Force10

Dell Force10, Force10 MXL Blade User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell Force10 User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Networking Configuration Guide for the
MXL 10/40GbE Switch I/O Module
9.6(0.0)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 09
Rev. A00
Contents
1 About this Guide................................................................................................. 32
Audience..............................................................................................................................................32
Conventions........................................................................................................................................ 32
Information Symbols...........................................................................................................................32
Related Documents............................................................................................................................ 33
2 Configuration Fundamentals........................................................................... 34
Accessing the Command Line............................................................................................................34
CLI Modes............................................................................................................................................34
Navigating CLI Modes................................................................................................................... 36
The do Command...............................................................................................................................39
Undoing Commands...........................................................................................................................39
Obtaining Help....................................................................................................................................40
Entering and Editing Commands....................................................................................................... 40
Command History............................................................................................................................... 41
Filtering show Command Outputs.....................................................................................................42
Multiple Users in Configuration Mode............................................................................................... 43
3 Getting Started................................................................................................... 44
Console Access...................................................................................................................................45
Serial Console................................................................................................................................45
External Serial Port with a USB Connector...................................................................................47
Accessing the CLI Interface and Running Scripts Using SSH............................................................ 47
Entering CLI commands Using an SSH Connection....................................................................47
Executing Local CLI Scripts Using an SSH Connection...............................................................47
Boot Process....................................................................................................................................... 48
Default Configuration......................................................................................................................... 50
Configuring a Host Name...................................................................................................................50
Configuring a Host Name...................................................................................................................50
Accessing the System Remotely.........................................................................................................51
Accessing the MXL Switch Remotely............................................................................................51
Configure the Management Port IP Address................................................................................51
Configure a Management Route...................................................................................................51
Configuring a Username and Password.......................................................................................52
Configuring the Enable Password...................................................................................................... 52
Configuration File Management.........................................................................................................53
Copy Files to and from the System.............................................................................................. 53
Save the Running-Configuration..................................................................................................54
Viewing Files.................................................................................................................................. 55
Managing the File System...................................................................................................................56
View the Command History................................................................................................................57
Using HTTP for File Transfers............................................................................................................. 58
Upgrading and Downgrading the Dell Networking OS.....................................................................58
Using Hashes to Validate Software Images........................................................................................58
4 Management....................................................................................................... 60
Configuring Privilege Levels............................................................................................................... 60
Creating a Custom Privilege Level............................................................................................... 60
Customizing a Privilege Level....................................................................................................... 61
Applying a Privilege Level to a Username.................................................................................... 62
Applying a Privilege Level to a Terminal Line...............................................................................63
Configuring Logging...........................................................................................................................63
Audit and Security Logs.................................................................................................................63
Configuring Logging Format ...................................................................................................... 65
Setting Up a Secure Connection to a Syslog Server....................................................................66
Display the Logging Buffer and the Logging Configuration..............................................................67
Log Messages in the Internal Buffer...................................................................................................68
Configuration Task List for System Log Management................................................................ 68
Disabling System Logging.................................................................................................................. 68
Sending System Messages to a Syslog Server................................................................................... 68
Configuring a UNIX System as a Syslog Server............................................................................68
Changing System Logging Settings................................................................................................... 69
Display the Logging Buffer and the Logging Configuration............................................................. 70
Configuring a UNIX Logging Facility Level.........................................................................................70
Synchronizing Log Messages..............................................................................................................72
Enabling Timestamp on Syslog Messages..........................................................................................72
File Transfer Services...........................................................................................................................73
Configuration Task List for File Transfer Services........................................................................ 73
Enabling the FTP Server.................................................................................................................73
Configuring FTP Server Parameters..............................................................................................73
Configuring FTP Client Parameters.............................................................................................. 74
Terminal Lines..................................................................................................................................... 74
Denying and Permitting Access to a Terminal Line..................................................................... 74
Configuring Login Authentication for Terminal Lines..................................................................75
Setting Time Out of EXEC Privilege Mode......................................................................................... 76
Using Telnet to get to Another Network Device................................................................................77
Lock CONFIGURATION Mode............................................................................................................ 77
Viewing the Configuration Lock Status........................................................................................78
Recovering from a Forgotten Password............................................................................................ 78
Recovering from a Forgotten Enable Password................................................................................ 79
Recovering from a Failed Start........................................................................................................... 80
5 802.1X................................................................................................................... 81
The Port-Authentication Process.......................................................................................................83
EAP over RADIUS...........................................................................................................................85
Configuring 802.1X............................................................................................................................. 85
Related Configuration Tasks.........................................................................................................85
Important Points to Remember......................................................................................................... 86
Enabling 802.1X...................................................................................................................................86
Configuring Request Identity Re-Transmissions......................................................................... 88
Configuring a Quiet Period after a Failed Authentication........................................................... 88
Forcibly Authorizing or Unauthorizing a Port....................................................................................89
Re-Authenticating a Port....................................................................................................................90
Configuring Timeouts......................................................................................................................... 91
Configuring Dynamic VLAN Assignment with Port Authentication..................................................92
Guest and Authentication-Fail VLANs.......................................................................................... 93
Configuring a Guest VLAN............................................................................................................94
Configuring an Authentication-Fail VLAN....................................................................................94
6 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)........................................................................................................96
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...........................................96
Guidelines for Configuring ACL VLAN groups................................................................................... 97
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters..........................98
Configuring ACL VLAN Groups.................................................................................................... 98
Configuring FP Blocks for VLAN Parameters............................................................................... 99
Viewing CAM Usage..........................................................................................................................100
Allocating FP Blocks for VLAN Processes.........................................................................................101
7 Access Control Lists (ACLs).............................................................................103
IP Access Control Lists (ACLs).......................................................................................................... 103
Implementing ACL on the Dell Networking OS.............................................................................. 104
ACLs and VLANs................................................................................................................................104
ACL Optimization..............................................................................................................................104
Determine the Order in which ACLs are Used to Classify Traffic...................................................104
Example of the order Keyword to Determine ACL Sequence...................................................105
IP Fragment Handling....................................................................................................................... 105
IP Fragments ACL Examples............................................................................................................. 105
Layer 4 ACL Rules Examples.............................................................................................................106
Configure a Standard IP ACL............................................................................................................ 107
Configuring a Standard IP ACL Filter................................................................................................108
Configure an Extended IP ACL.........................................................................................................109
Configuring Filters with a Sequence Number..................................................................................109
Configuring Filters Without a Sequence Number............................................................................110
Established Flag................................................................................................................................. 110
Configure Layer 2 and Layer 3 ACLs................................................................................................. 111
Assign an IP ACL to an Interface....................................................................................................... 111
Applying an IP ACL.............................................................................................................................112
Counting ACL Hits............................................................................................................................. 112
Configure Ingress ACLs..................................................................................................................... 113
Configure Egress ACLs...................................................................................................................... 113
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................114
IP Prefix Lists...................................................................................................................................... 115
Implementation Information.......................................................................................................115
Configuration Task List for Prefix Lists..............................................................................................115
Creating a Prefix List..........................................................................................................................116
Creating a Prefix List Without a Sequence Number.........................................................................117
Viewing Prefix Lists............................................................................................................................ 117
Applying a Prefix List for Route Redistribution.................................................................................118
Applying a Filter to a Prefix List (OSPF)............................................................................................. 119
ACL Resequencing............................................................................................................................ 119
Resequencing an ACL or Prefix List..................................................................................................120
Route Maps........................................................................................................................................ 121
Implementation Information.......................................................................................................122
Important Points to Remember........................................................................................................122
Configuration Task List for Route Maps........................................................................................... 122
Creating a Route Map....................................................................................................................... 122
Configure Route Map Filters.............................................................................................................124
Configuring Match Routes................................................................................................................125
Configuring Set Conditions.............................................................................................................. 126
Configure a Route Map for Route Redistribution............................................................................ 126
Configure a Route Map for Route Tagging...................................................................................... 127
Continue Clause................................................................................................................................127
Logging of ACL Processes................................................................................................................ 128
Guidelines for Configuring ACL Logging......................................................................................... 129
Configuring ACL Logging................................................................................................................. 130
Flow-Based Monitoring Support for ACLs.......................................................................................130
Behavior of Flow-Based Monitoring........................................................................................... 131
Enabling Flow-Based Monitoring..................................................................................................... 132
8 Bidirectional Forwarding Detection (BFD).................................................. 134
How BFD Works................................................................................................................................ 134
BFD Packet Format......................................................................................................................135
BFD Sessions................................................................................................................................137
BFD Three-Way Handshake........................................................................................................ 137
Session State Changes................................................................................................................ 138
Important Points to Remember........................................................................................................139
Configure BFD...................................................................................................................................139
Configure BFD for Physical Ports............................................................................................... 140
Enabling BFD Globally.................................................................................................................140
Establishing a Session on Physical Ports.....................................................................................141
Changing Physical Port Session Parameters..............................................................................142
Disabling and Re-Enabling BFD..................................................................................................143
Configure BFD for Static Routes.......................................................................................................143
Related Configuration Tasks.......................................................................................................144
Establishing Sessions for Static Routes...................................................................................... 144
Changing Static Route Session Parameters............................................................................... 145
Disabling BFD for Static Routes.................................................................................................. 145
Configure BFD for OSPF................................................................................................................... 145
Related Configuration Tasks.......................................................................................................145
Establishing Sessions with OSPF Neighbors.............................................................................. 146
Changing OSPF Session Parameters.......................................................................................... 147
Disabling BFD for OSPF...............................................................................................................147
Configure BFD for OSPFv3............................................................................................................... 148
Related Configuration Tasks.......................................................................................................148
Establishing Sessions with OSPFv3 Neighbors...........................................................................148
Changing OSPFv3 Session Parameters...................................................................................... 148
Disabling BFD for OSPFv3...........................................................................................................149
Configure BFD for BGP.....................................................................................................................149
Prerequisites................................................................................................................................ 149
Establishing Sessions with BGP Neighbors................................................................................ 150
Disabling BFD for BGP.................................................................................................................152
Use BFD in a BGP Peer Group.................................................................................................... 152
Displaying BFD for BGP Information.......................................................................................... 152
Configure BFD for VRRP................................................................................................................... 156
Related Configuration Tasks....................................................................................................... 157
Establishing Sessions with All VRRP Neighbors..........................................................................157
Establishing VRRP Sessions on VRRP Neighbors....................................................................... 158
Changing VRRP Session Parameters.......................................................................................... 159
Disabling BFD for VRRP...............................................................................................................159
Configure BFD for VLANs................................................................................................................. 159
Related Configuration Task........................................................................................................ 160
Establish Sessions with VLAN Neighbors................................................................................... 160
Changing VLAN Session Parameters...........................................................................................161
Disabling BFD for VLANs............................................................................................................. 161
Configure BFD for Port-Channels.................................................................................................... 161
Related Configuration Tasks.......................................................................................................162
Establish Sessions on Port-Channels......................................................................................... 162
Changing Physical Port Session Parameters..............................................................................163
Disabling BFD for Port-Channels................................................................................................163
Configuring Protocol Liveness......................................................................................................... 163
Troubleshooting BFD........................................................................................................................163
9 Border Gateway Protocol IPv4 (BGPv4).......................................................165
Autonomous Systems (AS)................................................................................................................165
Sessions and Peers............................................................................................................................ 167
Establish a Session.......................................................................................................................168
Route Reflectors................................................................................................................................169
Communities...............................................................................................................................169
BGP Attributes................................................................................................................................... 170
Best Path Selection Criteria.........................................................................................................170
Weight.......................................................................................................................................... 172
Local Preference..........................................................................................................................172
Multi-Exit Discriminators (MEDs)................................................................................................ 173
Origin........................................................................................................................................... 174
AS Path......................................................................................................................................... 175
Next Hop......................................................................................................................................175
Multiprotocol BGP.............................................................................................................................175
Implement BGP with the Dell Networking OS.................................................................................176
Additional Path (Add-Path) Support............................................................................................176
Advertise IGP Cost as MED for Redistributed Routes................................................................ 176
Ignore Router-ID for Some Best-Path Calculations.................................................................. 177
Four-Byte AS Numbers................................................................................................................177
AS4 Number Representation.......................................................................................................178
AS Number Migration.................................................................................................................. 179
BGP4 Management Information Base (MIB)...............................................................................181
Important Points to Remember.................................................................................................. 181
Configuration Information................................................................................................................182
BGP Configuration............................................................................................................................ 182
Enabling BGP...............................................................................................................................183
Enabling MBGP Configurations...................................................................................................217
BGP Regular Expression Optimization............................................................................................. 218
Debugging BGP.................................................................................................................................218
Storing Last and Bad PDUs......................................................................................................... 219
PDU Counters..............................................................................................................................219
Sample Configurations.....................................................................................................................220
10 Content Addressable Memory (CAM).........................................................229
CAM Allocation................................................................................................................................. 229
Test CAM Usage................................................................................................................................230
View CAM-ACL Settings....................................................................................................................231
CAM Optimization.............................................................................................................................231
11 Control Plane Policing (CoPP)..................................................................... 232
Configure Control Plane Policing.................................................................................................... 233
Configuring CoPP for Protocols................................................................................................ 234
Configuring CoPP for CPU Queues...........................................................................................236
Show Commands........................................................................................................................237
12 Data Center Bridging (DCB)......................................................................... 239
Ethernet Enhancements in Data Center Bridging........................................................................... 239
Priority-Based Flow Control.......................................................................................................240
Enhanced Transmission Selection..............................................................................................241
Data Center Bridging Exchange Protocol (DCBx)..................................................................... 242
Data Center Bridging in a Traffic Flow.......................................................................................243
Enabling Data Center Bridging.........................................................................................................243
QoS dot1p Traffic Classification and Queue Assignment...............................................................244
Configuring Priority-Based Flow Control........................................................................................245
Configuring Lossless Queues..................................................................................................... 247
Configuring the PFC Buffer in a Switch Stack........................................................................... 248
Configure Enhanced Transmission Selection................................................................................. 249
ETS Prerequisites and Restrictions............................................................................................. 249
Creating a QoS ETS Output Policy.............................................................................................250
Creating an ETS Priority Group...................................................................................................251
Applying an ETS Output Policy for a Priority Group to an Interface.........................................252
ETS Operation with DCBx...........................................................................................................254
Configuring Bandwidth Allocation for DCBx CIN..................................................................... 254
Applying DCB Policies in a Switch Stack..........................................................................................255
Applying DCB Policies with an ETS Configuration..........................................................................256
Configure a DCBx Operation........................................................................................................... 256
DCBx Operation.......................................................................................................................... 257
DCBx Port Roles..........................................................................................................................257
DCB Configuration Exchange.................................................................................................... 259
Configuration Source Election...................................................................................................259
Propagation of DCB Information...............................................................................................260
Auto-Detection and Manual Configuration of the DCBx Version............................................260
DCBx Example.............................................................................................................................261
DCBx Prerequisites and Restrictions..........................................................................................262
Configuring DCBx.......................................................................................................................262
Verifying the DCB Configuration..................................................................................................... 266
PFC and ETS Configuration Examples............................................................................................. 276
Using PFC and ETS to Manage Data Center Traffic...................................................................276
Using PFC and ETS to Manage Converged Ethernet Traffic in a Switch Stack........................280
Hierarchical Scheduling in ETS Output Policies........................................................................280
Configuring DCB Maps and its Attributes........................................................................................ 281
DCB Map: Configuration Procedure.......................................................................................... 281
Important Points to Remember................................................................................................. 282
Applying a DCB Map on a Port...................................................................................................282
Configuring PFC without a DCB Map........................................................................................ 283
Configuring Lossless Queues.....................................................................................................283
Priority-Based Flow Control Using Dynamic Buffer Method..........................................................284
Pause and Resume of Traffic......................................................................................................284
Buffer Sizes for Lossless or PFC Packets....................................................................................285
Interworking of DCB Map With DCB Buffer Threshold Settings.................................................... 286
Configuring the Dynamic Buffer Method........................................................................................286
13 Debugging and Diagnostics.........................................................................288
Offline Diagnostics........................................................................................................................... 288
Important Points to Remember................................................................................................. 288
Running Offline Diagnostics.......................................................................................................288
Trace Logs......................................................................................................................................... 291
Auto Save on Crash or Rollover..................................................................................................291
Using the Show Hardware Commands........................................................................................... 292
Enabling Environmental Monitoring................................................................................................ 293
Recognize an Over-Temperature Condition............................................................................ 294
Troubleshoot an Over-Temperature Condition........................................................................295
Recognize an Under-Voltage Condition................................................................................... 296
Troubleshoot an Under-Voltage Condition.............................................................................. 296
Buffer Tuning.....................................................................................................................................297
Deciding to Tune Buffers............................................................................................................298
Using a Pre-Defined Buffer Profile............................................................................................. 301
Sample Buffer Profile Configuration.......................................................................................... 301
Troubleshooting Packet Loss...........................................................................................................302
Displaying Drop Counters.......................................................................................................... 302
Dataplane Statistics.....................................................................................................................303
Display Stack Port Statistics........................................................................................................304
Display Stack Member Counters................................................................................................305
Enabling Application Core Dumps...................................................................................................305
Mini Core Dumps..............................................................................................................................306
Enabling TCP Dumps........................................................................................................................307
14 Dynamic Host Configuration Protocol (DHCP)........................................308
DHCP Packet Format and Options..................................................................................................308
Assign an IP Address using DHCP.............................................................................................. 310
Implementation Information.............................................................................................................311
Configure the System to be a DHCP Server.................................................................................... 312
Configuring the Server for Automatic Address Allocation.........................................................312
Configuration Tasks.....................................................................................................................313
Specifying a Default Gateway..................................................................................................... 314
Enabling the DHCP Server.......................................................................................................... 314
Configure a Method of Hostname Resolution...........................................................................315
Creating Manual Binding Entries.................................................................................................315
Debugging the DHCP Server...................................................................................................... 316
Using DHCP Clear Commands...................................................................................................316
Configure the System to be a Relay Agent...................................................................................... 316
Configure the System to be a DHCP Client.....................................................................................318
Configuring the DHCP Client System........................................................................................ 319
DHCP Client on a Management Interface................................................................................. 322
DHCP Client Operation with Other Features.............................................................................323
Configure Secure DHCP...................................................................................................................324
Option 82.................................................................................................................................... 324
DHCP Snooping.......................................................................................................................... 325
Drop DHCP Packets on Snooped VLANs Only.......................................................................... 327
Dynamic ARP Inspection.............................................................................................................327
Configuring Dynamic ARP Inspection........................................................................................328
Source Address Validation..........................................................................................................329
15 Equal Cost Multi-Path (ECMP)..................................................................... 332
ECMP for Flow-Based Affinity.......................................................................................................... 332
Enabling Deterministic ECMP Next Hop....................................................................................332
Link Bundle Monitoring.................................................................................................................... 332
Managing ECMP Group Paths.......................................................................................................... 333
16 FCoE Transit.................................................................................................... 334
Fibre Channel over Ethernet............................................................................................................ 334
Ensure Robustness in a Converged Ethernet Network...................................................................334
FIP Snooping on Ethernet Bridges................................................................................................... 336
FIP Snooping in a Switch Stack........................................................................................................ 338
Using FIP Snooping...........................................................................................................................338
Important Points to Remember................................................................................................. 338
Enabling the FCoE Transit Feature.............................................................................................339
Enable FIP Snooping on VLANs..................................................................................................339
Configure the FC-MAP Value..................................................................................................... 339
Configure a Port for a Bridge-to-Bridge Link............................................................................339
Configure a Port for a Bridge-to-FCF Link................................................................................340
Impact on Other Software Features.......................................................................................... 340
FIP Snooping Prerequisites.........................................................................................................340
FIP Snooping Restrictions........................................................................................................... 341
Configuring FIP Snooping...........................................................................................................341
Displaying FIP Snooping Information.............................................................................................. 342
FCoE Transit Configuration Example...............................................................................................347
17 FIPS Cryptography......................................................................................... 350
Preparing the System........................................................................................................................350
Enabling FIPS Mode.......................................................................................................................... 350
Generating Host-Keys.......................................................................................................................351
Monitoring FIPS Mode Status............................................................................................................351
Disabling FIPS Mode......................................................................................................................... 352
18 Force10 Resilient Ring Protocol (FRRP)..................................................... 353
Protocol Overview............................................................................................................................ 353
Ring Status...................................................................................................................................354
Multiple FRRP Rings.................................................................................................................... 355
Important FRRP Points................................................................................................................356
Important FRRP Concepts.......................................................................................................... 357
Implementing FRRP.......................................................................................................................... 358
FRRP Configuration.......................................................................................................................... 358
Creating the FRRP Group........................................................................................................... 359
Configuring the Control VLAN................................................................................................... 359
Configuring and Adding the Member VLANs............................................................................ 360
Setting the FRRP Timers............................................................................................................. 362
Clearing the FRRP Counters.......................................................................................................362
Viewing the FRRP Configuration................................................................................................362
Viewing the FRRP Information................................................................................................... 362
Troubleshooting FRRP......................................................................................................................363
Configuration Checks.................................................................................................................363
Sample Configuration and Topology...............................................................................................363
19 GARP VLAN Registration Protocol (GVRP)................................................366
Important Points to Remember....................................................................................................... 366
Configure GVRP................................................................................................................................366
Related Configuration Tasks.......................................................................................................367
Enabling GVRP Globally....................................................................................................................367
Enabling GVRP on a Layer 2 Interface............................................................................................. 368
Configure GVRP Registration...........................................................................................................368
Configure a GARP Timer.................................................................................................................. 369
20 Internet Group Management Protocol (IGMP).........................................371
IGMP Protocol Overview...................................................................................................................371
IGMP Version 2............................................................................................................................ 371
IGMP Version 3............................................................................................................................373
IGMP Snooping................................................................................................................................. 376
IGMP Snooping Implementation Information........................................................................... 376
Configuring IGMP Snooping.......................................................................................................377
Enabling IGMP Immediate-Leave............................................................................................... 377
Disabling Multicast Flooding.......................................................................................................378
Specifying a Port as Connected to a Multicast Router..............................................................378
Configuring the Switch as Querier.............................................................................................378
Fast Convergence after MSTP Topology Changes..........................................................................379
Designating a Multicast Router Interface.........................................................................................379
21 Interfaces.........................................................................................................380
Basic Interface Configuration.......................................................................................................... 380
Advanced Interface Configuration...................................................................................................380
Interface Types..................................................................................................................................381
View Basic Interface Information..................................................................................................... 381
Enabling a Physical Interface............................................................................................................383
Physical Interfaces............................................................................................................................ 384
Configuration Task List for Physical Interfaces......................................................................... 384
Overview of Layer Modes...........................................................................................................384
Configuring Layer 2 (Data Link) Mode....................................................................................... 385
Configuring Layer 2 (Interface) Mode........................................................................................ 385
Configuring Layer 3 (Network) Mode.........................................................................................385
Configuring Layer 3 (Interface) Mode........................................................................................386
Management Interfaces....................................................................................................................387
Configuring Management Interfaces on the XML Switch......................................................... 387
VLAN Interfaces................................................................................................................................ 389
Loopback Interfaces.........................................................................................................................390
Null Interfaces...................................................................................................................................390
Port Channel Interfaces....................................................................................................................390
Port Channel Definition and Standards......................................................................................391
Port Channel Benefits................................................................................................................. 391
Port Channel Implementation.................................................................................................... 391
100/1000/10000 Mbps Interfaces in Port Channels.................................................................392
Configuration Tasks for Port Channel Interfaces...................................................................... 392
Creating a Port Channel............................................................................................................. 392
Adding a Physical Interface to a Port Channel.......................................................................... 393
Reassigning an Interface to a New Port Channel......................................................................395
Configuring the Minimum Oper Up Links in a Port Channel....................................................395
Adding or Removing a Port Channel from a VLAN................................................................... 396
Assigning an IP Address to a Port Channel................................................................................396
Deleting or Disabling a Port Channel.........................................................................................397
Server Ports....................................................................................................................................... 397
Default Configuration without Start-up Config.........................................................................397
Bulk Configuration............................................................................................................................398
Interface Range...........................................................................................................................398
Bulk Configuration Examples..................................................................................................... 398
Defining Interface Range Macros.................................................................................................... 400
Define the Interface Range........................................................................................................ 400
Choosing an Interface-Range Macro........................................................................................400
Monitoring and Maintaining Interfaces............................................................................................401
Maintenance Using TDR.............................................................................................................402
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 402
Merging SFP+ Ports to QSFP 40G Ports....................................................................................403
Configure the MTU Size on an Interface...................................................................................404
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................404
Important Points to Remember................................................................................................. 405
Support for LM4 Optics.............................................................................................................. 405
Example Scenarios......................................................................................................................405
Layer 2 Flow Control Using Ethernet Pause Frames.......................................................................409
Enabling Pause Frames............................................................................................................... 410
Configure MTU Size on an Interface................................................................................................ 411
Port-Pipes..........................................................................................................................................412
Auto-Negotiation on Ethernet Interfaces........................................................................................ 412
Setting the Speed and Duplex Mode of Ethernet Interfaces..................................................... 412
View Advanced Interface Information..............................................................................................414
Configuring the Interface Sampling Size....................................................................................415
Dynamic Counters...................................................................................................................... 416
Enhanced Validation of Interface Ranges........................................................................................ 417
22 Internet Protocol Security (IPSec).............................................................. 419
Configuring IPSec ............................................................................................................................ 419
23 IPv4 Routing....................................................................................................421
IP Addresses.......................................................................................................................................421
Implementation Information...................................................................................................... 421
Configuration Tasks for IP Addresses.........................................................................................421
IPv4 Path MTU Discovery Overview.................................................................................................424
Using the Configured Source IP Address in ICMP Messages..........................................................425
Configuring the ICMP Source Interface.....................................................................................425
Configuring the Duration to Establish a TCP Connection..............................................................426
Enabling Directed Broadcast............................................................................................................426
Resolution of Host Names............................................................................................................... 426
Enabling Dynamic Resolution of Host Names...........................................................................427
Specifying the Local System Domain and a List of Domains....................................................427
Configuring DNS with Traceroute............................................................................................. 428
ARP.................................................................................................................................................... 429
Configuration Tasks for ARP.......................................................................................................429
ARP Learning via Gratuitous ARP......................................................................................................431
ARP Learning via ARP Request..........................................................................................................431
Configuring ARP Retries................................................................................................................... 432
ICMP.................................................................................................................................................. 433
Configuration Tasks for ICMP.................................................................................................... 433
UDP Helper....................................................................................................................................... 433
Configure UDP Helper................................................................................................................433
Important Points to Remember................................................................................................. 433
Enabling UDP Helper.................................................................................................................. 434
Configurations Using UDP Helper................................................................................................... 434
UDP Helper with Broadcast-All Addresses................................................................................ 434
UDP Helper with Subnet Broadcast Addresses..........................................................................435
UDP Helper with Configured Broadcast Addresses.................................................................. 436
UDP Helper with No Configured Broadcast Addresses............................................................ 436
Troubleshooting UDP Helper...........................................................................................................437
24 IPv6 Addressing..............................................................................................438
Protocol Overview............................................................................................................................438
Extended Address Space............................................................................................................ 438
Stateless Autoconfiguration....................................................................................................... 438
IPv6 Header Fields............................................................................................................................440
Version (4 bits)............................................................................................................................ 440
Traffic Class (8 bits).....................................................................................................................440
Flow Label (20 bits).....................................................................................................................440
Payload Length (16 bits)............................................................................................................. 440
Next Header (8 bits)....................................................................................................................440
Hop Limit (8 bits)......................................................................................................................... 441
Source Address (128 bits)............................................................................................................441
Destination Address (128 bits).....................................................................................................441
Extension Header Fields....................................................................................................................441
Hop-by-Hop Options Header....................................................................................................442
Addressing.........................................................................................................................................442
Link-local Addresses...................................................................................................................443
Static and Dynamic Addressing..................................................................................................443
Implementing IPv6 with the Dell Networking OS...........................................................................444
ICMPv6..............................................................................................................................................446
Path MTU Discovery......................................................................................................................... 447
IPv6 Neighbor Discovery..................................................................................................................447
IPv6 Neighbor Discovery of MTU Packets.................................................................................448
Configuring the IPv6 Recursive DNS Server..............................................................................448
Debugging IPv6 RDNSS Information Sent to the Host ............................................................ 449
Displaying IPv6 RDNSS Information...........................................................................................450
IPv6 Multicast....................................................................................................................................450
Secure Shell (SSH) Over an IPv6 Transport...................................................................................... 451
Configuration Task List for IPv6........................................................................................................451
Adjusting Your CAM-Profile........................................................................................................451
Assigning an IPv6 Address to an Interface.................................................................................452
Assigning a Static IPv6 Route..................................................................................................... 453
Configuring Telnet with IPv6......................................................................................................453
SNMP over IPv6...........................................................................................................................454
Showing IPv6 Information..........................................................................................................454
Showing an IPv6 Interface..........................................................................................................454
Showing IPv6 Routes.................................................................................................................. 455
Showing the Running-Configuration for an Interface.............................................................. 456
Clearing IPv6 Routes...................................................................................................................457
25 iSCSI Optimization.........................................................................................458
iSCSI Optimization Overview........................................................................................................... 458
Monitoring iSCSI Traffic Flows...................................................................................................460
Information Monitored in iSCSI Traffic Flows........................................................................... 460
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................460
Configuring Detection and Ports for Dell Compellent Arrays...................................................461
iSCSI Optimization: Operation................................................................................................... 461
Default iSCSI Optimization Values..............................................................................................461
Displaying iSCSI Optimization Information..................................................................................... 462
26 Intermediate System to Intermediate System..........................................464
IS-IS Protocol Overview...................................................................................................................464
IS-IS Addressing................................................................................................................................464
Multi-Topology IS-IS........................................................................................................................ 465
Transition Mode..........................................................................................................................466
Interface Support........................................................................................................................466
Adjacencies................................................................................................................................. 466
Graceful Restart................................................................................................................................466
Timers..........................................................................................................................................467
Implementation Information............................................................................................................467
Configuration Information............................................................................................................... 468
Configuration Tasks for IS-IS..................................................................................................... 468
IS-IS Metric Styles.............................................................................................................................484
Configure Metric Values...................................................................................................................484
Maximum Values in the Routing Table...................................................................................... 485
Change the IS-IS Metric Style in One Level Only......................................................................485
Leaks from One Level to Another.............................................................................................. 487
Sample Configurations..................................................................................................................... 487
27 Link Aggregation Control Protocol (LACP)...............................................492
Introduction to Dynamic LAGs and LACP....................................................................................... 492
Important Points to Remember................................................................................................. 492
LACP Modes................................................................................................................................493
Configuring LACP Commands...................................................................................................493
LACP Configuration Tasks................................................................................................................494
Creating a LAG............................................................................................................................494
Configuring the LAG Interfaces as Dynamic............................................................................. 495
Setting the LACP Long Timeout.................................................................................................495
Shared LAG State Tracking...............................................................................................................496
Configuring Shared LAG State Tracking.......................................................................................... 497
Important Points about Shared LAG State Tracking..................................................................498
LACP Basic Configuration Example.................................................................................................499
Configure a LAG on ALPHA........................................................................................................499
28 Layer 2..............................................................................................................508
Manage the MAC Address Table......................................................................................................508
Clearing the MAC Address Table................................................................................................508
Setting the Aging Time for Dynamic Entries..............................................................................508
Configuring a Static MAC Address............................................................................................. 509
Displaying the MAC Address Table............................................................................................ 509
MAC Learning Limit.......................................................................................................................... 509
Setting the MAC Learning Limit.................................................................................................. 510
mac learning-limit Dynamic....................................................................................................... 510
mac learning-limit station-move................................................................................................510
Learning Limit Violation Actions..................................................................................................511
Setting Station Move Violation Actions.......................................................................................511
Recovering from Learning Limit and Station Move Violations...................................................511
NIC Teaming......................................................................................................................................512
MAC Move Optimization.............................................................................................................514
29 Link Layer Discovery Protocol (LLDP)........................................................ 515
802.1AB (LLDP) Overview..................................................................................................................515
Protocol Data Units..................................................................................................................... 515
Optional TLVs.................................................................................................................................... 516
Management TLVs.......................................................................................................................516
TIA-1057 (LLDP-MED) Overview...................................................................................................... 518
TIA Organizationally Specific TLVs............................................................................................. 519
Extended Power via MDI TLV......................................................................................................523
Configure LLDP.................................................................................................................................523
Related Configuration Tasks.......................................................................................................523
Important Points to Remember................................................................................................. 524
LLDP Compatibility..................................................................................................................... 524
CONFIGURATION versus INTERFACE Configurations....................................................................524
Enabling LLDP................................................................................................................................... 525
Disabling and Undoing LLDP......................................................................................................525
Advertising TLVs................................................................................................................................525
Viewing the LLDP Configuration......................................................................................................526
Viewing Information Advertised by Adjacent LLDP Agents.............................................................527
Configuring LLDPDU Intervals......................................................................................................... 528
Configuring Transmit and Receive Mode........................................................................................ 529
Configuring a Time to Live...............................................................................................................530
Debugging LLDP...............................................................................................................................530
Relevant Management Objects.........................................................................................................531
30 Microsoft Network Load Balancing............................................................538
NLB Unicast Mode Scenario.............................................................................................................538
NLB Multicast Mode Scenario.......................................................................................................... 539
Limitations With Enabling NLB on Switches....................................................................................539
Benefits and Working of Microsoft Clustering.................................................................................539
Enable and Disable VLAN Flooding .................................................................................................540
Configuring a Switch for NLB ......................................................................................................... 540
.....................................................................................................................................................540
31 Multicast Source Discovery Protocol (MSDP)........................................... 541
Protocol Overview............................................................................................................................ 541
Anycast RP.........................................................................................................................................543
Implementation Information............................................................................................................543
Configure the Multicast Source Discovery Protocol.......................................................................543
Related Configuration Tasks...................................................................................................... 544
Enabling MSDP..................................................................................................................................548
Manage the Source-Active Cache................................................................................................... 549
Viewing the Source-Active Cache............................................................................................. 549
Limiting the Source-Active Cache............................................................................................. 550
Clearing the Source-Active Cache.............................................................................................550
Enabling the Rejected Source-Active Cache.............................................................................550
Accept Source-Active Messages that Fail the RFP Check.............................................................. 550
Specifying Source-Active Messages................................................................................................ 554
Limiting the Source-Active Messages from a Peer..........................................................................555
Preventing MSDP from Caching a Local Source............................................................................. 555
Preventing MSDP from Caching a Remote Source.........................................................................556
Preventing MSDP from Advertising a Local Source.........................................................................557
Logging Changes in Peership States................................................................................................558
Terminating a Peership.....................................................................................................................558
Clearing Peer Statistics..................................................................................................................... 558
Debugging MSDP..............................................................................................................................559
MSDP with Anycast RP......................................................................................................................559
Configuring Anycast RP.................................................................................................................... 561
Reducing Source-Active Message Flooding.............................................................................. 561
Specifying the RP Address Used in SA Messages....................................................................... 561
MSDP Sample Configurations.......................................................................................................... 564
32 Multiple Spanning Tree Protocol (MSTP)...................................................567
Protocol Overview............................................................................................................................ 567
Spanning Tree Variations..................................................................................................................568
Implementation Information............................................................................................................568
Configure Multiple Spanning Tree Protocol....................................................................................568
Related Configuration Tasks...................................................................................................... 568
Enable Multiple Spanning Tree Globally..........................................................................................569
Creating Multiple Spanning Tree Instances.....................................................................................569
Influencing MSTP Root Selection.....................................................................................................570
Interoperate with Non-Dell Networking OS Bridges.......................................................................571
Changing the Region Name or Revision.......................................................................................... 571
Modifying Global Parameters........................................................................................................... 572
Enable BPDU Filtering Globally.........................................................................................................573
Modifying the Interface Parameters.................................................................................................574
Configuring an EdgePort.................................................................................................................. 574
Flush MAC Addresses after a Topology Change..............................................................................575
MSTP Sample Configurations...........................................................................................................576
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration.............................................................576
Debugging and Verifying MSTP Configurations.............................................................................. 579
33 Multicast Features..........................................................................................582
Enabling IP Multicast.........................................................................................................................582
Multicast with ECMP.........................................................................................................................582
Implementation Information............................................................................................................583
First Packet Forwarding for Lossless Multicast................................................................................584
Multicast Policies.............................................................................................................................. 584
IPv4 Multicast Policies...................................................................................................................... 584
Limiting the Number of Multicast Routes..................................................................................584
Preventing a Host from Joining a Group...................................................................................585
Rate Limiting IGMP Join Requests............................................................................................. 588
Preventing a PIM Router from Forming an Adjacency..............................................................588
Preventing a Source from Registering with the RP................................................................... 588
Preventing a PIM Router from Processing a Join...................................................................... 591
34 Open Shortest Path First (OSPFv2 and OSPFv3)...................................... 592
Protocol Overview............................................................................................................................592
Autonomous System (AS) Areas................................................................................................. 592
Area Types...................................................................................................................................593
Networks and Neighbors............................................................................................................594
Router Types............................................................................................................................... 594
Link-State Advertisements (LSAs)...............................................................................................596
Router Priority and Cost............................................................................................................. 597
OSPF with the Dell Networking OS..................................................................................................598
Graceful Restart.......................................................................................................................... 599
Fast Convergence (OSPFv2, IPv4 Only).....................................................................................600
Multi-Process OSPFv2 (IPv4 only)..............................................................................................600
RFC-2328 Compliant OSPF Flooding........................................................................................ 601
OSPF ACK Packing......................................................................................................................602
Setting OSPF Adjacency with Cisco Routers.............................................................................602
Configuration Information............................................................................................................... 603
Configuration Task List for OSPFv2 (OSPF for IPv4)................................................................. 603
Troubleshooting OSPFv2............................................................................................................616
Configuration Task List for OSPFv3 (OSPF for IPv6)....................................................................... 620
Enabling IPv6 Unicast Routing................................................................................................... 620
Assigning IPv6 Addresses on an Interface..................................................................................621
Assigning Area ID on an Interface...............................................................................................621
Assigning OSPFv3 Process ID and Router ID Globally...............................................................621
Configuring Stub Areas...............................................................................................................622
Configuring Passive-Interface....................................................................................................622
Redistributing Routes..................................................................................................................623
Configuring a Default Route.......................................................................................................623
Enabling OSPFv3 Graceful Restart............................................................................................. 623
Displaying Graceful Restart........................................................................................................ 624
OSPFv3 Authentication Using IPsec...........................................................................................626
35 Policy-based Routing (PBR)......................................................................... 635
/