OS9

Dell OS9 Administrator Guide

  • Hello! I am an AI chatbot trained to assist you with the Dell OS9 Administrator Guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Networking Configuration Guide
for the C9010 Series
Version 9.14.2.5
January 2020
Rev. A00
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
NOTE: A WARNING indicates a potential for property damage, personal injury, or death.
© 2018 - 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
Chapter 1: About this Guide.........................................................................................................32
Audience.............................................................................................................................................................................. 32
Conventions........................................................................................................................................................................32
Related Documents...........................................................................................................................................................32
Chapter 2: Configuration Fundamentals...................................................................................... 33
Accessing the Command Line........................................................................................................................................ 33
CLI Modes........................................................................................................................................................................... 33
Navigating CLI Modes................................................................................................................................................ 35
The do Command.............................................................................................................................................................. 37
Undoing Commands..........................................................................................................................................................38
Obtaining Help....................................................................................................................................................................39
Entering and Editing Commands................................................................................................................................... 39
Command History..............................................................................................................................................................40
Filtering show Command Outputs.................................................................................................................................40
Multiple Users in Configuration Mode..........................................................................................................................42
Chapter 3: Getting Started..........................................................................................................43
Console Access..................................................................................................................................................................43
Serial Console............................................................................................................................................................... 43
Mounting an NFS File System........................................................................................................................................44
Default Configuration....................................................................................................................................................... 46
Configuring a Host Name................................................................................................................................................46
Accessing the System Remotely................................................................................................................................... 46
Configure the Management Port IP Address....................................................................................................... 46
Configure a Management Route..............................................................................................................................47
Configuring a Username and Password................................................................................................................. 47
Configuring the Enable Password................................................................................................................................. 48
Manage Configuration Files............................................................................................................................................ 48
File Storage...................................................................................................................................................................48
Copy Files to and from the System........................................................................................................................ 49
Save the Running-Configuration............................................................................................................................. 50
Configure the Overload Bit for a Startup Scenario............................................................................................ 50
Viewing Files.................................................................................................................................................................50
Changes in Configuration Files................................................................................................................................. 51
Viewing Command History...............................................................................................................................................51
Upgrading the Dell Networking OS...............................................................................................................................53
Chapter 4: Switch Management.................................................................................................. 54
Configuring Privilege Levels........................................................................................................................................... 54
Removing a Command from EXEC Mode............................................................................................................. 55
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 55
Allowing Access to CONFIGURATION Mode Commands................................................................................. 55
Allowing Access to the Following Modes.............................................................................................................. 55
Contents
Contents 3
Applying a Privilege Level to a Username..............................................................................................................57
Applying a Privilege Level to a Terminal Line........................................................................................................57
Configuring Logging..........................................................................................................................................................57
Audit and Security Logs............................................................................................................................................. 57
Configuring Logging Format .............................................................................................................................59
Setting Up a Secure Connection to a Syslog Server................................................................................ 59
Track Login Activity...........................................................................................................................................................61
Restrictions for Tracking Login Activity................................................................................................................. 61
Configuring Login Activity Tracking........................................................................................................................ 61
Display Login Statistics...............................................................................................................................................61
Limit Concurrent Login Sessions...................................................................................................................................63
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 63
Configuring Concurrent Session Limit....................................................................................................................63
Enabling the System to Clear Existing Sessions.................................................................................................. 63
Enabling Secured CLI Mode............................................................................................................................................64
Log Messages in the Internal Buffer............................................................................................................................ 64
Disabling System Logging............................................................................................................................................... 65
Sending System Messages to a Syslog Server..........................................................................................................65
Configuring a UNIX System as a Syslog Server...................................................................................................65
Display the Logging Buffer and the Logging Configuration....................................................................................66
Changing System Logging Settings..............................................................................................................................66
Configuring a UNIX Logging Facility Level..................................................................................................................67
Synchronizing Log Messages......................................................................................................................................... 68
Enabling Timestamp on Syslog Messages...................................................................................................................68
File Transfer Services.......................................................................................................................................................70
Enabling the FTP Server............................................................................................................................................70
Configuring FTP Server Parameters.......................................................................................................................70
Configuring FTP Client Parameters......................................................................................................................... 71
Terminal Lines..................................................................................................................................................................... 71
Denying and Permitting Access to a Terminal Line..............................................................................................71
Configuring Login Authentication for Terminal Lines..........................................................................................72
Setting Time Out of EXEC Privilege Mode................................................................................................................. 72
Using Telnet to Access Another Network Device..................................................................................................... 73
Lock CONFIGURATION Mode........................................................................................................................................73
LPC Bus Quality Degradation......................................................................................................................................... 74
Recovering from a Forgotten Password .................................................................................................................... 75
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration.............................76
Recovering from a Failed Start...................................................................................................................................... 76
Restoring Factory-Default Settings..............................................................................................................................76
Restoring Factory-Default Boot Environment Variables.................................................................................... 77
Using Hashes to Verify Software Images Before Installation..................................................................... 78
Verifying System Images on C9010 Components......................................................................................................79
When System Images on C9010 Components Do Not Match..........................................................................80
Manually Resetting the System Image on a C9010 Component......................................................................80
Logging in to the Virtual Console of a C9010 Component.................................................................................81
Booting the C9010 from an Image on a Network Server................................................................................... 81
Configuring C9010 Components to Boot from the RPM CP Image................................................................ 81
Viewing the Reason for Last System Reboot.............................................................................................................82
Chapter 5: 802.1X........................................................................................................................83
4
Contents
The Port-Authentication Process................................................................................................................................. 85
EAP over RADIUS........................................................................................................................................................86
Configuring 802.1X............................................................................................................................................................86
Important Points to Remember..................................................................................................................................... 86
Enabling 802.1X..................................................................................................................................................................87
Configuring dot1x Profile ................................................................................................................................................89
Configuring MAC addresses for a do1x Profile.......................................................................................................... 89
Configuring the Static MAB and MAB Profile ...........................................................................................................90
Configuring Critical VLAN ...............................................................................................................................................91
Configuring Request Identity Re-Transmissions........................................................................................................ 91
Configuring a Quiet Period after a Failed Authentication....................................................................................... 92
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 93
Re-Authenticating a Port................................................................................................................................................ 93
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 94
Guest and Authentication-Fail VLANs......................................................................................................................... 95
Configuring a Guest VLAN........................................................................................................................................96
Configuring an Authentication-Fail VLAN............................................................................................................. 96
Configuring Timeouts................................................................................................................................................. 98
Multi-Host Authentication.............................................................................................................................................. 98
Multi-Supplicant Authentication................................................................................................................................... 101
MAC Authentication Bypass......................................................................................................................................... 102
MAB in Single-host and Multi-Host Mode...........................................................................................................102
MAB in Multi-Supplicant Authentication Mode.................................................................................................. 103
Configuring MAC Authentication Bypass.............................................................................................................103
Dynamic CoS with 802.1X............................................................................................................................................. 104
Chapter 6: Access Control Lists (ACLs)..................................................................................... 106
IP Access Control Lists (ACLs)....................................................................................................................................106
CAM Usage..................................................................................................................................................................107
User-Configurable CAM Allocation........................................................................................................................108
Allocating CAM for Ingress ACLs on the Port Extender.................................................................................. 108
Allocating CAM for Egress ACLs on the Port Extender...................................................................................109
Implementing ACLs on Dell EMC Networking OS.............................................................................................. 110
ACL Optimization to Increase Number of Supported IPv4 ACLs.......................................................................... 111
Optimizing ACL for More Number of IPv4 ACL Rules.......................................................................................112
IP Fragment Handling...................................................................................................................................................... 112
IP Fragments ACL Examples....................................................................................................................................113
Layer 4 ACL Rules Examples....................................................................................................................................113
Configure a Standard IP ACL........................................................................................................................................ 114
Configuring a Standard IP ACL Filter.................................................................................................................... 115
Configure an Extended IP ACL..................................................................................................................................... 115
Configuring Filters with a Sequence Number......................................................................................................116
Configuring Filters Without a Sequence Number............................................................................................... 117
Configure Layer 2 and Layer 3 ACLs........................................................................................................................... 117
Using ACL VLAN Groups................................................................................................................................................ 118
Guidelines for Configuring ACL VLAN Groups.................................................................................................... 118
Configuring an ACL VLAN Group........................................................................................................................... 119
Allocating ACL VLAN CAM.......................................................................................................................................119
Applying an IP ACL..........................................................................................................................................................120
Applying Ingress ACLs on the Port Extender......................................................................................................120
Contents
5
Applying Egress ACLs................................................................................................................................................121
Applying Layer 3 Egress ACLs on Control-Plane Traffic.................................................................................. 121
Counting ACL Hits..................................................................................................................................................... 122
IP Prefix Lists....................................................................................................................................................................122
Configuration Task List for Prefix Lists................................................................................................................122
ACL Remarks.................................................................................................................................................................... 125
Configuring a Remark............................................................................................................................................... 126
Deleting a Remark......................................................................................................................................................126
ACL Resequencing...........................................................................................................................................................127
Resequencing an ACL or Prefix List...................................................................................................................... 127
Route Maps.......................................................................................................................................................................128
Important Points to Remember....................................................................................................................................129
Configuration Task List for Route Maps.............................................................................................................. 129
Configuring Match Routes....................................................................................................................................... 131
Configuring Set Conditions......................................................................................................................................132
Configure a Route Map for Route Redistribution.............................................................................................. 133
Configure a Route Map for Route Tagging......................................................................................................... 133
Continue Clause......................................................................................................................................................... 133
Configuring a UDF ACL.................................................................................................................................................. 134
Hot-Lock Behavior.......................................................................................................................................................... 136
Chapter 7: Bidirectional Forwarding Detection (BFD).................................................................137
How BFD Works............................................................................................................................................................... 137
BFD Packet Format...................................................................................................................................................138
BFD Sessions.............................................................................................................................................................. 139
BFD Three-Way Handshake.................................................................................................................................... 140
Session State Changes..............................................................................................................................................141
Important Points to Remember.....................................................................................................................................141
Configure BFD...................................................................................................................................................................141
Configure BFD for Physical Ports..........................................................................................................................142
Configure BFD for Static Routes........................................................................................................................... 143
Configure BFD for IPv6 Static Routes................................................................................................................. 146
Configure BFD for OSPF..........................................................................................................................................147
Configure BFD for OSPFv3.....................................................................................................................................152
Configure BFD for IS-IS........................................................................................................................................... 154
Configure BFD for BGP............................................................................................................................................156
Configure BFD for VRRP......................................................................................................................................... 162
Configuring Protocol Liveness................................................................................................................................164
Chapter 8: Border Gateway Protocol IPv4 (BGPv4)....................................................................165
Autonomous Systems (AS)........................................................................................................................................... 165
Sessions and Peers..........................................................................................................................................................167
Establish a Session.................................................................................................................................................... 167
Route Reflectors..............................................................................................................................................................168
BGP Attributes................................................................................................................................................................. 169
Best Path Selection Criteria....................................................................................................................................169
Weight........................................................................................................................................................................... 171
Local Preference.........................................................................................................................................................171
Multi-Exit Discriminators (MEDs).......................................................................................................................... 172
6
Contents
Origin.............................................................................................................................................................................173
AS Path.........................................................................................................................................................................173
Next Hop...................................................................................................................................................................... 174
Multiprotocol BGP........................................................................................................................................................... 174
Implement BGP ............................................................................................................................................................... 174
Advertise IGP Cost as MED for Redistributed Routes..................................................................................... 175
Ignore Router-ID for Some Best-Path Calculations.......................................................................................... 175
Four-Byte AS Numbers............................................................................................................................................ 175
AS4 Number Representation...................................................................................................................................176
AS Number Migration................................................................................................................................................177
BGP4 Management Information Base (MIB)...................................................................................................... 178
Important Points to Remember.............................................................................................................................. 179
Configuration Information..............................................................................................................................................179
BGP Configuration.......................................................................................................................................................... 180
Enabling BGP.............................................................................................................................................................. 180
Configuring AS4 Number Representations..........................................................................................................183
Configuring Peer Groups......................................................................................................................................... 185
Configuring BGP Fast Fail-Over.............................................................................................................................187
Configuring Passive Peering................................................................................................................................... 188
Maintaining Existing AS Numbers During an AS Migration..............................................................................189
Allowing an AS Number to Appear in its Own AS Path.................................................................................... 189
Filtering on an AS-Path Attribute.......................................................................................................................... 190
Regular Expressions as Filters.................................................................................................................................191
Redistributing Routes............................................................................................................................................... 192
Enabling Additional Paths........................................................................................................................................ 193
Configuring IP Community Lists.............................................................................................................................193
Configuring an IP Extended Community List...................................................................................................... 194
Filtering Routes with Community Lists.................................................................................................................195
Manipulating the COMMUNITY Attribute............................................................................................................196
Changing MED Attributes........................................................................................................................................ 197
Changing the LOCAL_PREFERENCE Attribute................................................................................................. 197
Configuring the local System or a Different System to be the Next Hop for BGP-Learned Routes....198
Changing the WEIGHT Attribute........................................................................................................................... 198
Enabling Multipath.....................................................................................................................................................199
Filtering BGP Routes................................................................................................................................................ 199
Filtering BGP Routes Using Route Maps............................................................................................................ 200
Filtering BGP Routes Using AS-PATH Information.......................................................................................... 200
Configuring BGP Route Reflectors....................................................................................................................... 201
Aggregating Routes...................................................................................................................................................201
Configuring BGP Confederations..........................................................................................................................202
Enabling Route Flap Dampening............................................................................................................................202
Changing BGP Timers..............................................................................................................................................204
Setting the extended timer.................................................................................................................................... 205
Enabling BGP Neighbor Soft-Reconfiguration...................................................................................................205
Enabling or disabling BGP neighbors....................................................................................................................206
Route Map Continue................................................................................................................................................ 207
Enabling MBGP Configurations................................................................................................................................... 208
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor.................................. 208
BGP Regular Expression Optimization.......................................................................................................................209
Debugging BGP............................................................................................................................................................... 209
Contents
7
Storing Last and Bad PDUs.....................................................................................................................................210
Capturing PDUs..........................................................................................................................................................210
PDU Counters.............................................................................................................................................................212
Sample Configurations....................................................................................................................................................212
Chapter 9: Content Addressable Memory (CAM)....................................................................... 220
CAM Allocation................................................................................................................................................................ 220
Test CAM Usage..............................................................................................................................................................221
View CAM-ACL Settings...............................................................................................................................................222
View CAM Usage............................................................................................................................................................ 223
Configuring CAM Threshold and Silence Period..................................................................................................... 223
Return to the Default CAM Configuration................................................................................................................224
CAM Optimization.......................................................................................................................................................... 225
Applications for CAM Profiling.................................................................................................................................... 225
Unified Forwarding Table (UFT) Modes....................................................................................................................225
Configuring UFT Modes.......................................................................................................................................... 226
Chapter 10: Control Plane Policing (CoPP)................................................................................ 227
Z9500 CoPP Implementation....................................................................................................................................... 227
CoPP Example................................................................................................................................................................. 229
Configure Control Plane Policing................................................................................................................................ 230
Configuring CoPP for Protocols............................................................................................................................230
Examples of Configuring CoPP for Protocols.....................................................................................................231
Configuring CoPP for CPU Queues......................................................................................................................232
Examples of Configuring CoPP for CPU Queues.............................................................................................. 233
Displaying CoPP Configuration.............................................................................................................................. 233
Troubleshooting CoPP Operation............................................................................................................................... 236
Chapter 11: Data Center Bridging (DCB).................................................................................... 244
Enabling Data Center Bridging.....................................................................................................................................244
Ethernet Enhancements in Data Center Bridging...................................................................................................245
Priority-Based Flow Control................................................................................................................................... 245
Enhanced Transmission Selection.........................................................................................................................246
Data Center Bridging Exchange Protocol (DCBx)............................................................................................ 247
Data Center Bridging in a Traffic Flow................................................................................................................ 248
QoS dot1p Traffic Classification and Queue Assignment......................................................................................248
SNMP Support for PFC and Buffer Statistics Tracking........................................................................................249
DCB Maps and its Attributes....................................................................................................................................... 250
Applying a DCB Map on a Line Card.................................................................................................................... 253
Data Center Bridging: Default Configuration........................................................................................................... 253
Configuration Notes: PFC and ETS in a DCB Map.................................................................................................254
Configuring Priority-Based Flow Control.................................................................................................................. 256
Configuring Lossless Queues................................................................................................................................. 256
Configuring Enhanced Transmission Selection........................................................................................................257
Creating an ETS Priority Group............................................................................................................................. 257
ETS Operation with DCBx...................................................................................................................................... 258
Configure a DCBx Operation........................................................................................................................................258
DCBx Operation.........................................................................................................................................................259
DCBx Port Roles....................................................................................................................................................... 259
8
Contents
DCB Configuration Exchange................................................................................................................................ 260
Configuration Source Election............................................................................................................................... 260
Propagation of DCB Information............................................................................................................................261
Auto-Detection and Manual Configuration of the DCBx Version.................................................................. 261
Behavior of Tagged Packets.................................................................................................................................. 262
Configuration Example for DSCP and PFC Priorities.......................................................................................262
DCBx Example............................................................................................................................................................263
DCBx Prerequisites and Restrictions................................................................................................................... 263
Configuring DCBx......................................................................................................................................................264
Verifying the DCB Configuration.................................................................................................................................267
Performing PFC Using DSCP Bits Instead of 802.1p Bits..................................................................................... 276
PFC and ETS Configuration Examples....................................................................................................................... 277
Using PFC and ETS to Manage Data Center Traffic..............................................................................................277
Using PFC and ETS to Manage Converged Ethernet Traffic.........................................................................278
Hierarchical Scheduling in ETS Output Policies.................................................................................................279
Priority-Based Flow Control Using Dynamic Buffer Method................................................................................279
Configuring the Dynamic Buffer Method..................................................................................................................280
Chapter 12: Debugging and Diagnostics..................................................................................... 282
Offline Diagnostics..........................................................................................................................................................282
Running Port Extender Offline Diagnostics on the Switch.............................................................................282
Running Offline Diagnostics on a Standalone Switch...................................................................................... 288
TRACE Logs..................................................................................................................................................................... 308
Auto Save on Reload, Crash, or Rollover............................................................................................................ 308
Uploading Trace Logs.............................................................................................................................................. 308
Last Restart Reason.......................................................................................................................................................309
show hardware Commands.......................................................................................................................................... 309
Environmental Monitoring.............................................................................................................................................. 311
Displaying Port Extender Environment Information ......................................................................................... 312
Display Power Supply Status.................................................................................................................................. 312
Display Fan Status..................................................................................................................................................... 313
Display Transceiver Type......................................................................................................................................... 313
Recognize an Over-Temperature Condition....................................................................................................... 315
Troubleshoot an Over-Temperature Condition.................................................................................................. 315
Troubleshooting Packet Loss........................................................................................................................................317
Displaying Drop Counters.........................................................................................................................................318
Displaying Dataplane Statistics...............................................................................................................................319
Displaying Line-Card Counters.............................................................................................................................. 320
Accessing Application Core Dumps.............................................................................................................................321
Mini Core Dumps.............................................................................................................................................................322
Full Kernel Core Dumps................................................................................................................................................. 322
Enabling TCP Dumps......................................................................................................................................................323
Accessing Port Extender Core and Mini Core Dumps........................................................................................... 323
Chapter 13: Dynamic Host Configuration Protocol (DHCP)........................................................ 324
DHCP Packet Format and Options.............................................................................................................................324
Assign an IP Address using DHCP.............................................................................................................................. 325
Implementation Information......................................................................................................................................... 326
Configure the System to be a DHCP Server............................................................................................................327
Contents
9
Configuring the Server for Automatic Address Allocation.............................................................................. 327
Specifying a Default Gateway................................................................................................................................328
Configure a Method of Hostname Resolution....................................................................................................329
Using DNS for Address Resolution....................................................................................................................... 329
Using NetBIOS WINS for Address Resolution....................................................................................................329
Creating Manual Binding Entries........................................................................................................................... 329
Debugging the DHCP Server................................................................................................................................. 330
Using DHCP Clear Commands...............................................................................................................................330
Configure the System to be a Relay Agent.............................................................................................................. 330
Configure the System to be a DHCP Client............................................................................................................. 332
DHCP Client on a Management Interface...........................................................................................................332
DHCP Client Operation with Other Features..................................................................................................... 332
DHCP Relay When DHCP Server and Client are in Different VRFs................................................................... 333
Configuring Route Leaking between VRFs on DHCP Relay Agent............................................................... 333
Non-default VRF configuration for DHCPv6 helper address............................................................................... 334
Configuring DHCP relay source interface.................................................................................................................335
Global DHCP relay source IPv4 or IPv6 configuration ....................................................................................335
Interface level DHCP relay source IPv4 or IPv6 configuration .....................................................................335
Configure Secure DHCP................................................................................................................................................336
Option 82 (DHCPv4 relay options).......................................................................................................................336
DHCPv6 relay agent options.................................................................................................................................. 337
DHCP Snooping.........................................................................................................................................................338
Drop DHCP Packets on Snooped VLANs Only.................................................................................................. 340
Dynamic ARP Inspection......................................................................................................................................... 340
Configuring Dynamic ARP Inspection................................................................................................................... 341
Source Address Validation............................................................................................................................................ 342
Enabling IP Source Address Validation................................................................................................................ 342
DHCP MAC Source Address Validation............................................................................................................... 343
Enabling IP+MAC Source Address Validation.....................................................................................................343
Viewing the Number of SAV Dropped Packets................................................................................................. 343
Clearing the Number of SAV Dropped Packets.................................................................................................344
Chapter 14: Equal Cost Multi-Path (ECMP)............................................................................... 345
ECMP for Flow-Based Affinity.................................................................................................................................... 345
Enabling Deterministic ECMP Next Hop............................................................................................................. 345
Configuring the Hash Algorithm Seed..................................................................................................................345
Link Bundle Monitoring............................................................................................................................................ 346
Managing ECMP Group Paths.....................................................................................................................................346
Creating an ECMP Group Bundle................................................................................................................................347
Modifying the ECMP Group Threshold......................................................................................................................347
BGP Multipath Operation with Link Bankwidth.......................................................................................................347
Dynamic Re-calculation of Link Bankwidth.............................................................................................................. 349
Weighted ECMP for Static Routes.............................................................................................................................349
ECMP Support in L3 Host and LPM Tables............................................................................................................. 350
Chapter 15: FCoE Transit........................................................................................................... 351
Fibre Channel over Ethernet.........................................................................................................................................351
Ensure Robustness in a Converged Ethernet Network..........................................................................................351
FIP Snooping on Ethernet Bridges............................................................................................................................. 353
10
Contents
FIP Snooping in a Switch Stack.................................................................................................................................. 354
Using FIP Snooping........................................................................................................................................................ 355
FIP Snooping Prerequisites.....................................................................................................................................355
Important Points to Remember.............................................................................................................................355
Enabling the FCoE Transit Feature.......................................................................................................................356
Enable FIP Snooping on VLANs.............................................................................................................................356
Configure the FC-MAP Value................................................................................................................................ 356
Configure a Port for a Bridge-to-Bridge Link.................................................................................................... 356
Configure a Port for a Bridge-to-FCF Link.........................................................................................................357
Impact on Other Software Features.................................................................................................................... 357
FIP Snooping Restrictions.......................................................................................................................................357
Configuring FIP Snooping............................................................................................................................................. 357
Displaying FIP Snooping Information..........................................................................................................................358
FCoE Transit Configuration Example......................................................................................................................... 363
Chapter 16: FIPS Cryptography................................................................................................. 365
Configuration Tasks....................................................................................................................................................... 365
Preparing the System.................................................................................................................................................... 365
Enabling FIPS Mode....................................................................................................................................................... 365
Generating Host-Keys................................................................................................................................................... 366
Monitoring FIPS Mode Status..................................................................................................................................... 366
Disabling FIPS Mode.......................................................................................................................................................367
Chapter 17: Flex Hash and Optimized Boot-Up...........................................................................368
Flex Hash Capability Overview.................................................................................................................................... 368
Configuring the Flex Hash Mechanism......................................................................................................................368
LACP Fast Switchover.................................................................................................................................................. 369
Configuring LACP Fast Switchover............................................................................................................................369
LACP.................................................................................................................................................................................. 369
RDMA Over Converged Ethernet (RoCE) Overview.............................................................................................369
Sample Configurations....................................................................................................................................................371
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 374
Chapter 18: Force10 Resilient Ring Protocol (FRRP)..................................................................375
Protocol Overview.......................................................................................................................................................... 375
Ring Status................................................................................................................................................................. 376
Multiple FRRP Rings.................................................................................................................................................376
Important FRRP Points............................................................................................................................................ 377
Implementing FRRP.................................................................................................................................................. 377
Important FRRP Concepts......................................................................................................................................377
FRRP Configuration........................................................................................................................................................378
Creating the FRRP Group....................................................................................................................................... 378
Configuring the Control VLAN............................................................................................................................... 379
Configuring and Adding the Member VLANs..................................................................................................... 380
Setting the FRRP Timers........................................................................................................................................ 380
Clearing the FRRP Counters................................................................................................................................... 381
Viewing the FRRP Configuration........................................................................................................................... 381
Viewing the FRRP Information............................................................................................................................... 381
Troubleshooting FRRP....................................................................................................................................................381
Contents
11
Sample Configuration and Topology.......................................................................................................................... 382
FRRP Support on VLT................................................................................................................................................... 383
Chapter 19: GARP VLAN Registration Protocol (GVRP)............................................................. 386
Configure GVRP.............................................................................................................................................................. 387
Enabling GVRP Globally.................................................................................................................................................387
Enabling GVRP on a Layer 2 Interface...................................................................................................................... 388
Configure GVRP Registration...................................................................................................................................... 388
Configure a GARP Timer...............................................................................................................................................389
Chapter 20: High Availability (HA).............................................................................................390
High Availability on Chassis.......................................................................................................................................... 390
High Availability in a PE Stack..................................................................................................................................... 390
Online Insertion and Removal...................................................................................................................................... 390
Hitless Behavior...............................................................................................................................................................392
Graceful Restart..............................................................................................................................................................393
Software Resiliency........................................................................................................................................................393
System Health Monitoring...................................................................................................................................... 393
Failure and Event Logging.......................................................................................................................................393
Trace Log.................................................................................................................................................................... 393
Core Dumps................................................................................................................................................................393
System Log.................................................................................................................................................................394
Control Plane Redundancy........................................................................................................................................... 394
Control-Plane Failover............................................................................................................................................. 394
RPM Synchronization.............................................................................................................................................. 395
Forcing an RPM Failover.........................................................................................................................................395
Specifying an Auto-Failover Limit......................................................................................................................... 395
Disabling Auto-Reboot............................................................................................................................................. 396
Chapter 21: Internet Group Management Protocol (IGMP).........................................................397
IGMP Protocol Overview.............................................................................................................................................. 397
IGMP Version 2..........................................................................................................................................................397
IGMP Version 3..........................................................................................................................................................399
Configure IGMP............................................................................................................................................................... 401
Viewing IGMP Enabled Interfaces.............................................................................................................................. 402
Selecting an IGMP Version........................................................................................................................................... 402
Viewing IGMP Groups....................................................................................................................................................403
Enabling IGMP Immediate-Leave................................................................................................................................ 403
IGMP Snooping................................................................................................................................................................403
Configuring IGMP Snooping................................................................................................................................... 404
Removing a Group-Port Association.................................................................................................................... 404
Disabling Multicast Flooding................................................................................................................................... 404
Specifying a Port as Connected to a Multicast Router...................................................................................405
Configuring the Switch as Querier....................................................................................................................... 405
Fast Convergence after MSTP Topology Changes................................................................................................406
Designating a Multicast Router Interface................................................................................................................. 406
Chapter 22: Interfaces...............................................................................................................407
Port Numbering...............................................................................................................................................................408
12
Contents
Interface Types................................................................................................................................................................ 410
View Basic Interface Information................................................................................................................................. 411
Resetting an Interface to its Factory Default State............................................................................................... 416
Enabling a Physical Interface........................................................................................................................................ 417
Physical Interfaces...........................................................................................................................................................417
Port Pipes.................................................................................................................................................................... 417
Setting the Speed of Ethernet Interfaces........................................................................................................... 417
Configuration Task List for Physical Interfaces................................................................................................. 418
Overview of Layer Modes........................................................................................................................................418
Configuring Layer 2 (Data Link) Mode................................................................................................................. 419
Configuring Layer 2 (Interface) Mode..................................................................................................................419
Configuring Layer 3 (Network) Mode.................................................................................................................. 419
Configuring Layer 3 (Interface) Mode.................................................................................................................420
Egress Interface Selection (EIS).................................................................................................................................420
Configuring EIS...........................................................................................................................................................421
Management Interfaces................................................................................................................................................. 421
Configuring a Dedicated Management Interface ..............................................................................................421
Configuring a Management Interface on an Ethernet Port............................................................................ 422
Port Extender Interfaces...............................................................................................................................................423
VLAN Interfaces.............................................................................................................................................................. 424
Loopback Interfaces.......................................................................................................................................................424
Null Interfaces..................................................................................................................................................................425
Configuring Port Delay.................................................................................................................................................. 425
Port Channel Interfaces................................................................................................................................................ 425
Port Channel Definition and Standards............................................................................................................... 426
Port Channel Benefits..............................................................................................................................................426
Port Channel Implementation.................................................................................................................................426
10/40 Gbps Interfaces in Port Channels.............................................................................................................426
Configuration Tasks for Port Channel Interfaces..............................................................................................427
Creating a Port Channel.......................................................................................................................................... 427
Adding a Physical Interface to a Port Channel.................................................................................................. 427
Reassigning an Interface to a New Port Channel............................................................................................. 429
Configuring the Minimum Oper Up Links in a Port Channel...........................................................................430
Adding or Removing a Port Channel from a VLAN........................................................................................... 430
Assigning an IP Address to a Port Channel........................................................................................................ 430
Deleting or Disabling a Port Channel.....................................................................................................................431
Load Balancing Through Port Channels............................................................................................................... 431
Changing the Hash Algorithm................................................................................................................................. 431
Bulk Configuration.......................................................................................................................................................... 432
Interface Range......................................................................................................................................................... 432
Bulk Configuration Examples..................................................................................................................................432
Defining Interface Range Macros............................................................................................................................... 434
Define the Interface Range.....................................................................................................................................434
Choosing an Interface-Range Macro................................................................................................................... 434
Monitoring and Maintaining Interfaces...................................................................................................................... 434
Maintenance Using TDR..........................................................................................................................................435
Displaying Traffic Statistics on HiGig Ports............................................................................................................. 436
Link Bundle Monitoring..................................................................................................................................................436
Monitoring HiGig Link Bundles.....................................................................................................................................437
Enabling HiGig Link-Bundle Monitoring............................................................................................................... 438
Contents
13
Non Dell-Qualified Transceivers.................................................................................................................................. 439
Splitting QSFP Ports to SFP+ Ports..........................................................................................................................439
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port........................................................................ 440
Configuring wavelength for 10–Gigabit SFP+ optics............................................................................................. 441
Link Dampening................................................................................................................................................................ 441
Enabling Link Dampening.........................................................................................................................................442
Using Ethernet Pause Frames for Flow Control......................................................................................................443
Threshold Settings....................................................................................................................................................444
Enabling Pause Frames............................................................................................................................................ 444
Configure the MTU Size on an Interface.................................................................................................................. 445
Auto-Negotiation on Ethernet Interfaces................................................................................................................. 445
Set Auto-Negotiation Options............................................................................................................................... 446
Provisioning Combo Ports............................................................................................................................................ 446
View Advanced Interface Information........................................................................................................................447
Configuring the Interface Sampling Size............................................................................................................. 447
Configuring the Traffic Sampling Size Globally....................................................................................................... 448
Dynamic Counters.......................................................................................................................................................... 450
Clearing Interface Counters................................................................................................................................... 450
Chapter 23: Internet Protocol Security (IPSec).........................................................................452
Configuring IPSec ..........................................................................................................................................................452
Chapter 24: IPv4 Routing.......................................................................................................... 454
IP Addresses.....................................................................................................................................................................454
Configuration Tasks for IP Addresses....................................................................................................................... 455
Assigning IP Addresses to an Interface.....................................................................................................................455
Configuring Static Routes............................................................................................................................................ 456
Adding description for IPv4 and IPv6 static routes.......................................................................................... 457
Configure Static Routes for the Management Interface...................................................................................... 457
Enabling Directed Broadcast........................................................................................................................................458
Resolution of Host Names............................................................................................................................................ 458
Enabling Dynamic Resolution of Host Names.......................................................................................................... 458
Specifying the Local System Domain and a List of Domains............................................................................... 459
Configuring DNS with Traceroute.............................................................................................................................. 459
ARP.................................................................................................................................................................................... 460
Configuration Tasks for ARP..................................................................................................................................460
Configuring Static ARP Entries............................................................................................................................. 460
Configuring ARP Inspection Trust......................................................................................................................... 461
Configuring ARP Timeout........................................................................................................................................ 461
Enabling Proxy ARP...................................................................................................................................................461
Clearing ARP Cache................................................................................................................................................. 462
ARP Learning via Gratuitous ARP......................................................................................................................... 462
Enabling ARP Learning via Gratuitous ARP........................................................................................................ 462
ARP Learning via ARP Request............................................................................................................................. 462
Configuring ARP Retries......................................................................................................................................... 463
ICMP.................................................................................................................................................................................. 464
Configuration Tasks for ICMP............................................................................................................................... 464
Enabling ICMP Unreachable Messages............................................................................................................... 464
ICMP Redirects............................................................................................................................................................... 464
14
Contents
Chapter 25: IPv6 Routing.......................................................................................................... 466
Protocol Overview..........................................................................................................................................................466
Extended Address Space........................................................................................................................................ 466
Stateless Autoconfiguration................................................................................................................................... 466
IPv6 Headers.............................................................................................................................................................. 467
IPv6 Header Fields....................................................................................................................................................468
Extension Header Fields.......................................................................................................................................... 469
IPv6 Addressing.........................................................................................................................................................470
IPv6 Implementation on the Dell Networking OS.....................................................................................................471
Configuring the LPM Table for IPv6 Extended Prefixes....................................................................................... 472
ICMPv6..............................................................................................................................................................................473
Path MTU Discovery...................................................................................................................................................... 473
IPv6 Neighbor Discovery...............................................................................................................................................474
IPv6 Neighbor Discovery of MTU Packets......................................................................................................... 474
Configuring the IPv6 Recursive DNS Server......................................................................................................474
Secure Shell (SSH) Over an IPv6 Transport............................................................................................................476
Configuration Tasks for IPv6....................................................................................................................................... 476
Adjusting Your CAM Profile.................................................................................................................................... 477
Assigning an IPv6 Address to an Interface......................................................................................................... 477
Assigning a Static IPv6 Route................................................................................................................................478
Configuring Telnet with IPv6..................................................................................................................................478
SNMP over IPv6........................................................................................................................................................478
Displaying IPv6 Information.................................................................................................................................... 479
Displaying an IPv6 Configuration...........................................................................................................................479
Displaying IPv6 Routes............................................................................................................................................ 480
Displaying the Running Configuration for an Interface.....................................................................................481
Clearing IPv6 Routes.................................................................................................................................................481
Disabling ND Entry Timeout.................................................................................................................................... 481
Configuring IPv6 RA Guard.......................................................................................................................................... 482
Configuring IPv6 RA Guard on an Interface....................................................................................................... 483
Monitoring IPv6 RA Guard......................................................................................................................................484
Chapter 26: Intermediate System to Intermediate System........................................................ 485
IS-IS Protocol Overview................................................................................................................................................485
IS-IS Addressing..............................................................................................................................................................485
Multi-Topology IS-IS...................................................................................................................................................... 486
Transition Mode.........................................................................................................................................................486
Interface Support......................................................................................................................................................486
Adjacencies.................................................................................................................................................................486
Graceful Restart.............................................................................................................................................................. 487
Timers...........................................................................................................................................................................487
Implementation Information..........................................................................................................................................487
Configuration Information.............................................................................................................................................488
Configuration Tasks for IS-IS.................................................................................................................................488
Configuring the Distance of a Route....................................................................................................................495
Changing the IS-Type.............................................................................................................................................. 495
Redistributing IPv4 Routes..................................................................................................................................... 498
Redistributing IPv6 Routes..................................................................................................................................... 498
Contents
15
Configuring Authentication Passwords............................................................................................................... 499
Setting the Overload Bit......................................................................................................................................... 499
Debugging IS-IS.........................................................................................................................................................500
IS-IS Metric Styles.......................................................................................................................................................... 501
Configure Metric Values................................................................................................................................................ 501
Maximum Values in the Routing Table................................................................................................................. 501
Change the IS-IS Metric Style in One Level Only..............................................................................................501
Leaks from One Level to Another.........................................................................................................................503
Sample Configurations...................................................................................................................................................503
Chapter 27: iSCSI Optimization.................................................................................................506
iSCSI Optimization Overview.......................................................................................................................................506
Default iSCSI Optimization Values..............................................................................................................................508
iSCSI Optimization Prerequisites................................................................................................................................ 508
Configuring iSCSI Optimization...................................................................................................................................508
Displaying iSCSI Optimization Information................................................................................................................ 510
Enable and Disable iSCSI Optimization....................................................................................................................... 511
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................512
Monitoring iSCSI Traffic Flows.................................................................................................................................... 512
Information Monitored in iSCSI Traffic Flows.......................................................................................................... 512
Detection and Auto-Configuration for Dell EqualLogic Arrays............................................................................. 513
Configuring Detection and Ports for Dell Compellent Arrays............................................................................... 513
Application of Quality of Service to iSCSI Traffic Flows....................................................................................... 514
Chapter 28: Link Aggregation Control Protocol (LACP)............................................................. 515
Introduction to Dynamic LAGs and LACP..................................................................................................................515
Important Points to Remember..............................................................................................................................515
LACP Modes............................................................................................................................................................... 516
Configuring LACP Commands................................................................................................................................ 516
LACP Configuration Tasks............................................................................................................................................ 516
Creating a LAG........................................................................................................................................................... 517
Configuring the LAG Interfaces as Dynamic....................................................................................................... 517
Setting the LACP Long Timeout............................................................................................................................ 517
Monitoring and Debugging LACP...........................................................................................................................518
Shared LAG State Tracking.......................................................................................................................................... 518
Configuring Shared LAG State Tracking..............................................................................................................519
Important Points about Shared LAG State Tracking....................................................................................... 520
LACP Basic Configuration Example............................................................................................................................ 521
Configure a LAG on ALPHA.................................................................................................................................... 521
Chapter 29: Layer 2...................................................................................................................530
Manage the MAC Address Table................................................................................................................................ 530
Clearing the MAC Address Table.......................................................................................................................... 530
Setting the Aging Time for Dynamic Entries......................................................................................................530
Configuring a Static MAC Address........................................................................................................................531
Displaying the MAC Address Table........................................................................................................................531
MAC Learning Limit.........................................................................................................................................................531
Setting the MAC Learning Limit.............................................................................................................................531
mac learning-limit Dynamic.....................................................................................................................................532
16
Contents
mac learning-limit mac-address-sticky................................................................................................................ 532
mac learning-limit station-move............................................................................................................................ 532
mac learning-limit no-station-move......................................................................................................................532
Learning Limit Violation Actions............................................................................................................................ 533
Setting Station Move Violation Actions...............................................................................................................533
Recovering from Learning Limit and Station Move Violations.......................................................................533
Disabling MAC Address Learning on the System.............................................................................................. 534
Enabling port security.............................................................................................................................................. 534
NIC Teaming.....................................................................................................................................................................534
Configure Redundant Pairs.......................................................................................................................................... 535
Far-End Failure Detection.............................................................................................................................................538
FEFD State Changes................................................................................................................................................539
Configuring FEFD......................................................................................................................................................539
Enabling FEFD on an Interface.............................................................................................................................. 540
Debugging FEFD........................................................................................................................................................ 541
Chapter 30: Link Layer Discovery Protocol (LLDP).................................................................... 542
802.1AB (LLDP) Overview............................................................................................................................................542
Protocol Data Units.................................................................................................................................................. 542
Optional TLVs.................................................................................................................................................................. 544
Management TLVs....................................................................................................................................................544
TIA-1057 (LLDP-MED) Overview............................................................................................................................... 545
TIA Organizationally Specific TLVs.......................................................................................................................545
Configure LLDP...............................................................................................................................................................549
CONFIGURATION versus INTERFACE Configurations......................................................................................... 549
Enabling LLDP................................................................................................................................................................. 550
Disabling and Undoing LLDP.................................................................................................................................. 550
Enabling LLDP on Management Ports........................................................................................................................551
Disabling and Undoing LLDP on Management Ports........................................................................................ 551
Advertising TLVs..............................................................................................................................................................551
Storing and Viewing Unrecognized LLDP TLVs...................................................................................................... 552
Viewing the LLDP Configuration.................................................................................................................................553
Viewing Information Advertised by Adjacent LLDP Neighbors........................................................................... 554
Examples of Viewing Information Advertised by Neighbors...........................................................................554
Configuring LLDPDU Intervals.....................................................................................................................................555
Configuring LLDP Notification Interval..................................................................................................................... 556
Configuring Transmit and Receive Mode..................................................................................................................556
Configuring a Time to Live............................................................................................................................................557
Debugging LLDP............................................................................................................................................................. 558
Relevant Management Objects...................................................................................................................................559
Chapter 31: Multicast Source Discovery Protocol (MSDP).........................................................563
Anycast RP.......................................................................................................................................................................564
Implementation Information......................................................................................................................................... 565
Configure Multicast Source Discovery Protocol.....................................................................................................565
Related Configuration Tasks.................................................................................................................................. 565
Enable MSDP................................................................................................................................................................... 569
Manage the Source-Active Cache..............................................................................................................................570
Viewing the Source-Active Cache........................................................................................................................ 570
Contents
17
Limiting the Source-Active Cache........................................................................................................................ 570
Clearing the Source-Active Cache....................................................................................................................... 570
Enabling the Rejected Source-Active Cache...................................................................................................... 571
Accept Source-Active Messages that Fail the RFP Check...................................................................................571
Specifying Source-Active Messages..........................................................................................................................575
Limiting the Source-Active Messages from a Peer................................................................................................ 576
Preventing MSDP from Caching a Local Source.................................................................................................... 576
Preventing MSDP from Caching a Remote Source................................................................................................577
Preventing MSDP from Advertising a Local Source...............................................................................................577
Logging Changes in Peership States..........................................................................................................................578
Terminating a Peership..................................................................................................................................................578
Clearing Peer Statistics................................................................................................................................................. 578
Debugging MSDP............................................................................................................................................................579
MSDP with Anycast RP.................................................................................................................................................579
Configuring Anycast RP................................................................................................................................................ 580
Reducing Source-Active Message Flooding........................................................................................................581
Specifying the RP Address Used in SA Messages.............................................................................................581
MSDP Sample Configurations......................................................................................................................................583
Chapter 32: Multiple Spanning Tree Protocol (MSTP)............................................................... 588
Spanning Tree Variations..............................................................................................................................................589
Implementation Information................................................................................................................................... 589
Configure Multiple Spanning Tree Protocol............................................................................................................. 589
Related Configuration Tasks.................................................................................................................................. 589
Enable Multiple Spanning Tree Globally.................................................................................................................... 590
Adding and Removing Interfaces................................................................................................................................590
Creating Multiple Spanning Tree Instances..............................................................................................................590
Influencing MSTP Root Selection................................................................................................................................591
Interoperate with Non-Dell Bridges............................................................................................................................592
Changing the Region Name or Revision....................................................................................................................592
Modifying Global Parameters.......................................................................................................................................592
Modifying the Interface Parameters.......................................................................................................................... 593
Configuring an EdgePort...............................................................................................................................................594
Flush MAC Addresses after a Topology Change.................................................................................................... 595
MSTP Sample Configurations......................................................................................................................................595
Debugging and Verifying MSTP Configurations......................................................................................................598
Chapter 33: Multicast Features................................................................................................. 600
Enabling IP Multicast..................................................................................................................................................... 600
Implementation Information......................................................................................................................................... 600
First Packet Forwarding for Lossless Multicast.......................................................................................................601
Multicast Policies.............................................................................................................................................................601
IPv4 Multicast Policies............................................................................................................................................. 601
Understanding Multicast Traceroute (mtrace)....................................................................................................... 607
Printing Multicast Traceroute (mtrace) Paths........................................................................................................ 608
Supported Error Codes................................................................................................................................................. 609
mtrace Scenarios.............................................................................................................................................................610
Chapter 34: Multicast Listener Discovery Protocol.................................................................... 616
18
Contents
MLD timers........................................................................................................................................................................619
Reducing Host Response Burstiness.................................................................................................................... 619
Configuring MLD Version..............................................................................................................................................620
Clearing MLD groups..................................................................................................................................................... 620
Debugging MLD...............................................................................................................................................................620
Explicit Tracking..............................................................................................................................................................620
Reducing Leave Latency............................................................................................................................................... 620
Displaying MLD groups table........................................................................................................................................ 621
Displaying MLD Interfaces.............................................................................................................................................621
MLD Snooping.................................................................................................................................................................. 621
Enable MLD Snooping...............................................................................................................................................621
Disable MLD Snooping............................................................................................................................................. 622
Configure the switch as a querier.........................................................................................................................622
Specify port as connected to multicast router..................................................................................................622
Enable Snooping Explicit Tracking........................................................................................................................ 622
Display the MLD Snooping Table...........................................................................................................................623
Chapter 35: Object Tracking......................................................................................................624
Object Tracking Overview............................................................................................................................................ 624
Track Layer 2 Interfaces......................................................................................................................................... 625
Track Layer 3 Interfaces......................................................................................................................................... 625
Track IPv4 and IPv6 Routes...................................................................................................................................625
Track a Metric Threshold........................................................................................................................................626
Tracking a Metric Threshold.................................................................................................................................. 626
Track Route Reachability........................................................................................................................................ 627
Tracking Route Reachability...................................................................................................................................627
Configuring track reachability refresh interval.................................................................................................. 628
Set Tracking Delays..................................................................................................................................................629
VRRP Object Tracking............................................................................................................................................. 629
Object Tracking Configuration.....................................................................................................................................629
Tracking a Layer 2 Interface.................................................................................................................................. 629
Tracking a Layer 3 Interface.................................................................................................................................. 630
Configuring track reachability refresh interval................................................................................................... 631
Displaying Tracked Objects.......................................................................................................................................... 632
Chapter 36: Open Shortest Path First (OSPFv2 and OSPFv3)................................................... 634
Protocol Overview..........................................................................................................................................................634
Autonomous System (AS) Areas...........................................................................................................................634
Area Types..................................................................................................................................................................635
Networks and Neighbors.........................................................................................................................................636
Router Types..............................................................................................................................................................636
Designated and Backup Designated Routers..................................................................................................... 637
Link-State Advertisements (LSAs).......................................................................................................................637
Virtual Links................................................................................................................................................................ 638
Router Priority and Cost......................................................................................................................................... 639
OSPF Implementation....................................................................................................................................................639
Fast Convergence (OSPFv2, IPv4 Only)............................................................................................................ 640
Multi-Process OSPFv2 (IPv4 only)...................................................................................................................... 640
RFC-2328 Compliant OSPF Flooding...................................................................................................................640
Contents
19
OSPF ACK Packing................................................................................................................................................... 641
Setting OSPF Adjacency with Cisco Routers..................................................................................................... 641
Configuration Information.............................................................................................................................................642
Configuration Task List for OSPFv2 (OSPF for IPv4).....................................................................................642
Sample Configurations for OSPFv2........................................................................................................................... 652
OSPFv3 NSSA................................................................................................................................................................. 654
Configuration Task List for OSPFv3 (OSPF for IPv6).......................................................................................... 654
Enabling IPv6 Unicast Routing.............................................................................................................................. 655
Assigning IPv6 Addresses on an Interface..........................................................................................................655
Assigning Area ID on an Interface.........................................................................................................................655
Assigning OSPFv3 Process ID and Router ID Globally.....................................................................................656
Assigning OSPFv3 Process ID and Router ID to a VRF...................................................................................656
Configuring the Cost of OSPFv3 Routes............................................................................................................657
Configuring Stub Areas............................................................................................................................................657
Configuring Passive-Interface............................................................................................................................... 657
Redistributing Routes...............................................................................................................................................657
Configuring a Default Route...................................................................................................................................658
OSPFv3 Authentication Using IPsec....................................................................................................................658
Troubleshooting OSPFv3........................................................................................................................................ 664
MIB Support for OSPFv3..............................................................................................................................................665
Viewing the OSPFv3 MIB....................................................................................................................................... 665
Chapter 37: Per-VLAN Spanning Tree Plus (PVST+)..................................................................666
Protocol Overview..........................................................................................................................................................666
Implementation Information..........................................................................................................................................667
Configure Per-VLAN Spanning Tree Plus................................................................................................................. 667
Enabling PVST+...............................................................................................................................................................668
Disabling PVST+..............................................................................................................................................................668
Influencing PVST+ Root Selection............................................................................................................................. 668
Modifying Global PVST+ Parameters.........................................................................................................................670
Modifying Interface PVST+ Parameters................................................................................................................... 670
Configuring an EdgePort................................................................................................................................................671
PVST+ in Multi-Vendor Networks.............................................................................................................................. 672
Enabling PVST+ Extend System ID............................................................................................................................ 672
PVST+ Sample Configurations.................................................................................................................................... 673
Chapter 38: PIM Sparse-Mode (PIM-SM).................................................................................. 675
Implementation Information..........................................................................................................................................675
Protocol Overview.......................................................................................................................................................... 675
Requesting Multicast Traffic..................................................................................................................................675
Refuse Multicast Traffic..........................................................................................................................................676
Send Multicast Traffic............................................................................................................................................. 676
Configuring PIM-SSM....................................................................................................................................................676
Related Configuration Tasks...................................................................................................................................677
Enable PIM-SM................................................................................................................................................................677
Configuring S,G Expiry Timers.....................................................................................................................................678
Configuring a Static Rendezvous Point.....................................................................................................................678
Overriding Bootstrap Router Updates................................................................................................................. 678
Configuring a Designated Router................................................................................................................................679
20
Contents
/