Dell PowerSwitch S6100-ON User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6100-ON User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S6100–ON
System
9.14.2.5
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 - 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
2020 - 01
Rev. A00
1 About this Guide......................................................................................................................... 32
Audience............................................................................................................................................................................... 32
Conventions......................................................................................................................................................................... 32
Related Documents.............................................................................................................................................................32
2 Configuration Fundamentals....................................................................................................... 33
Accessing the Command Line............................................................................................................................................33
CLI Modes............................................................................................................................................................................ 33
Navigating CLI Modes...................................................................................................................................................35
The do Command................................................................................................................................................................ 37
Undoing Commands............................................................................................................................................................38
Obtaining Help..................................................................................................................................................................... 38
Entering and Editing Commands....................................................................................................................................... 39
Command History................................................................................................................................................................39
Filtering show Command Outputs.................................................................................................................................... 40
Multiple Users in Configuration Mode............................................................................................................................... 41
Configuring alias command................................................................................................................................................. 41
Viewing alias configuration............................................................................................................................................41
3 Getting Started..........................................................................................................................43
Console Access....................................................................................................................................................................43
Serial Console.................................................................................................................................................................43
Micro USB-B Access.....................................................................................................................................................44
Default Configuration..........................................................................................................................................................45
Configuring a Host Name...................................................................................................................................................45
Accessing the System Remotely.......................................................................................................................................45
Configure the Management Port IP Address............................................................................................................ 45
Configure a Management Route................................................................................................................................. 46
Configuring a Username and Password......................................................................................................................46
Configuring the Enable Password..................................................................................................................................... 47
Configuration File Management.........................................................................................................................................47
Copy Files to and from the System.............................................................................................................................47
Mounting an NFS File System..................................................................................................................................... 48
Save the Running-Configuration................................................................................................................................. 49
Configure the Overload Bit for a Startup Scenario...................................................................................................50
Viewing Files...................................................................................................................................................................50
Managing the File System...................................................................................................................................................51
View Command History.......................................................................................................................................................51
Upgrading Dell EMC Networking OS................................................................................................................................53
Using HTTP for File Transfers........................................................................................................................................... 53
Verify Software Images Before Installation......................................................................................................................53
4 Management..............................................................................................................................55
Configuring Privilege Levels...............................................................................................................................................55
Contents
Contents 3
Removing a Command from EXEC Mode..................................................................................................................56
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................... 56
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 56
Allowing Access to Different Modes...........................................................................................................................56
Applying a Privilege Level to a Username...................................................................................................................57
Applying a Privilege Level to a Terminal Line............................................................................................................. 57
Configuring Logging............................................................................................................................................................58
Audit and Security Logs................................................................................................................................................58
Configuring Logging Format ................................................................................................................................ 59
Setting Up a Secure Connection to a Syslog Server.......................................................................................60
Log Messages in the Internal Buffer..................................................................................................................................61
Disabling System Logging................................................................................................................................................... 61
Sending System Messages to a Syslog Server................................................................................................................ 61
Configuring a UNIX System as a Syslog Server.........................................................................................................61
Track Login Activity............................................................................................................................................................ 62
Restrictions for Tracking Login Activity......................................................................................................................62
Configuring Login Activity Tracking............................................................................................................................ 62
Display Login Statistics................................................................................................................................................. 62
Limit Concurrent Login Sessions.......................................................................................................................................64
Restrictions for Limiting the Number of Concurrent Sessions................................................................................64
Configuring Concurrent Session Limit........................................................................................................................ 64
Enabling the System to Clear Existing Sessions........................................................................................................64
Enabling Secured CLI Mode...............................................................................................................................................65
Changing System Logging Settings..................................................................................................................................65
Display the Logging Buffer and the Logging Configuration...........................................................................................66
Configuring a UNIX Logging Facility Level....................................................................................................................... 67
Synchronizing Log Messages.............................................................................................................................................67
Enabling Timestamp on Syslog Messages........................................................................................................................68
File Transfer Services..........................................................................................................................................................70
Enabling the FTP Server................................................................................................................................................71
Configuring FTP Server Parameters............................................................................................................................71
Configuring FTP Client Parameters............................................................................................................................. 71
Terminal Lines...................................................................................................................................................................... 72
Denying and Permitting Access to a Terminal Line................................................................................................... 72
Configuring Login Authentication for Terminal Lines................................................................................................73
Setting Timeout for EXEC Privilege Mode.......................................................................................................................74
Using Telnet to get to Another Network Device.............................................................................................................74
Lock CONFIGURATION Mode.......................................................................................................................................... 75
LPC Bus Quality Degradation.............................................................................................................................................75
Restoring the Factory Default Settings............................................................................................................................76
Restoring Factory Default Environment Variables.....................................................................................................77
Reloading the system..........................................................................................................................................................78
Viewing the Reason for Last System Reboot..................................................................................................................78
5 802.1X.......................................................................................................................................80
Port-Authentication Process..............................................................................................................................................81
EAP over RADIUS..........................................................................................................................................................82
Configuring 802.1X..............................................................................................................................................................82
Important Points to Remember.........................................................................................................................................83
Enabling 802.1X....................................................................................................................................................................83
4
Contents
Configuring dot1x Profile ................................................................................................................................................... 84
Configuring MAC addresses for a do1x Profile................................................................................................................85
Configuring the Static MAB and MAB Profile ................................................................................................................ 85
Configuring Critical VLAN ................................................................................................................................................. 86
Configuring Request Identity Re-Transmissions............................................................................................................. 87
Configuring a Quiet Period after a Failed Authentication.........................................................................................87
Configuring a Quiet Period after a Failed Authentication...............................................................................................88
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................88
Re-Authenticating a Port................................................................................................................................................... 89
Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................90
Guest and Authentication-Fail VLANs...............................................................................................................................91
Configuring a Guest VLAN........................................................................................................................................... 92
Configuring an Authentication-Fail VLAN.................................................................................................................. 92
Configuring Timeouts....................................................................................................................................................93
Multi-Host Authentication..................................................................................................................................................94
Multi-Supplicant Authentication........................................................................................................................................96
MAC Authentication Bypass..............................................................................................................................................98
MAB in Single-host and Multi-Host Mode................................................................................................................. 98
MAB in Multi-Supplicant Authentication Mode.........................................................................................................98
Configuring MAC Authentication Bypass...................................................................................................................98
Dynamic CoS with 802.1X..................................................................................................................................................99
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).........................101
Optimizing CAM Utilization During the Attachment of ACLs to VLANs.....................................................................101
Guidelines for Configuring ACL VLAN Groups................................................................................................................101
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters..................................................102
Configuring ACL VLAN Groups..................................................................................................................................102
Configuring FP Blocks for VLAN Parameters.......................................................................................................... 103
Viewing CAM Usage..........................................................................................................................................................103
Allocating FP Blocks for VLAN Processes......................................................................................................................105
ACL Optimization to Increase Number of Supported IPv4 ACLs................................................................................105
Optimizing ACL for More Number of IPv4 ACL Rules............................................................................................105
7 Access Control Lists (ACLs).......................................................................................................107
IP Access Control Lists (ACLs)........................................................................................................................................108
CAM Usage...................................................................................................................................................................108
Implementing ACLs on Dell EMC Networking OS................................................................................................... 109
Configure ACL Range Profiles.................................................................................................................................... 110
Important Points to Remember......................................................................................................................................... 111
Configuration Task List for Route Maps.....................................................................................................................111
Configuring Match Routes...........................................................................................................................................113
Configuring Set Conditions..........................................................................................................................................114
Configure a Route Map for Route Redistribution.....................................................................................................115
Configure a Route Map for Route Tagging...............................................................................................................115
Continue Clause............................................................................................................................................................ 116
IP Fragment Handling.........................................................................................................................................................116
IP Fragments ACL Examples.......................................................................................................................................116
Layer 4 ACL Rules Examples....................................................................................................................................... 117
Configure a Standard IP ACL............................................................................................................................................ 117
Contents
5
Configuring a Standard IP ACL Filter......................................................................................................................... 118
Configure an Extended IP ACL......................................................................................................................................... 119
Configuring Filters with a Sequence Number........................................................................................................... 119
Configuring Filters Without a Sequence Number.....................................................................................................121
Configure Layer 2 and Layer 3 ACLs...............................................................................................................................122
Assign an IP ACL to an Interface..................................................................................................................................... 123
Applying an IP ACL.............................................................................................................................................................123
Counting ACL Hits....................................................................................................................................................... 123
Configure Ingress ACLs.....................................................................................................................................................124
Configure Egress ACLs..................................................................................................................................................... 124
Applying Egress Layer 3 ACLs (Control-Plane)....................................................................................................... 125
IP Prefix Lists......................................................................................................................................................................125
Configuration Task List for Prefix Lists.....................................................................................................................126
ACL Remarks......................................................................................................................................................................129
Configuring a Remark.................................................................................................................................................. 129
Deleting a Remark........................................................................................................................................................129
ACL Resequencing.............................................................................................................................................................130
Resequencing an ACL or Prefix List.......................................................................................................................... 130
Route Maps......................................................................................................................................................................... 131
8 Bidirectional Forwarding Detection (BFD)................................................................................... 133
How BFD Works.................................................................................................................................................................133
BFD Packet Format..................................................................................................................................................... 134
BFD Sessions................................................................................................................................................................135
BFD Three-Way Handshake....................................................................................................................................... 136
Session State Changes................................................................................................................................................137
Important Points to Remember........................................................................................................................................137
Configure BFD.................................................................................................................................................................... 137
Configure BFD for Physical Ports.............................................................................................................................. 138
Configure BFD for Static Routes...............................................................................................................................140
Configure BFD for IPv6 Static Routes...................................................................................................................... 143
Configure BFD for OSPF............................................................................................................................................ 145
Configure BFD for OSPFv3........................................................................................................................................150
Configure BFD for IS-IS.............................................................................................................................................. 152
Configure BFD for BGP...............................................................................................................................................154
Configure BFD for VRRP.............................................................................................................................................161
Configuring Protocol Liveness....................................................................................................................................163
9 Border Gateway Protocol (BGP).................................................................................................164
BGP IP version 4 (BGPv4) Overview..............................................................................................................................164
BGP Autonomous Systems.........................................................................................................................................164
AS4 Number Representation......................................................................................................................................166
Four-Byte AS Numbers...............................................................................................................................................168
BGP router ID............................................................................................................................................................... 168
Sessions and Peers...................................................................................................................................................... 168
Establish a Session.......................................................................................................................................................168
BGP Attributes for selecting Best Path....................................................................................................................169
Multiprotocol BGP........................................................................................................................................................174
BGP global and address family configuration........................................................................................................... 175
6
Contents
Implement BGP with Dell EMC Networking OS.......................................................................................................176
Configuration Information........................................................................................................................................... 179
Basic BGP configuration tasks......................................................................................................................................... 179
Prerequisite for configuring a BGP network.............................................................................................................179
Restrictions................................................................................................................................................................... 179
Enabling BGP................................................................................................................................................................ 179
Enabling four-byte autonomous system numbers....................................................................................................181
Changing a BGP router ID...........................................................................................................................................182
Configuring AS4 Number Representations...............................................................................................................182
Configuring a BGP peer...............................................................................................................................................183
Example-Configuring BGP routing between peers..................................................................................................184
BGP peer group............................................................................................................................................................185
Advanced BGP configuration tasks.................................................................................................................................192
Route-refresh and Soft-reconfiguration...................................................................................................................192
Aggregating Routes..................................................................................................................................................... 194
Filtering BGP.................................................................................................................................................................196
Configuring BGP Fast Fall-Over.................................................................................................................................201
Configuring Passive Peering...................................................................................................................................... 202
Enabling Graceful Restart.......................................................................................................................................... 203
Redistributing Routes................................................................................................................................................. 204
Enabling Additional Paths........................................................................................................................................... 204
Configuring IP Community Lists................................................................................................................................205
Configuring an IP Extended Community List...........................................................................................................206
Configure BGP attributes...........................................................................................................................................207
Enabling Multipath....................................................................................................................................................... 210
Route Reflectors...........................................................................................................................................................211
Enabling Route Flap Dampening.................................................................................................................................212
Changing BGP keepalive and hold timers................................................................................................................. 214
Setting the extended timer.........................................................................................................................................214
Enabling or disabling BGP neighbors......................................................................................................................... 215
Route Map Continue....................................................................................................................................................216
Configuring BGP Confederations...............................................................................................................................216
Configuring a BGP VRF address family.....................................................................................................................217
Maintaining Existing AS Numbers During an AS Migration.....................................................................................218
Allowing an AS Number to Appear in its Own AS Path...........................................................................................219
Enabling MBGP Configurations.................................................................................................................................220
MBGP support for IPv6..............................................................................................................................................220
Configuring IPv6 MBGP between peers..................................................................................................................220
Example-Configuring IPv4 and IPv6 neighbors........................................................................................................221
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor............................................ 223
BGP Regular Expression Optimization......................................................................................................................224
Debugging BGP........................................................................................................................................................... 225
10 Content Addressable Memory (CAM)........................................................................................227
CAM Allocation.................................................................................................................................................................. 227
Test CAM Usage............................................................................................................................................................... 228
View CAM-ACL Settings..................................................................................................................................................229
View CAM Usage.............................................................................................................................................................. 230
Configuring CAM Threshold and Silence Period........................................................................................................... 230
CAM Optimization.............................................................................................................................................................232
Contents
7
Troubleshoot CAM Profiling.............................................................................................................................................232
QoS CAM Region Limitation...................................................................................................................................... 232
Syslog Error When the Table is Full.......................................................................................................................... 232
Syslog Warning Upon 90 Percent Utilization of CAM............................................................................................232
Syslog Warning for Discrepancies Between Configured Extended Prefixes.......................................................232
Unified Forwarding Table (UFT) Modes.........................................................................................................................232
Configuring UFT Modes............................................................................................................................................. 233
IPv6 CAM ACL Region..................................................................................................................................................... 233
Important Points to Remember.................................................................................................................................233
Convert the IPv6 ACL CAM to Double-Wide.......................................................................................................... 234
Sharing CAM space between IPv4 QoS and IPv6 ACLs........................................................................................234
11 Control Plane Policing (CoPP).................................................................................................. 235
Configure Control Plane Policing.....................................................................................................................................236
Configuring CoPP for Protocols................................................................................................................................ 237
Configuring CoPP for CPU Queues..........................................................................................................................238
Protocol to CPU Queue Mapping............................................................................................................................. 239
Configuring Protocol to CPU Queue Mapping........................................................................................................ 240
Displaying CoPP Configuration .................................................................................................................................240
12 Data Center Bridging (DCB)..................................................................................................... 243
Ethernet Enhancements in Data Center Bridging.........................................................................................................243
Priority-Based Flow Control.......................................................................................................................................244
Enhanced Transmission Selection.............................................................................................................................245
Data Center Bridging Exchange Protocol (DCBx)..................................................................................................246
Data Center Bridging in a Traffic Flow..................................................................................................................... 246
Enabling Data Center Bridging........................................................................................................................................ 246
DCB Maps and its Attributes..................................................................................................................................... 247
Data Center Bridging: Default Configuration.................................................................................................................247
Configuring Priority-Based Flow Control....................................................................................................................... 248
Configuring Lossless Queues.....................................................................................................................................248
Configuring PFC in a DCB Map.......................................................................................................................................250
Applying a DCB Map on a Port........................................................................................................................................ 251
Configuring PFC without a DCB Map............................................................................................................................. 251
Configuring PFC Asymmetric...........................................................................................................................................251
Priority-Based Flow Control Using Dynamic Buffer Method.......................................................................................252
Shared headroom for lossless or PFC packets............................................................................................................. 253
Configuring Shared Head Room Buffer....................................................................................................................254
Viewing Shared Head Room Usage.......................................................................................................................... 254
Monitoring Buffer Statistics for Tracking Purposes...............................................................................................255
Behavior of Tagged Packets........................................................................................................................................... 255
SNMP Support for PFC and Buffer Statistics Tracking.............................................................................................. 255
Performing PFC Using DSCP Bits Instead of 802.1p Bits........................................................................................... 256
Configuration Example for DSCP and PFC Priorities................................................................................................... 257
Using PFC to Manage Converged Ethernet Traffic..................................................................................................... 257
Generation of PFC for a Priority for Untagged Packets..............................................................................................257
Configure Enhanced Transmission Selection.................................................................................................................257
Creating an ETS Priority Group.................................................................................................................................258
ETS Operation with DCBx..........................................................................................................................................259
8
Contents
Configuring ETS in a DCB Map................................................................................................................................. 259
Hierarchical Scheduling in ETS Output Policies............................................................................................................ 260
Using ETS to Manage Converged Ethernet Traffic..................................................................................................... 260
Applying DCB Policies in a Switch Stack....................................................................................................................... 260
Configure a DCBx Operation............................................................................................................................................261
DCBx Operation........................................................................................................................................................... 261
DCBx Port Roles.......................................................................................................................................................... 261
DCB Configuration Exchange.................................................................................................................................... 262
Configuration Source Election...................................................................................................................................263
Propagation of DCB Information...............................................................................................................................263
Auto-Detection and Manual Configuration of the DCBx Version......................................................................... 263
DCBx Example............................................................................................................................................................. 264
DCBx Prerequisites and Restrictions........................................................................................................................264
Configuring DCBx........................................................................................................................................................264
Verifying the DCB Configuration.....................................................................................................................................267
QoS dot1p Traffic Classification and Queue Assignment.............................................................................................274
Configuring the Dynamic Buffer Method.......................................................................................................................274
Sample DCB Configuration.............................................................................................................................................. 275
13 Dynamic Host Configuration Protocol (DHCP)........................................................................... 278
DHCP Packet Format and Options.................................................................................................................................278
Assign an IP Address using DHCP...................................................................................................................................279
Implementation Information.............................................................................................................................................280
Configure the System to be a DHCP Server..................................................................................................................281
Configuring the Server for Automatic Address Allocation......................................................................................281
Specifying a Default Gateway....................................................................................................................................282
Configure a Method of Hostname Resolution.........................................................................................................282
Using DNS for Address Resolution............................................................................................................................282
Using NetBIOS WINS for Address Resolution.........................................................................................................283
Creating Manual Binding Entries............................................................................................................................... 283
Debugging the DHCP Server.....................................................................................................................................283
Using DHCP Clear Commands.................................................................................................................................. 283
Configure the System to be a DHCP Client.................................................................................................................. 284
Configuring the DHCP Client System.......................................................................................................................284
DHCP Client on a Management Interface............................................................................................................... 285
DHCP Client Operation with Other Features.......................................................................................................... 286
DHCP Relay When DHCP Server and Client are in Different VRFs...........................................................................286
Configuring Route Leaking between VRFs on DHCP Relay Agent.......................................................................287
Non-default VRF configuration for DHCPv6 helper address...................................................................................... 288
Configuring DHCP relay source interface......................................................................................................................288
Global DHCP relay source IPv4 or IPv6 configuration .......................................................................................... 288
Interface level DHCP relay source IPv4 or IPv6 configuration .............................................................................289
Configure the System for User Port Stacking (Option 230)...................................................................................... 290
Configure Secure DHCP.................................................................................................................................................. 290
Option 82 (DHCPv4 relay options)...........................................................................................................................290
DHCPv6 relay agent options...................................................................................................................................... 291
DHCP Snooping............................................................................................................................................................291
Drop DHCP Packets on Snooped VLANs Only....................................................................................................... 295
Dynamic ARP Inspection............................................................................................................................................ 296
Configuring Dynamic ARP Inspection.......................................................................................................................296
Contents
9
Source Address Validation................................................................................................................................................297
Enabling IP Source Address Validation..................................................................................................................... 298
DHCP MAC Source Address Validation................................................................................................................... 298
Enabling IP+MAC Source Address Validation..........................................................................................................298
Viewing the Number of SAV Dropped Packets.......................................................................................................299
Clearing the Number of SAV Dropped Packets...................................................................................................... 299
14 Equal Cost Multi-Path (ECMP)................................................................................................ 300
ECMP for Flow-Based Affinity........................................................................................................................................300
Configuring the Hash Algorithm Seed......................................................................................................................300
Link Bundle Monitoring.....................................................................................................................................................300
Managing ECMP Group Paths................................................................................................................................... 301
Creating an ECMP Group Bundle.............................................................................................................................. 301
Modifying the ECMP Group Threshold.....................................................................................................................301
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table........................................302
Support for ECMP in host table................................................................................................................................302
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ........................................................................... 303
RTAG7.......................................................................................................................................................................... 303
Flow-based Hashing for ECMP.................................................................................................................................304
15 FIP Snooping.......................................................................................................................... 307
Fibre Channel over Ethernet............................................................................................................................................307
Ensure Robustness in a Converged Ethernet Network............................................................................................... 307
FIP Snooping on Ethernet Bridges..................................................................................................................................308
Using FIP Snooping............................................................................................................................................................310
FIP Snooping Prerequisites.........................................................................................................................................310
Important Points to Remember..................................................................................................................................310
Enabling the FCoE Transit Feature.............................................................................................................................311
Enable FIP Snooping on VLANs.................................................................................................................................. 311
Configure the FC-MAP Value.....................................................................................................................................312
Configure a Port for a Bridge-to-Bridge Link........................................................................................................... 312
Configure a Port for a Bridge-to-FCF Link...............................................................................................................312
Impact on Other Software Features..........................................................................................................................312
FIP Snooping Restrictions...........................................................................................................................................313
Configuring FIP Snooping........................................................................................................................................... 313
Displaying FIP Snooping Information............................................................................................................................... 313
FCoE Transit Configuration Example.............................................................................................................................. 318
16 Flex Hash and Optimized Boot-Up............................................................................................ 320
Flex Hash Capability Overview........................................................................................................................................320
Configuring the Flex Hash Mechanism...........................................................................................................................320
Configuring Fast Boot and LACP Fast Switchover.......................................................................................................321
Optimizing the Boot Time................................................................................................................................................. 321
Interoperation of Applications with Fast Boot and System States.............................................................................322
RDMA Over Converged Ethernet (RoCE) Overview...................................................................................................324
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces........................................................................................ 325
17 Force10 Resilient Ring Protocol (FRRP).................................................................................... 326
Protocol Overview............................................................................................................................................................ 326
10
Contents
Ring Status................................................................................................................................................................... 327
Multiple FRRP Rings....................................................................................................................................................327
Important FRRP Points...............................................................................................................................................328
Important FRRP Concepts.........................................................................................................................................329
Implementing FRRP.......................................................................................................................................................... 329
FRRP Configuration..........................................................................................................................................................330
Creating the FRRP Group.......................................................................................................................................... 330
Configuring the Control VLAN...................................................................................................................................330
Configuring and Adding the Member VLANs........................................................................................................... 331
Setting the FRRP Timers........................................................................................................................................... 332
Clearing the FRRP Counters......................................................................................................................................332
Viewing the FRRP Configuration...............................................................................................................................332
Viewing the FRRP Information.................................................................................................................................. 332
Troubleshooting FRRP......................................................................................................................................................333
Sample Configuration and Topology...............................................................................................................................333
FRRP Support on VLT......................................................................................................................................................334
18 GARP VLAN Registration Protocol (GVRP)................................................................................337
Configure GVRP................................................................................................................................................................ 337
Enabling GVRP Globally....................................................................................................................................................338
Enabling GVRP on a Layer 2 Interface........................................................................................................................... 339
Configure GVRP Registration..........................................................................................................................................339
Configure a GARP Timer..................................................................................................................................................339
19 Internet Group Management Protocol (IGMP)............................................................................341
IGMP Protocol Overview..................................................................................................................................................341
IGMP Version 2............................................................................................................................................................ 341
IGMP Version 3............................................................................................................................................................342
Configure IGMP.................................................................................................................................................................345
Viewing IGMP Enabled Interfaces...................................................................................................................................345
Selecting an IGMP Version.............................................................................................................................................. 346
Viewing IGMP Groups.......................................................................................................................................................347
Adjusting Timers................................................................................................................................................................ 347
Adjusting Query and Response Timers..................................................................................................................... 347
Enabling IGMP Immediate-Leave....................................................................................................................................348
IGMP Snooping..................................................................................................................................................................348
Configuring IGMP Snooping...................................................................................................................................... 348
Removing a Group-Port Association........................................................................................................................ 349
Disabling Multicast Flooding.......................................................................................................................................349
Specifying a Port as Connected to a Multicast Router..........................................................................................349
Configuring the Switch as Querier............................................................................................................................350
Fast Convergence after MSTP Topology Changes..................................................................................................... 350
Egress Interface Selection (EIS) for HTTP and IGMP Applications...........................................................................350
Designating a Multicast Router Interface...................................................................................................................... 356
20 Interfaces.............................................................................................................................. 357
Interface Types..................................................................................................................................................................358
View Basic Interface Information.................................................................................................................................... 358
Resetting an Interface to its Factory Default State..................................................................................................... 360
Contents
11
Enabling a Physical Interface...........................................................................................................................................360
Physical Interfaces.............................................................................................................................................................361
Configuration Task List for Physical Interfaces........................................................................................................361
Overview of Layer Modes...........................................................................................................................................361
Configuring Layer 2 (Data Link) Mode..................................................................................................................... 362
Configuring Layer 2 (Interface) Mode......................................................................................................................362
Configuring Layer 3 (Network) Mode...................................................................................................................... 362
Configuring Layer 3 (Interface) Mode......................................................................................................................363
Automatic recovery of an Err-disabled interface..........................................................................................................363
Configuring an automatic recovery for an Err-disabled interface.........................................................................364
Egress Interface Selection (EIS)..................................................................................................................................... 364
Configuring EIS............................................................................................................................................................365
Management Interfaces................................................................................................................................................... 365
Configuring Management Interfaces........................................................................................................................365
Configuring a Management Interface on an Ethernet Port...................................................................................366
S6100 — OIR...............................................................................................................................................................367
VLAN Interfaces................................................................................................................................................................ 367
Loopback Interfaces......................................................................................................................................................... 368
Null Interfaces....................................................................................................................................................................368
Configuring Port Delay..................................................................................................................................................... 368
Port Channel Interfaces................................................................................................................................................... 369
Port Channel Definition and Standards.................................................................................................................... 369
Port Channel Benefits.................................................................................................................................................369
Port Channel Implementation.................................................................................................................................... 369
Interfaces in Port Channels........................................................................................................................................370
Configuration Tasks for Port Channel Interfaces....................................................................................................370
Creating a Port Channel............................................................................................................................................. 370
Adding a Physical Interface to a Port Channel......................................................................................................... 371
Reassigning an Interface to a New Port Channel....................................................................................................372
Configuring the Minimum Oper Up Links in a Port Channel.................................................................................. 373
Adding or Removing a Port Channel from a VLAN................................................................................................. 373
Assigning an IP Address to a Port Channel..............................................................................................................374
Deleting or Disabling a Port Channel.........................................................................................................................374
Load Balancing Through Port Channels................................................................................................................... 374
Load-Balancing Method............................................................................................................................................. 375
Changing the Hash Algorithm....................................................................................................................................375
Bulk Configuration.............................................................................................................................................................376
Interface Range........................................................................................................................................................... 376
Bulk Configuration Examples..................................................................................................................................... 376
Defining Interface Range Macros....................................................................................................................................378
Define the Interface Range........................................................................................................................................ 378
Choosing an Interface-Range Macro........................................................................................................................378
Monitoring and Maintaining Interfaces...........................................................................................................................378
Split 40G Ports on a 16X40G QSFP+ Module...............................................................................................................379
Splitting 100G Ports..........................................................................................................................................................380
Link Dampening..................................................................................................................................................................381
Enabling Link Dampening............................................................................................................................................384
Link Bundle Monitoring.....................................................................................................................................................385
Using Ethernet Pause Frames for Flow Control........................................................................................................... 385
Enabling Pause Frames...............................................................................................................................................386
12
Contents
Configure the MTU Size on an Interface.......................................................................................................................386
Port-Pipes.......................................................................................................................................................................... 387
CR4 Auto-Negotiation...................................................................................................................................................... 387
FEC Configuration.............................................................................................................................................................388
Setting the Speed of Ethernet Interfaces..................................................................................................................... 389
Syslog Warning Upon Connecting SFP28 Optics with QSA....................................................................................... 390
Adjusting the Keepalive Timer......................................................................................................................................... 390
View Advanced Interface Information............................................................................................................................390
Configuring the Interface Sampling Size...................................................................................................................391
Configuring the Traffic Sampling Size Globally............................................................................................................. 392
Dynamic Counters.............................................................................................................................................................393
Clearing Interface Counters.......................................................................................................................................394
Enhanced Validation of Interface Ranges...................................................................................................................... 394
Compressing Configuration Files.....................................................................................................................................395
21 IPv4 Routing........................................................................................................................... 397
IP Addresses...................................................................................................................................................................... 398
Configuration Tasks for IP Addresses............................................................................................................................ 398
Assigning IP Addresses to an Interface..........................................................................................................................398
Configuring Static Routes................................................................................................................................................399
Adding description for IPv4 and IPv6 static routes................................................................................................ 400
Configure Static Routes for the Management Interface.............................................................................................400
IPv4 Path MTU Discovery Overview.............................................................................................................................. 401
Using the Configured Source IP Address in ICMP Messages......................................................................................401
Configuring the Duration to Establish a TCP Connection........................................................................................... 402
Enabling Directed Broadcast........................................................................................................................................... 402
Resolution of Host Names............................................................................................................................................... 402
Enabling Dynamic Resolution of Host Names............................................................................................................... 403
Specifying the Local System Domain and a List of Domains.......................................................................................403
Configuring DNS with Traceroute.................................................................................................................................. 403
ARP..................................................................................................................................................................................... 404
Configuration Tasks for ARP........................................................................................................................................... 404
Configuring Static ARP Entries....................................................................................................................................... 404
Enabling Proxy ARP.......................................................................................................................................................... 405
Clearing ARP Cache......................................................................................................................................................... 405
ARP Learning via Gratuitous ARP...................................................................................................................................405
Enabling ARP Learning via Gratuitous ARP...................................................................................................................406
ARP Learning via ARP Request.......................................................................................................................................406
Configuring ARP Retries...................................................................................................................................................407
ICMP................................................................................................................................................................................... 407
Configuration Tasks for ICMP......................................................................................................................................... 407
Enabling ICMP Unreachable Messages..........................................................................................................................407
ICMP Redirects................................................................................................................................................................. 407
UDP Helper........................................................................................................................................................................ 408
Enabling UDP Helper........................................................................................................................................................ 409
Configurations Using UDP Helper...................................................................................................................................409
UDP Helper with Broadcast-All Addresses....................................................................................................................409
UDP Helper with Subnet Broadcast Addresses.............................................................................................................410
UDP Helper with Configured Broadcast Addresses......................................................................................................410
UDP Helper with No Configured Broadcast Addresses.................................................................................................411
Contents
13
Troubleshooting UDP Helper.............................................................................................................................................411
22 IPv6 Routing...........................................................................................................................412
Protocol Overview............................................................................................................................................................. 412
Extended Address Space............................................................................................................................................ 412
Stateless Autoconfiguration........................................................................................................................................412
IPv6 Headers................................................................................................................................................................ 413
Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support....................................................................... 413
IPv6 Header Fields....................................................................................................................................................... 414
Extension Header Fields..............................................................................................................................................415
Addressing.....................................................................................................................................................................416
Implementing IPv6 with Dell EMC Networking OS........................................................................................................417
ICMPv6................................................................................................................................................................................417
Path MTU discovery..........................................................................................................................................................417
IPv6 Neighbor Discovery...................................................................................................................................................418
IPv6 Neighbor Discovery of MTU Packets...............................................................................................................419
Configuring the IPv6 Recursive DNS Server............................................................................................................419
Debugging IPv6 RDNSS Information Sent to the Host .........................................................................................420
Displaying IPv6 RDNSS Information......................................................................................................................... 420
Secure Shell (SSH) Over an IPv6 Transport..................................................................................................................421
Configuration Tasks for IPv6............................................................................................................................................421
Adjusting Your CAM-Profile........................................................................................................................................421
Assigning an IPv6 Address to an Interface.............................................................................................................. 422
Assigning a Static IPv6 Route....................................................................................................................................422
Configuring Telnet with IPv6..................................................................................................................................... 423
SNMP over IPv6..........................................................................................................................................................423
Displaying IPv6 Information........................................................................................................................................423
Displaying an IPv6 Interface Information..................................................................................................................423
Showing IPv6 Routes..................................................................................................................................................424
Showing the Running-Configuration for an Interface............................................................................................ 425
Clearing IPv6 Routes.................................................................................................................................................. 426
Disabling ND Entry Timeout.......................................................................................................................................426
Configuring IPv6 RA Guard..............................................................................................................................................426
Configuring IPv6 RA Guard on an Interface............................................................................................................ 428
Monitoring IPv6 RA Guard......................................................................................................................................... 428
23 iSCSI Optimization................................................................................................................. 429
iSCSI Optimization Overview...........................................................................................................................................429
Monitoring iSCSI Traffic Flows..................................................................................................................................430
Application of Quality of Service to iSCSI Traffic Flows........................................................................................ 430
Information Monitored in iSCSI Traffic Flows.......................................................................................................... 431
Detection and Auto-Configuration for Dell EqualLogic Arrays...............................................................................431
Configuring Detection and Ports for Dell Compellent Arrays................................................................................ 432
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................. 432
Enable and Disable iSCSI Optimization.....................................................................................................................433
Default iSCSI Optimization Values.................................................................................................................................. 433
iSCSI Optimization Prerequisites.....................................................................................................................................433
Configuring iSCSI Optimization....................................................................................................................................... 434
Displaying iSCSI Optimization Information.....................................................................................................................435
14
Contents
24 Intermediate System to Intermediate System............................................................................437
IS-IS Protocol Overview................................................................................................................................................... 437
IS-IS Addressing................................................................................................................................................................ 437
Multi-Topology IS-IS......................................................................................................................................................... 438
Transition Mode...........................................................................................................................................................438
Interface Support........................................................................................................................................................ 438
Adjacencies...................................................................................................................................................................438
Graceful Restart................................................................................................................................................................439
Timers........................................................................................................................................................................... 439
Implementation Information.............................................................................................................................................439
Configuration Information................................................................................................................................................ 440
Configuration Tasks for IS-IS.....................................................................................................................................440
Configuring the Distance of a Route.........................................................................................................................447
Changing the IS-Type................................................................................................................................................. 447
Redistributing IPv4 Routes.........................................................................................................................................449
Redistributing IPv6 Routes........................................................................................................................................ 450
Configuring Authentication Passwords....................................................................................................................450
Setting the Overload Bit..............................................................................................................................................451
Debugging IS-IS............................................................................................................................................................451
IS-IS Metric Styles............................................................................................................................................................ 452
Configure Metric Values...................................................................................................................................................452
Maximum Values in the Routing Table..................................................................................................................... 452
Change the IS-IS Metric Style in One Level Only................................................................................................... 452
Leaks from One Level to Another............................................................................................................................. 454
Sample Configurations......................................................................................................................................................454
25 In-Service Software Upgrade...................................................................................................457
ISSU Introduction.............................................................................................................................................................. 457
Fastboot 2.0 (Zero Loss Upgrade)................................................................................................................................. 457
L2 ISSU...............................................................................................................................................................................457
L3 ISSU...............................................................................................................................................................................458
CoPP...................................................................................................................................................................................458
Mirroring flow control packets........................................................................................................................................ 459
PFC..................................................................................................................................................................................... 459
QoS..................................................................................................................................................................................... 459
Tunnel Configuration........................................................................................................................................................ 459
26 Link Aggregation Control Protocol (LACP)................................................................................460
Introduction to Dynamic LAGs and LACP......................................................................................................................460
Important Points to Remember.................................................................................................................................460
LACP Modes................................................................................................................................................................460
Configuring LACP Commands....................................................................................................................................461
LACP Configuration Tasks................................................................................................................................................461
Creating a LAG............................................................................................................................................................. 461
Configuring the LAG Interfaces as Dynamic............................................................................................................462
Setting the LACP Long Timeout............................................................................................................................... 462
Monitoring and Debugging LACP..............................................................................................................................463
Shared LAG State Tracking............................................................................................................................................. 463
Contents
15
Configuring Shared LAG State Tracking..................................................................................................................464
Important Points about Shared LAG State Tracking..............................................................................................465
LACP Basic Configuration Example................................................................................................................................465
Configure a LAG on ALPHA.......................................................................................................................................465
27 Layer 2................................................................................................................................... 473
Manage the MAC Address Table.................................................................................................................................... 473
Clearing the MAC Address Table...............................................................................................................................473
Setting the Aging Time for Dynamic Entries............................................................................................................473
Configuring a Static MAC Address........................................................................................................................... 473
Displaying the MAC Address Table........................................................................................................................... 474
MAC Learning Limit...........................................................................................................................................................474
Setting the MAC Learning Limit................................................................................................................................ 474
mac learning-limit Dynamic.........................................................................................................................................475
mac learning-limit mac-address-sticky..................................................................................................................... 475
mac learning-limit station-move................................................................................................................................ 475
mac learning-limit no-station-move.......................................................................................................................... 475
Learning Limit Violation Actions.................................................................................................................................476
Setting Station Move Violation Actions....................................................................................................................476
Recovering from Learning Limit and Station Move Violations...............................................................................476
Disabling MAC Address Learning on the System.................................................................................................... 477
Enabling port security..................................................................................................................................................477
NIC Teaming.......................................................................................................................................................................477
Configure Redundant Pairs.............................................................................................................................................. 478
Far-End Failure Detection.................................................................................................................................................481
FEFD State Changes................................................................................................................................................... 481
Configuring FEFD........................................................................................................................................................ 482
Enabling FEFD on an Interface.................................................................................................................................. 483
Debugging FEFD..........................................................................................................................................................483
28 Link Layer Discovery Protocol (LLDP)...................................................................................... 485
802.1AB (LLDP) Overview...............................................................................................................................................485
Protocol Data Units.....................................................................................................................................................485
Optional TLVs.................................................................................................................................................................... 486
Management TLVs......................................................................................................................................................486
TIA-1057 (LLDP-MED) Overview................................................................................................................................... 487
TIA Organizationally Specific TLVs........................................................................................................................... 488
Configure LLDP..................................................................................................................................................................491
CONFIGURATION versus INTERFACE Configurations................................................................................................491
Enabling LLDP....................................................................................................................................................................492
Disabling and Undoing LLDP......................................................................................................................................492
Enabling LLDP on Management Ports........................................................................................................................... 492
Disabling and Undoing LLDP on Management Ports..............................................................................................493
Advertising TLVs............................................................................................................................................................... 493
Storing and Viewing Unrecognized LLDP TLVs............................................................................................................494
Viewing the LLDP Configuration.....................................................................................................................................495
Viewing Information Advertised by Adjacent LLDP Neighbors...................................................................................495
Examples of Viewing Information Advertised by Neighbors..................................................................................495
Configuring LLDPDU Intervals.........................................................................................................................................498
16
Contents
Configuring LLDP Notification Interval...........................................................................................................................498
Configuring Transmit and Receive Mode.......................................................................................................................499
Configuring the Time to Live Value.................................................................................................................................499
Debugging LLDP............................................................................................................................................................... 500
Relevant Management Objects....................................................................................................................................... 501
29 Microsoft Network Load Balancing...........................................................................................505
Configuring a Switch for NLB ........................................................................................................................................ 506
Enabling a Switch for Multicast NLB........................................................................................................................506
30 Multicast Source Discovery Protocol (MSDP)........................................................................... 508
Anycast RP........................................................................................................................................................................ 509
Implementation Information..............................................................................................................................................510
Configure Multicast Source Discovery Protocol............................................................................................................510
Related Configuration Tasks.......................................................................................................................................510
Enable MSDP......................................................................................................................................................................514
Manage the Source-Active Cache.................................................................................................................................. 515
Viewing the Source-Active Cache.............................................................................................................................515
Limiting the Source-Active Cache.............................................................................................................................515
Clearing the Source-Active Cache............................................................................................................................ 515
Enabling the Rejected Source-Active Cache........................................................................................................... 516
Accept Source-Active Messages that Fail the RFP Check......................................................................................... 516
Specifying Source-Active Messages...............................................................................................................................518
Limiting the Source-Active Messages from a Peer.......................................................................................................519
Preventing MSDP from Caching a Local Source...........................................................................................................519
Preventing MSDP from Caching a Remote Source......................................................................................................519
Preventing MSDP from Advertising a Local Source.................................................................................................... 520
Logging Changes in Peership States...............................................................................................................................521
Terminating a Peership......................................................................................................................................................521
Clearing Peer Statistics.....................................................................................................................................................521
Debugging MSDP..............................................................................................................................................................522
MSDP with Anycast RP................................................................................................................................................... 522
Configuring Anycast RP................................................................................................................................................... 523
Reducing Source-Active Message Flooding............................................................................................................ 524
Specifying the RP Address Used in SA Messages..................................................................................................524
MSDP Sample Configurations.........................................................................................................................................526
31 Multicast Listener Discovery Protocol.......................................................................................529
MLD timers........................................................................................................................................................................ 532
Reducing Host Response Burstiness........................................................................................................................532
Configuring MLD Version.................................................................................................................................................533
Clearing MLD groups........................................................................................................................................................ 533
Debugging MLD.................................................................................................................................................................533
Explicit Tracking................................................................................................................................................................ 533
Reducing Leave Latency..................................................................................................................................................533
Displaying MLD groups table........................................................................................................................................... 533
Displaying MLD Interfaces............................................................................................................................................... 534
MLD Snooping...................................................................................................................................................................534
Enable MLD Snooping................................................................................................................................................ 534
Contents
17
Disable MLD Snooping................................................................................................................................................534
Configure the switch as a querier............................................................................................................................. 535
Specify port as connected to multicast router........................................................................................................535
Enable Snooping Explicit Tracking............................................................................................................................ 535
Display the MLD Snooping Table.............................................................................................................................. 535
32 Multiple Spanning Tree Protocol (MSTP)................................................................................. 536
Spanning Tree Variations..................................................................................................................................................537
Implementation Information....................................................................................................................................... 537
Configure Multiple Spanning Tree Protocol...................................................................................................................537
Related Configuration Tasks...................................................................................................................................... 537
Enable Multiple Spanning Tree Globally......................................................................................................................... 538
Adding and Removing Interfaces.................................................................................................................................... 538
Creating Multiple Spanning Tree Instances................................................................................................................... 538
Influencing MSTP Root Selection................................................................................................................................... 539
Interoperate with Non-Dell Bridges................................................................................................................................ 539
Changing the Region Name or Revision.........................................................................................................................540
Modifying Global Parameters.......................................................................................................................................... 540
Modifying the Interface Parameters............................................................................................................................... 541
Setting STP path cost as constant.................................................................................................................................542
Configuring an EdgePort..................................................................................................................................................542
Flush MAC Addresses after a Topology Change.......................................................................................................... 543
MSTP Sample Configurations......................................................................................................................................... 543
Debugging and Verifying MSTP Configurations........................................................................................................... 545
33 Multicast Features.................................................................................................................. 547
Enabling IP Multicast.........................................................................................................................................................547
Implementation Information............................................................................................................................................. 547
Multicast Policies...............................................................................................................................................................548
IPv4 Multicast Policies................................................................................................................................................548
Understanding Multicast Traceroute (mtrace).............................................................................................................555
Printing Multicast Traceroute (mtrace) Paths..............................................................................................................555
Supported Error Codes.................................................................................................................................................... 557
mtrace Scenarios...............................................................................................................................................................557
34 Object Tracking......................................................................................................................563
Object Tracking Overview............................................................................................................................................... 563
Track Layer 2 Interfaces............................................................................................................................................ 564
Track Layer 3 Interfaces............................................................................................................................................ 564
Track IPv4 and IPv6 Routes...................................................................................................................................... 564
Set Tracking Delays.................................................................................................................................................... 565
VRRP Object Tracking................................................................................................................................................566
Object Tracking Configuration........................................................................................................................................ 566
Tracking a Layer 2 Interface......................................................................................................................................566
Tracking a Layer 3 Interface...................................................................................................................................... 567
Track an IPv4/IPv6 Route......................................................................................................................................... 568
Displaying Tracked Objects...............................................................................................................................................571
35 Open Shortest Path First (OSPFv2 and OSPFv3)...................................................................... 573
18
Contents
Protocol Overview............................................................................................................................................................ 573
Autonomous System (AS) Areas...............................................................................................................................573
Area Types....................................................................................................................................................................574
Networks and Neighbors............................................................................................................................................575
Router Types................................................................................................................................................................575
Designated and Backup Designated Routers...........................................................................................................576
Link-State Advertisements (LSAs)........................................................................................................................... 576
Router Priority and Cost.............................................................................................................................................577
OSPF with Dell EMC Networking OS.............................................................................................................................578
Graceful Restart.......................................................................................................................................................... 578
Fast Convergence (OSPFv2, IPv4 Only)................................................................................................................. 579
Multi-Process OSPFv2 with VRF..............................................................................................................................579
RFC-2328 Compliant OSPF Flooding.......................................................................................................................580
OSPF ACK Packing......................................................................................................................................................581
Setting OSPF Adjacency with Cisco Routers.......................................................................................................... 581
Configuration Information.................................................................................................................................................581
Configuration Task List for OSPFv2 (OSPF for IPv4)........................................................................................... 582
OSPFv3 NSSA...................................................................................................................................................................593
Configuration Task List for OSPFv3 (OSPF for IPv6).................................................................................................594
Enabling IPv6 Unicast Routing.................................................................................................................................. 594
Assigning IPv6 Addresses on an Interface...............................................................................................................595
Assigning Area ID on an Interface............................................................................................................................. 595
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................... 595
Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................... 596
Applying cost for OSPFv3..........................................................................................................................................596
Configuring Stub Areas.............................................................................................................................................. 596
Configuring Passive-Interface................................................................................................................................... 596
Redistributing Routes..................................................................................................................................................597
Configuring a Default Route.......................................................................................................................................597
Applying cost for OSPFv3..........................................................................................................................................597
Enabling OSPFv3 Graceful Restart...........................................................................................................................598
OSPFv3 Authentication Using IPsec........................................................................................................................ 600
Troubleshooting OSPFv3...........................................................................................................................................605
MIB Support for OSPFv3.................................................................................................................................................606
Viewing the OSPFv3 MIB.......................................................................................................................................... 606
36 Policy-based Routing (PBR).................................................................................................... 608
Overview............................................................................................................................................................................ 608
Implementing PBR............................................................................................................................................................ 609
Configuration Task List for Policy-based Routing........................................................................................................ 609
Create a Redirect List..................................................................................................................................................610
Create a Rule for a Redirect-list.................................................................................................................................610
Apply a Redirect-list to an Interface using a Redirect-group..................................................................................611
Sample Configuration........................................................................................................................................................ 613
37 PIM Sparse-Mode (PIM-SM)....................................................................................................618
Implementation Information..............................................................................................................................................618
Protocol Overview.............................................................................................................................................................618
Requesting Multicast Traffic...................................................................................................................................... 618
Contents
19
Refuse Multicast Traffic..............................................................................................................................................618
Send Multicast Traffic.................................................................................................................................................619
Configuring PIM-SM......................................................................................................................................................... 619
Related Configuration Tasks.......................................................................................................................................619
Enable PIM-SM.................................................................................................................................................................. 619
Configuring S,G Expiry Timers......................................................................................................................................... 621
Configuring a Static Rendezvous Point......................................................................................................................... 622
Overriding Bootstrap Router Updates......................................................................................................................622
Configuring a Designated Router....................................................................................................................................623
Creating Multicast Boundaries and Domains.................................................................................................................624
Electing an RP using the BSR Mechanism.................................................................................................................... 624
38 PIM Source-Specific Mode (PIM-SSM).................................................................................... 626
Implementation Information.............................................................................................................................................626
Configure PIM-SSM......................................................................................................................................................... 626
Enabling PIM-SSM............................................................................................................................................................ 627
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................... 627
Electing an RP using the BSR Mechanism.................................................................................................................... 628
Enabling RP to Server Specific Multicast Groups...................................................................................................629
39 Port Monitoring...................................................................................................................... 631
Important Points to Remember....................................................................................................................................... 631
Port Monitoring..................................................................................................................................................................631
Configuring Port Monitoring............................................................................................................................................633
Configuring Monitor Multicast Queue............................................................................................................................ 634
Flow-Based Monitoring.................................................................................................................................................... 634
Enabling Flow-Based Monitoring...............................................................................................................................636
Configuring IPv6 Flow-Based Mirroring................................................................................................................... 637
Remote Port Mirroring..................................................................................................................................................... 639
Remote Port Mirroring Example................................................................................................................................639
Configuring Remote Port Mirroring.......................................................................................................................... 640
Displaying Remote-Port Mirroring Configurations...................................................................................................641
Configuration procedure for Remote Port Mirroring..............................................................................................642
Encapsulated Remote Port Monitoring..........................................................................................................................646
ERPM Behavior on a typical Dell EMC Networking OS ..............................................................................................648
Port Monitoring on VLT................................................................................................................................................... 649
40 Private VLANs (PVLAN).......................................................................................................... 652
Private VLAN Concepts................................................................................................................................................... 652
Using the Private VLAN Commands.............................................................................................................................. 653
Configuration Task List.....................................................................................................................................................654
Creating PVLAN ports................................................................................................................................................654
Creating a Primary VLAN........................................................................................................................................... 654
Creating a Community VLAN.................................................................................................................................... 655
Creating an Isolated VLAN.........................................................................................................................................656
Private VLAN Configuration Example.............................................................................................................................657
Inspecting the Private VLAN Configuration.................................................................................................................. 658
41 Per-VLAN Spanning Tree Plus (PVST+).................................................................................... 660
20
Contents
/