graceful Restart......................................................................................................................472
Software Resiliency................................................................................................................472
System Health Monitoring..............................................................................................472
Failure and Event Logging.............................................................................................. 472
Trace Log........................................................................................................................... 472
Core Dumps...................................................................................................................... 473
System Log........................................................................................................................ 473
Control Plane Redundancy..................................................................................................473
Control-Plane Failover....................................................................................................474
RPM Synchronization...................................................................................................... 475
Forcing an RPM Failover................................................................................................. 475
Specifying an Auto-Failover Limit.................................................................................475
Disabling Auto-Reboot................................................................................................... 476
21 Internet Group Management Protocol (IGMP)............................................................. 477
IGMP Implementation Information.................................................................................... 477
IGMP Protocol Overview......................................................................................................478
IGMP Version 2................................................................................................................. 478
IGMP Version 3................................................................................................................. 479
Configure IGMP......................................................................................................................483
Related Configuration Tasks..........................................................................................483
Version 9.10(0.0)
14
Viewing IGMP Enabled Interfaces...................................................................................... 483
Selecting an IGMP Version...................................................................................................484
Viewing IGMP Groups...........................................................................................................484
Enabling IGMP Immediate-Leave.......................................................................................485
IGMP Snooping...................................................................................................................... 485
IGMP Snooping Implementation Information........................................................... 485
Configuring IGMP Snooping......................................................................................... 486
Removing a Group-Port Association...........................................................................486
Disabling Multicast Flooding..........................................................................................487
Specifying a Port as Connected to a Multicast Router............................................ 487
Configuring the Switch as Querier...............................................................................487
Fast Convergence after MSTP Topology Changes.........................................................488
Designating a Multicast Router Interface......................................................................... 489
22 Interfaces.............................................................................................................................490
Basic Interface Configuration............................................................................................. 490
Advanced Interface Configuration.....................................................................................490
Port Numbering......................................................................................................................492
Interface Types....................................................................................................................... 495
View Basic Interface Information....................................................................................... 495
Resetting an Interface to its Factory Default State......................................................... 502
Enabling a Physical Interface...............................................................................................503
Physical Interfaces................................................................................................................. 503
Port Pipes...........................................................................................................................503
Setting the Speed and Duplex Mode of Ethernet Interfaces.................................. 504
Configuration Task List for Physical Interfaces..........................................................505
Overview of Layer Modes...............................................................................................505
Configuring Layer 2 (Data Link) Mode.........................................................................506
Configuring Layer 2 (Interface) Mode..........................................................................506
Configuring Layer 3 (Network) Mode.......................................................................... 506
Configuring Layer 3 (Interface) Mode..........................................................................507
Egress Interface Selection (EIS)...........................................................................................508
Important Points to Remember....................................................................................508
Configuring EIS.................................................................................................................508
Management Interfaces........................................................................................................509
Configuring a Dedicated Management Interface .................................................... 509
Configuring a Management Interface on an Ethernet Port.....................................510
Port Extender Interfaces........................................................................................................511
VLAN Interfaces.......................................................................................................................512
Loopback Interfaces.............................................................................................................. 513
Null Interfaces......................................................................................................................... 513
Port Channel Interfaces........................................................................................................ 514
Version 9.10(0.0)
15
Port Channel Definition and Standards....................................................................... 514
Port Channel Benefits......................................................................................................514
Port Channel Implementation....................................................................................... 514
10/40 Gbps Interfaces in Port Channels......................................................................515
Configuration Tasks for Port Channel Interfaces...................................................... 515
Creating a Port Channel..................................................................................................516
Adding a Physical Interface to a Port Channel...........................................................516
Reassigning an Interface to a New Port Channel......................................................518
Configuring the Minimum Oper Up Links in a Port Channel.................................. 519
Adding or Removing a Port Channel from a VLAN...................................................520
Assigning an IP Address to a Port Channel.................................................................520
Deleting or Disabling a Port Channel...........................................................................521
Load Balancing Through Port Channels......................................................................521
Changing the Hash Algorithm....................................................................................... 521
Bulk Configuration.................................................................................................................522
Interface Range.................................................................................................................522
Bulk Configuration Examples.........................................................................................523
Defining Interface Range Macros....................................................................................... 524
Define the Interface Range............................................................................................ 525
Choosing an Interface-Range Macro.......................................................................... 525
Monitoring and Maintaining Interfaces..............................................................................525
Maintenance Using TDR................................................................................................. 526
Displaying Traffic Statistics on HiGig Ports.......................................................................527
Link Bundle Monitoring.........................................................................................................528
Monitoring HiGig Link Bundles........................................................................................... 529
Guidelines for Monitoring HiGig Link-Bundles .........................................................530
Enabling HiGig Link-Bundle Monitoring......................................................................531
Non Dell-Qualified Transceivers.........................................................................................531
Splitting QSFP Ports to SFP+ Ports.....................................................................................532
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port.................................... 533
Configuring wavelength for 10–Gigabit SFP+ optics.................................................... 534
Link Dampening......................................................................................................................535
Important Points to Remember.................................................................................... 535
Enabling Link Dampening...............................................................................................535
Using Ethernet Pause Frames for Flow Control...............................................................537
Threshold Settings........................................................................................................... 538
Enabling Pause Frames................................................................................................... 539
Configure the MTU Size on an Interface.......................................................................... 539
Auto-Negotiation on Ethernet Interfaces.........................................................................540
Set Auto-Negotiation Options.......................................................................................541
View Advanced Interface Information............................................................................... 541
Configuring the Interface Sampling Size.................................................................... 542
Version 9.10(0.0)
16
Dynamic Counters.................................................................................................................543
Clearing Interface Counters.......................................................................................... 544
23 Internet Protocol Security (IPSec).................................................................................. 545
Configuring IPSec .................................................................................................................546
24 IPv4 Routing....................................................................................................................... 547
IP Addresses............................................................................................................................ 547
Implementation Information......................................................................................... 548
Configuration Tasks for IP Addresses................................................................................548
Assigning IP Addresses to an Interface..............................................................................548
Configuring Static Routes.................................................................................................... 549
Configure Static Routes for the Management Interface................................................551
Enabling Directed Broadcast................................................................................................551
Resolution of Host Names....................................................................................................551
Enabling Dynamic Resolution of Host Names.................................................................552
Specifying the Local System Domain and a List of Domains........................................552
Configuring DNS with Traceroute......................................................................................553
ARP............................................................................................................................................ 554
Configuration Tasks for ARP..........................................................................................554
Configuring Static ARP Entries...................................................................................... 554
Configuring ARP Inspection Trust................................................................................ 555
Configuring ARP Timeout...............................................................................................556
Enabling Proxy ARP..........................................................................................................556
Clearing ARP Cache.........................................................................................................556
ARP Learning via Gratuitous ARP.................................................................................. 557
Enabling ARP Learning via Gratuitous ARP................................................................. 557
ARP Learning via ARP Request...................................................................................... 558
Configuring ARP Retries..................................................................................................559
ICMP..........................................................................................................................................559
Configuration Tasks for ICMP........................................................................................559
Enabling ICMP Unreachable Messages....................................................................... 560
25 IPv6 Routing........................................................................................................................561
Protocol Overview................................................................................................................. 561
Extended Address Space.................................................................................................562
Stateless Autoconfiguration...........................................................................................562
IPv6 Headers..................................................................................................................... 563
IPv6 Header Fields............................................................................................................563
Extension Header Fields..................................................................................................565
IPv6 Addressing................................................................................................................ 566
IPv6 Implementation on the Dell Networking OS...........................................................567
Version 9.10(0.0)
17
Configuring the LPM Table for IPv6 Extended Prefixes.................................................569
ICMPv6..................................................................................................................................... 570
Path MTU Discovery.............................................................................................................. 570
IPv6 Neighbor Discovery.......................................................................................................571
IPv6 Neighbor Discovery of MTU Packets.................................................................. 572
Configuring the IPv6 Recursive DNS Server............................................................... 572
Secure Shell (SSH) Over an IPv6 Transport.......................................................................574
Configuration Tasks for IPv6................................................................................................575
Adjusting Your CAM Profile............................................................................................ 575
Assigning an IPv6 Address to an Interface.................................................................. 576
Assigning a Static IPv6 Route.........................................................................................576
Configuring Telnet with IPv6......................................................................................... 577
SNMP over IPv6.................................................................................................................577
Displaying IPv6 Information...........................................................................................578
Displaying an IPv6 Configuration..................................................................................578
Displaying IPv6 Routes....................................................................................................579
Displaying the Running Configuration for an Interface...........................................580
Clearing IPv6 Routes........................................................................................................581
26 Intermediate System to Intermediate System..............................................................582
IS-IS Protocol Overview....................................................................................................... 582
IS-IS Addressing......................................................................................................................583
Multi-Topology IS-IS.............................................................................................................583
Transition Mode................................................................................................................584
Interface Support............................................................................................................. 584
Adjacencies........................................................................................................................584
Graceful Restart......................................................................................................................585
Timers................................................................................................................................. 585
Implementation Information............................................................................................... 585
Configuration Information...................................................................................................586
Configuration Tasks for IS-IS.........................................................................................587
Configuring the Distance of a Route........................................................................... 596
Changing the IS-Type..................................................................................................... 596
Redistributing IPv4 Routes............................................................................................. 599
Redistributing IPv6 Routes.............................................................................................600
Configuring Authentication Passwords.......................................................................601
Setting the Overload Bit..................................................................................................601
Debugging IS-IS............................................................................................................... 602
IS-IS Metric Styles.................................................................................................................. 603
Configure Metric Values.......................................................................................................603
Maximum Values in the Routing Table........................................................................604
Change the IS-IS Metric Style in One Level Only..................................................... 604
Version 9.10(0.0)
18
Leaks from One Level to Another................................................................................ 606
Sample Configurations......................................................................................................... 607
27 iSCSI Optimization.............................................................................................................610
iSCSI Optimization Overview...............................................................................................610
Default iSCSI Optimization Values......................................................................................613
iSCSI Optimization Prerequisites.........................................................................................613
Configuring iSCSI Optimization.......................................................................................... 613
Displaying iSCSI Optimization Information...................................................................... 616
Enable and Disable iSCSI Optimization..............................................................................617
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.......................... 618
Monitoring iSCSI Traffic Flows............................................................................................ 618
Information Monitored in iSCSI Traffic Flows.................................................................. 619
Detection and Auto-Configuration for Dell EqualLogic Arrays................................... 620
Configuring Detection and Ports for Dell Compellent Arrays..................................... 620
Application of Quality of Service to iSCSI Traffic Flows.................................................621
28 Link Aggregation Control Protocol (LACP)...................................................................622
Introduction to Dynamic LAGs and LACP........................................................................ 622
Important Points to Remember.................................................................................... 622
LACP Modes...................................................................................................................... 623
Configuring LACP Commands......................................................................................623
LACP Configuration Tasks................................................................................................... 624
Creating a LAG..................................................................................................................624
Configuring the LAG Interfaces as Dynamic.............................................................. 625
Setting the LACP Long Timeout....................................................................................625
Monitoring and Debugging LACP.................................................................................626
Shared LAG State Tracking...................................................................................................627
Configuring Shared LAG State Tracking......................................................................627
Important Points about Shared LAG State Tracking.................................................629
LACP Basic Configuration Example................................................................................... 629
Configure a LAG on ALPHA........................................................................................... 630
29 Layer 2..................................................................................................................................638
Manage the MAC Address Table.........................................................................................638
Clearing the MAC Address Table.................................................................................. 638
Setting the Aging Time for Dynamic Entries.............................................................. 638
Configuring a Static MAC Address................................................................................639
Displaying the MAC Address Table...............................................................................639
MAC Learning Limit............................................................................................................... 639
Setting the MAC Learning Limit.................................................................................... 640
mac learning-limit Dynamic..........................................................................................640
Version 9.10(0.0)
19
mac learning-limit mac-address-sticky...................................................................... 641
mac learning-limit station-move..................................................................................641
mac learning-limit no-station-move........................................................................... 641
Learning Limit Violation Actions................................................................................... 642
Setting Station Move Violation Actions....................................................................... 642
Recovering from Learning Limit and Station Move Violations...............................643
Disabling MAC Address Learning on the System...................................................... 643
NIC Teaming...........................................................................................................................644
Configure Redundant Pairs..................................................................................................645
Important Points about Configuring Redundant Pairs.............................................647
Far-End Failure Detection....................................................................................................649
FEFD State Changes........................................................................................................ 650
Configuring FEFD..............................................................................................................651
Enabling FEFD on an Interface...................................................................................... 652
Debugging FEFD...............................................................................................................653
30 Link Layer Discovery Protocol (LLDP)............................................................................654
802.1AB (LLDP) Overview.....................................................................................................654
Protocol Data Units......................................................................................................... 654
Optional TLVs..........................................................................................................................655
Management TLVs........................................................................................................... 656
TIA-1057 (LLDP-MED) Overview........................................................................................ 658
TIA Organizationally Specific TLVs...............................................................................658
Configure LLDP...................................................................................................................... 663
Related Configuration Tasks..........................................................................................663
Important Points to Remember.................................................................................... 663
LLDP Compatibility.......................................................................................................... 663
CONFIGURATION versus INTERFACE Configurations.................................................. 663
Enabling LLDP.........................................................................................................................664
Disabling and Undoing LLDP.........................................................................................665
Enabling LLDP on Management Ports...............................................................................665
Disabling and Undoing LLDP on Management Ports...............................................665
Advertising TLVs.....................................................................................................................666
Viewing the LLDP Configuration........................................................................................ 667
Viewing Information Advertised by Adjacent LLDP Agents.......................................... 668
Configuring LLDPDU Intervals............................................................................................ 669
Configuring Transmit and Receive Mode......................................................................... 670
Configuring a Time to Live................................................................................................... 671
Debugging LLDP.....................................................................................................................671
Relevant Management Objects...........................................................................................672
31 Multicast Source Discovery Protocol (MSDP)...............................................................678
Version 9.10(0.0)
20
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407
  • Page 408 408
  • Page 409 409
  • Page 410 410
  • Page 411 411
  • Page 412 412
  • Page 413 413
  • Page 414 414
  • Page 415 415
  • Page 416 416
  • Page 417 417
  • Page 418 418
  • Page 419 419
  • Page 420 420
  • Page 421 421
  • Page 422 422
  • Page 423 423
  • Page 424 424
  • Page 425 425
  • Page 426 426
  • Page 427 427
  • Page 428 428
  • Page 429 429
  • Page 430 430
  • Page 431 431
  • Page 432 432
  • Page 433 433
  • Page 434 434
  • Page 435 435
  • Page 436 436
  • Page 437 437
  • Page 438 438
  • Page 439 439
  • Page 440 440
  • Page 441 441
  • Page 442 442
  • Page 443 443
  • Page 444 444
  • Page 445 445
  • Page 446 446
  • Page 447 447
  • Page 448 448
  • Page 449 449
  • Page 450 450
  • Page 451 451
  • Page 452 452
  • Page 453 453
  • Page 454 454
  • Page 455 455
  • Page 456 456
  • Page 457 457
  • Page 458 458
  • Page 459 459
  • Page 460 460
  • Page 461 461
  • Page 462 462
  • Page 463 463
  • Page 464 464
  • Page 465 465
  • Page 466 466
  • Page 467 467
  • Page 468 468
  • Page 469 469
  • Page 470 470
  • Page 471 471
  • Page 472 472
  • Page 473 473
  • Page 474 474
  • Page 475 475
  • Page 476 476
  • Page 477 477
  • Page 478 478
  • Page 479 479
  • Page 480 480
  • Page 481 481
  • Page 482 482
  • Page 483 483
  • Page 484 484
  • Page 485 485
  • Page 486 486
  • Page 487 487
  • Page 488 488
  • Page 489 489
  • Page 490 490
  • Page 491 491
  • Page 492 492
  • Page 493 493
  • Page 494 494
  • Page 495 495
  • Page 496 496
  • Page 497 497
  • Page 498 498
  • Page 499 499
  • Page 500 500
  • Page 501 501
  • Page 502 502
  • Page 503 503
  • Page 504 504
  • Page 505 505
  • Page 506 506
  • Page 507 507
  • Page 508 508
  • Page 509 509
  • Page 510 510
  • Page 511 511
  • Page 512 512
  • Page 513 513
  • Page 514 514
  • Page 515 515
  • Page 516 516
  • Page 517 517
  • Page 518 518
  • Page 519 519
  • Page 520 520
  • Page 521 521
  • Page 522 522
  • Page 523 523
  • Page 524 524
  • Page 525 525
  • Page 526 526
  • Page 527 527
  • Page 528 528
  • Page 529 529
  • Page 530 530
  • Page 531 531
  • Page 532 532
  • Page 533 533
  • Page 534 534
  • Page 535 535
  • Page 536 536
  • Page 537 537
  • Page 538 538
  • Page 539 539
  • Page 540 540
  • Page 541 541
  • Page 542 542
  • Page 543 543
  • Page 544 544
  • Page 545 545
  • Page 546 546
  • Page 547 547
  • Page 548 548
  • Page 549 549
  • Page 550 550
  • Page 551 551
  • Page 552 552
  • Page 553 553
  • Page 554 554
  • Page 555 555
  • Page 556 556
  • Page 557 557
  • Page 558 558
  • Page 559 559
  • Page 560 560
  • Page 561 561
  • Page 562 562
  • Page 563 563
  • Page 564 564
  • Page 565 565
  • Page 566 566
  • Page 567 567
  • Page 568 568
  • Page 569 569
  • Page 570 570
  • Page 571 571
  • Page 572 572
  • Page 573 573
  • Page 574 574
  • Page 575 575
  • Page 576 576
  • Page 577 577
  • Page 578 578
  • Page 579 579
  • Page 580 580
  • Page 581 581
  • Page 582 582
  • Page 583 583
  • Page 584 584
  • Page 585 585
  • Page 586 586
  • Page 587 587
  • Page 588 588
  • Page 589 589
  • Page 590 590
  • Page 591 591
  • Page 592 592
  • Page 593 593
  • Page 594 594
  • Page 595 595
  • Page 596 596
  • Page 597 597
  • Page 598 598
  • Page 599 599
  • Page 600 600
  • Page 601 601
  • Page 602 602
  • Page 603 603
  • Page 604 604
  • Page 605 605
  • Page 606 606
  • Page 607 607
  • Page 608 608
  • Page 609 609
  • Page 610 610
  • Page 611 611
  • Page 612 612
  • Page 613 613
  • Page 614 614
  • Page 615 615
  • Page 616 616
  • Page 617 617
  • Page 618 618
  • Page 619 619
  • Page 620 620
  • Page 621 621
  • Page 622 622
  • Page 623 623
  • Page 624 624
  • Page 625 625
  • Page 626 626
  • Page 627 627
  • Page 628 628
  • Page 629 629
  • Page 630 630
  • Page 631 631
  • Page 632 632
  • Page 633 633
  • Page 634 634
  • Page 635 635
  • Page 636 636
  • Page 637 637
  • Page 638 638
  • Page 639 639
  • Page 640 640
  • Page 641 641
  • Page 642 642
  • Page 643 643
  • Page 644 644
  • Page 645 645
  • Page 646 646
  • Page 647 647
  • Page 648 648
  • Page 649 649
  • Page 650 650
  • Page 651 651
  • Page 652 652
  • Page 653 653
  • Page 654 654
  • Page 655 655
  • Page 656 656
  • Page 657 657
  • Page 658 658
  • Page 659 659
  • Page 660 660
  • Page 661 661
  • Page 662 662
  • Page 663 663
  • Page 664 664
  • Page 665 665
  • Page 666 666
  • Page 667 667
  • Page 668 668
  • Page 669 669
  • Page 670 670
  • Page 671 671
  • Page 672 672
  • Page 673 673
  • Page 674 674
  • Page 675 675
  • Page 676 676
  • Page 677 677
  • Page 678 678
  • Page 679 679
  • Page 680 680
  • Page 681 681
  • Page 682 682
  • Page 683 683
  • Page 684 684
  • Page 685 685
  • Page 686 686
  • Page 687 687
  • Page 688 688
  • Page 689 689
  • Page 690 690
  • Page 691 691
  • Page 692 692
  • Page 693 693
  • Page 694 694
  • Page 695 695
  • Page 696 696
  • Page 697 697
  • Page 698 698
  • Page 699 699
  • Page 700 700
  • Page 701 701
  • Page 702 702
  • Page 703 703
  • Page 704 704
  • Page 705 705
  • Page 706 706
  • Page 707 707
  • Page 708 708
  • Page 709 709
  • Page 710 710
  • Page 711 711
  • Page 712 712
  • Page 713 713
  • Page 714 714
  • Page 715 715
  • Page 716 716
  • Page 717 717
  • Page 718 718
  • Page 719 719
  • Page 720 720
  • Page 721 721
  • Page 722 722
  • Page 723 723
  • Page 724 724
  • Page 725 725
  • Page 726 726
  • Page 727 727
  • Page 728 728
  • Page 729 729
  • Page 730 730
  • Page 731 731
  • Page 732 732
  • Page 733 733
  • Page 734 734
  • Page 735 735
  • Page 736 736
  • Page 737 737
  • Page 738 738
  • Page 739 739
  • Page 740 740
  • Page 741 741
  • Page 742 742
  • Page 743 743
  • Page 744 744
  • Page 745 745
  • Page 746 746
  • Page 747 747
  • Page 748 748
  • Page 749 749
  • Page 750 750
  • Page 751 751
  • Page 752 752
  • Page 753 753
  • Page 754 754
  • Page 755 755
  • Page 756 756
  • Page 757 757
  • Page 758 758
  • Page 759 759
  • Page 760 760
  • Page 761 761
  • Page 762 762
  • Page 763 763
  • Page 764 764
  • Page 765 765
  • Page 766 766
  • Page 767 767
  • Page 768 768
  • Page 769 769
  • Page 770 770
  • Page 771 771
  • Page 772 772
  • Page 773 773
  • Page 774 774
  • Page 775 775
  • Page 776 776
  • Page 777 777
  • Page 778 778
  • Page 779 779
  • Page 780 780
  • Page 781 781
  • Page 782 782
  • Page 783 783
  • Page 784 784
  • Page 785 785
  • Page 786 786
  • Page 787 787
  • Page 788 788
  • Page 789 789
  • Page 790 790
  • Page 791 791
  • Page 792 792
  • Page 793 793
  • Page 794 794
  • Page 795 795
  • Page 796 796
  • Page 797 797
  • Page 798 798
  • Page 799 799
  • Page 800 800
  • Page 801 801
  • Page 802 802
  • Page 803 803
  • Page 804 804
  • Page 805 805
  • Page 806 806
  • Page 807 807
  • Page 808 808
  • Page 809 809
  • Page 810 810
  • Page 811 811
  • Page 812 812
  • Page 813 813
  • Page 814 814
  • Page 815 815
  • Page 816 816
  • Page 817 817
  • Page 818 818
  • Page 819 819
  • Page 820 820
  • Page 821 821
  • Page 822 822
  • Page 823 823
  • Page 824 824
  • Page 825 825
  • Page 826 826
  • Page 827 827
  • Page 828 828
  • Page 829 829
  • Page 830 830
  • Page 831 831
  • Page 832 832
  • Page 833 833
  • Page 834 834
  • Page 835 835
  • Page 836 836
  • Page 837 837
  • Page 838 838
  • Page 839 839
  • Page 840 840
  • Page 841 841
  • Page 842 842
  • Page 843 843
  • Page 844 844
  • Page 845 845
  • Page 846 846
  • Page 847 847
  • Page 848 848
  • Page 849 849
  • Page 850 850
  • Page 851 851
  • Page 852 852
  • Page 853 853
  • Page 854 854
  • Page 855 855
  • Page 856 856
  • Page 857 857
  • Page 858 858
  • Page 859 859
  • Page 860 860
  • Page 861 861
  • Page 862 862
  • Page 863 863
  • Page 864 864
  • Page 865 865
  • Page 866 866
  • Page 867 867
  • Page 868 868
  • Page 869 869
  • Page 870 870
  • Page 871 871
  • Page 872 872
  • Page 873 873
  • Page 874 874
  • Page 875 875
  • Page 876 876
  • Page 877 877
  • Page 878 878
  • Page 879 879
  • Page 880 880
  • Page 881 881
  • Page 882 882
  • Page 883 883
  • Page 884 884
  • Page 885 885
  • Page 886 886
  • Page 887 887
  • Page 888 888
  • Page 889 889
  • Page 890 890
  • Page 891 891
  • Page 892 892
  • Page 893 893
  • Page 894 894
  • Page 895 895
  • Page 896 896
  • Page 897 897
  • Page 898 898
  • Page 899 899
  • Page 900 900
  • Page 901 901
  • Page 902 902
  • Page 903 903
  • Page 904 904
  • Page 905 905
  • Page 906 906
  • Page 907 907
  • Page 908 908
  • Page 909 909
  • Page 910 910
  • Page 911 911
  • Page 912 912
  • Page 913 913
  • Page 914 914
  • Page 915 915
  • Page 916 916
  • Page 917 917
  • Page 918 918
  • Page 919 919
  • Page 920 920
  • Page 921 921
  • Page 922 922
  • Page 923 923
  • Page 924 924
  • Page 925 925
  • Page 926 926
  • Page 927 927
  • Page 928 928
  • Page 929 929
  • Page 930 930
  • Page 931 931
  • Page 932 932
  • Page 933 933
  • Page 934 934
  • Page 935 935
  • Page 936 936
  • Page 937 937
  • Page 938 938
  • Page 939 939
  • Page 940 940
  • Page 941 941
  • Page 942 942
  • Page 943 943
  • Page 944 944
  • Page 945 945
  • Page 946 946
  • Page 947 947
  • Page 948 948
  • Page 949 949
  • Page 950 950
  • Page 951 951
  • Page 952 952
  • Page 953 953
  • Page 954 954
  • Page 955 955
  • Page 956 956
  • Page 957 957
  • Page 958 958
  • Page 959 959
  • Page 960 960
  • Page 961 961
  • Page 962 962
  • Page 963 963
  • Page 964 964
  • Page 965 965
  • Page 966 966
  • Page 967 967
  • Page 968 968
  • Page 969 969
  • Page 970 970
  • Page 971 971
  • Page 972 972
  • Page 973 973
  • Page 974 974
  • Page 975 975
  • Page 976 976
  • Page 977 977
  • Page 978 978
  • Page 979 979
  • Page 980 980
  • Page 981 981
  • Page 982 982
  • Page 983 983
  • Page 984 984
  • Page 985 985
  • Page 986 986
  • Page 987 987
  • Page 988 988
  • Page 989 989
  • Page 990 990
  • Page 991 991
  • Page 992 992
  • Page 993 993
  • Page 994 994
  • Page 995 995
  • Page 996 996
  • Page 997 997
  • Page 998 998
  • Page 999 999
  • Page 1000 1000
  • Page 1001 1001
  • Page 1002 1002
  • Page 1003 1003
  • Page 1004 1004
  • Page 1005 1005
  • Page 1006 1006
  • Page 1007 1007
  • Page 1008 1008
  • Page 1009 1009
  • Page 1010 1010
  • Page 1011 1011
  • Page 1012 1012
  • Page 1013 1013
  • Page 1014 1014
  • Page 1015 1015
  • Page 1016 1016
  • Page 1017 1017
  • Page 1018 1018
  • Page 1019 1019
  • Page 1020 1020
  • Page 1021 1021
  • Page 1022 1022
  • Page 1023 1023
  • Page 1024 1024
  • Page 1025 1025
  • Page 1026 1026
  • Page 1027 1027
  • Page 1028 1028
  • Page 1029 1029
  • Page 1030 1030
  • Page 1031 1031
  • Page 1032 1032
  • Page 1033 1033
  • Page 1034 1034
  • Page 1035 1035
  • Page 1036 1036
  • Page 1037 1037
  • Page 1038 1038
  • Page 1039 1039
  • Page 1040 1040
  • Page 1041 1041
  • Page 1042 1042
  • Page 1043 1043
  • Page 1044 1044
  • Page 1045 1045
  • Page 1046 1046
  • Page 1047 1047
  • Page 1048 1048
  • Page 1049 1049
  • Page 1050 1050
  • Page 1051 1051
  • Page 1052 1052
  • Page 1053 1053
  • Page 1054 1054
  • Page 1055 1055
  • Page 1056 1056
  • Page 1057 1057
  • Page 1058 1058
  • Page 1059 1059
  • Page 1060 1060
  • Page 1061 1061
  • Page 1062 1062
  • Page 1063 1063
  • Page 1064 1064
  • Page 1065 1065
  • Page 1066 1066
  • Page 1067 1067
  • Page 1068 1068
  • Page 1069 1069
  • Page 1070 1070
  • Page 1071 1071
  • Page 1072 1072
  • Page 1073 1073
  • Page 1074 1074
  • Page 1075 1075
  • Page 1076 1076
  • Page 1077 1077
  • Page 1078 1078
  • Page 1079 1079
  • Page 1080 1080
  • Page 1081 1081
  • Page 1082 1082
  • Page 1083 1083
  • Page 1084 1084
  • Page 1085 1085
  • Page 1086 1086
  • Page 1087 1087
  • Page 1088 1088
  • Page 1089 1089
  • Page 1090 1090
  • Page 1091 1091
  • Page 1092 1092
  • Page 1093 1093
  • Page 1094 1094
  • Page 1095 1095
  • Page 1096 1096
  • Page 1097 1097
  • Page 1098 1098
  • Page 1099 1099
  • Page 1100 1100
  • Page 1101 1101
  • Page 1102 1102
  • Page 1103 1103
  • Page 1104 1104
  • Page 1105 1105
  • Page 1106 1106
  • Page 1107 1107
  • Page 1108 1108
  • Page 1109 1109
  • Page 1110 1110
  • Page 1111 1111
  • Page 1112 1112
  • Page 1113 1113
  • Page 1114 1114
  • Page 1115 1115
  • Page 1116 1116
  • Page 1117 1117
  • Page 1118 1118
  • Page 1119 1119
  • Page 1120 1120
  • Page 1121 1121
  • Page 1122 1122
  • Page 1123 1123
  • Page 1124 1124
  • Page 1125 1125
  • Page 1126 1126
  • Page 1127 1127
  • Page 1128 1128
  • Page 1129 1129
  • Page 1130 1130
  • Page 1131 1131
  • Page 1132 1132
  • Page 1133 1133
  • Page 1134 1134
  • Page 1135 1135
  • Page 1136 1136
  • Page 1137 1137
  • Page 1138 1138
  • Page 1139 1139
  • Page 1140 1140
  • Page 1141 1141
  • Page 1142 1142
  • Page 1143 1143
  • Page 1144 1144
  • Page 1145 1145
  • Page 1146 1146
  • Page 1147 1147
  • Page 1148 1148
  • Page 1149 1149
  • Page 1150 1150
  • Page 1151 1151
  • Page 1152 1152
  • Page 1153 1153
  • Page 1154 1154
  • Page 1155 1155
  • Page 1156 1156
  • Page 1157 1157
  • Page 1158 1158
  • Page 1159 1159
  • Page 1160 1160
  • Page 1161 1161
  • Page 1162 1162
  • Page 1163 1163
  • Page 1164 1164
  • Page 1165 1165
  • Page 1166 1166
  • Page 1167 1167
  • Page 1168 1168
  • Page 1169 1169
  • Page 1170 1170
  • Page 1171 1171
  • Page 1172 1172
  • Page 1173 1173
  • Page 1174 1174
  • Page 1175 1175
  • Page 1176 1176
  • Page 1177 1177
  • Page 1178 1178
  • Page 1179 1179
  • Page 1180 1180
  • Page 1181 1181
  • Page 1182 1182
  • Page 1183 1183
  • Page 1184 1184
  • Page 1185 1185
  • Page 1186 1186
  • Page 1187 1187
  • Page 1188 1188
  • Page 1189 1189
  • Page 1190 1190
  • Page 1191 1191
  • Page 1192 1192
  • Page 1193 1193
  • Page 1194 1194
  • Page 1195 1195
  • Page 1196 1196
  • Page 1197 1197
  • Page 1198 1198
  • Page 1199 1199
  • Page 1200 1200
  • Page 1201 1201
  • Page 1202 1202
  • Page 1203 1203
  • Page 1204 1204
  • Page 1205 1205
  • Page 1206 1206
  • Page 1207 1207
  • Page 1208 1208
  • Page 1209 1209
  • Page 1210 1210
  • Page 1211 1211
  • Page 1212 1212
  • Page 1213 1213
  • Page 1214 1214
  • Page 1215 1215
  • Page 1216 1216
  • Page 1217 1217
  • Page 1218 1218
  • Page 1219 1219
  • Page 1220 1220
  • Page 1221 1221
  • Page 1222 1222
  • Page 1223 1223
  • Page 1224 1224
  • Page 1225 1225
  • Page 1226 1226
  • Page 1227 1227
  • Page 1228 1228
  • Page 1229 1229
  • Page 1230 1230
  • Page 1231 1231
  • Page 1232 1232
  • Page 1233 1233
  • Page 1234 1234
  • Page 1235 1235
  • Page 1236 1236
  • Page 1237 1237
  • Page 1238 1238
  • Page 1239 1239
  • Page 1240 1240
  • Page 1241 1241
  • Page 1242 1242
  • Page 1243 1243
  • Page 1244 1244
  • Page 1245 1245
  • Page 1246 1246
  • Page 1247 1247
  • Page 1248 1248
  • Page 1249 1249
  • Page 1250 1250
  • Page 1251 1251

Dell C1048P Port Extender User guide

Category
Software
Type
User guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI