Dell PowerSwitch S6100-ON Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6100-ON Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S6100 ON
System
9.13.0.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 12
Rev. A00
Contents
1 About this Guide...........................................................................................................................................36
Audience........................................................................................................................................................................... 36
Conventions......................................................................................................................................................................36
Related Documents......................................................................................................................................................... 36
2 Conguration Fundamentals........................................................................................................................ 37
Accessing the Command Line........................................................................................................................................ 37
CLI Modes.........................................................................................................................................................................38
Navigating CLI Modes...............................................................................................................................................39
The do Command............................................................................................................................................................ 42
Undoing Commands........................................................................................................................................................ 43
Obtaining Help..................................................................................................................................................................43
Entering and Editing Commands....................................................................................................................................43
Command History............................................................................................................................................................ 44
Filtering show Command Outputs.................................................................................................................................44
Example of the grep Keyword.................................................................................................................................. 45
Multiple Users in Conguration Mode...........................................................................................................................45
Conguring alias command.............................................................................................................................................46
Viewing alias conguration........................................................................................................................................46
3 Getting Started............................................................................................................................................48
Console Access................................................................................................................................................................49
Serial Console.............................................................................................................................................................49
Micro USB-B Access.................................................................................................................................................50
Default Conguration....................................................................................................................................................... 51
Conguring a Host Name................................................................................................................................................ 51
Accessing the System Remotely.................................................................................................................................... 51
Accessing the System Remotely.............................................................................................................................. 51
Congure the Management Port IP Address..........................................................................................................51
Congure a Management Route..............................................................................................................................52
Conguring a Username and Password..................................................................................................................52
Conguring the Enable Password..................................................................................................................................53
Conguration File Management.....................................................................................................................................53
Copy Files to and from the System......................................................................................................................... 53
Mounting an NFS File System..................................................................................................................................54
Save the Running-Conguration..............................................................................................................................56
Congure the Overload Bit for a Startup Scenario............................................................................................... 56
Viewing Files...............................................................................................................................................................56
Managing the File System...............................................................................................................................................57
View Command History.................................................................................................................................................. 58
Upgrading Dell EMC Networking OS............................................................................................................................ 58
Using HTTP for File Transfers........................................................................................................................................ 58
Contents
3
Verify Software Images Before Installation...................................................................................................................59
4 Management................................................................................................................................................ 61
Conguring Privilege Levels............................................................................................................................................ 61
Creating a Custom Privilege Level...........................................................................................................................62
Removing a Command from EXEC Mode.............................................................................................................. 62
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................62
Allowing Access to CONFIGURATION Mode Commands....................................................................................62
Allowing Access to Dierent Modes........................................................................................................................62
Applying a Privilege Level to a Username............................................................................................................... 64
Applying a Privilege Level to a Terminal Line.......................................................................................................... 64
Conguring Logging........................................................................................................................................................ 64
Audit and Security Logs............................................................................................................................................65
Conguring Logging Format ...................................................................................................................................66
Setting Up a Secure Connection to a Syslog Server.............................................................................................66
Log Messages in the Internal Buer..............................................................................................................................68
Conguration Task List for System Log Management.......................................................................................... 68
Disabling System Logging............................................................................................................................................... 68
Sending System Messages to a Syslog Server............................................................................................................68
Conguring a UNIX System as a Syslog Server.....................................................................................................68
Track Login Activity......................................................................................................................................................... 69
Restrictions for Tracking Login Activity.................................................................................................................. 69
Conguring Login Activity Tracking.........................................................................................................................69
Display Login Statistics..............................................................................................................................................70
Limit Concurrent Login Sessions.....................................................................................................................................71
Restrictions for Limiting the Number of Concurrent Sessions............................................................................. 71
Conguring Concurrent Session Limit......................................................................................................................71
Enabling the System to Clear Existing Sessions.................................................................................................... 72
Enabling Secured CLI Mode............................................................................................................................................73
Changing System Logging Settings...............................................................................................................................73
Display the Logging Buer and the Logging Conguration........................................................................................ 74
Conguring a UNIX Logging Facility Level.................................................................................................................... 74
Synchronizing Log Messages......................................................................................................................................... 75
Enabling Timestamp on Syslog Messages.................................................................................................................... 76
File Transfer Services.......................................................................................................................................................76
Conguration Task List for File Transfer Services..................................................................................................76
Enabling the FTP Server........................................................................................................................................... 77
Conguring FTP Server Parameters........................................................................................................................77
Conguring FTP Client Parameters......................................................................................................................... 77
Terminal Lines................................................................................................................................................................... 78
Denying and Permitting Access to a Terminal Line................................................................................................ 78
Conguring Login Authentication for Terminal Lines.............................................................................................79
Setting Timeout for EXEC Privilege Mode...................................................................................................................80
Using Telnet to get to Another Network Device...........................................................................................................81
Lock CONFIGURATION Mode........................................................................................................................................81
Viewing the Conguration Lock Status................................................................................................................... 81
4
Contents
LPC Bus Quality Degradation......................................................................................................................................... 82
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................83
Restoring the Factory Default Settings.........................................................................................................................83
Important Points to Remember................................................................................................................................83
Restoring Factory Default Environment Variables................................................................................................. 84
Reloading the system...................................................................................................................................................... 85
Viewing the Reason for Last System Reboot.............................................................................................................. 86
5 802.1X..........................................................................................................................................................87
Port-Authentication Process..........................................................................................................................................89
EAP over RADIUS......................................................................................................................................................90
Conguring 802.1X...........................................................................................................................................................90
Related Conguration Tasks..................................................................................................................................... 90
Important Points to Remember...................................................................................................................................... 91
Enabling 802.1X................................................................................................................................................................. 91
Conguring dot1x Prole ................................................................................................................................................92
Conguring MAC addresses for a do1x Prole.............................................................................................................93
Conguring the Static MAB and MAB Prole .............................................................................................................93
Conguring Critical VLAN ..............................................................................................................................................94
Conguring Request Identity Re-Transmissions...........................................................................................................95
Conguring a Quiet Period after a Failed Authentication..................................................................................... 95
Conguring a Quiet Period after a Failed Authentication........................................................................................... 96
Forcibly Authorizing or Unauthorizing a Port................................................................................................................97
Re-Authenticating a Port................................................................................................................................................98
Conguring Dynamic VLAN Assignment with Port Authentication.......................................................................... 99
Guest and Authentication-Fail VLANs.........................................................................................................................100
Conguring a Guest VLAN......................................................................................................................................100
Conguring an Authentication-Fail VLAN............................................................................................................. 100
Conguring Timeouts............................................................................................................................................... 101
Multi-Host Authentication.............................................................................................................................................102
Conguring Multi-Host AuthenticationConguring Single-Host Authentication............................................. 104
Multi-Supplicant Authentication...................................................................................................................................105
Conguring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication............................ 105
MAC Authentication Bypass.........................................................................................................................................106
MAB in Single-host and Multi-Host Mode............................................................................................................ 107
MAB in Multi-Supplicant Authentication Mode.................................................................................................... 107
Conguring MAC Authentication Bypass.............................................................................................................. 107
Dynamic CoS with 802.1X............................................................................................................................................. 108
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)...................................110
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................................................................110
Guidelines for Conguring ACL VLAN Groups.............................................................................................................111
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters................................................ 111
Conguring ACL VLAN Groups................................................................................................................................111
Conguring FP Blocks for VLAN Parameters........................................................................................................112
Viewing CAM Usage....................................................................................................................................................... 113
Contents
5
Allocating FP Blocks for VLAN Processes................................................................................................................... 114
ACL Optimization to Increase Number of Supported IPv4 ACLs..............................................................................115
Restrictions for ACL Optimization.......................................................................................................................... 115
Optimizing ACL for More Number of IPv4 ACL Rules..........................................................................................115
7 Access Control Lists (ACLs)........................................................................................................................ 117
IP Access Control Lists (ACLs)......................................................................................................................................118
CAM Usage................................................................................................................................................................118
Implementing ACLs on Dell EMC Networking OS.................................................................................................119
Congure ACL Range Proles................................................................................................................................. 121
Important Points to Remember.....................................................................................................................................121
Conguration Task List for Route Maps................................................................................................................ 122
Conguring Match Routes...................................................................................................................................... 124
Conguring Set Conditions..................................................................................................................................... 125
Congure a Route Map for Route Redistribution.................................................................................................126
Congure a Route Map for Route Tagging............................................................................................................127
Continue Clause........................................................................................................................................................127
IP Fragment Handling.....................................................................................................................................................127
IP Fragments ACL Examples...................................................................................................................................128
Layer 4 ACL Rules Examples...................................................................................................................................128
Congure a Standard IP ACL........................................................................................................................................129
Conguring a Standard IP ACL Filter..................................................................................................................... 130
Congure an Extended IP ACL......................................................................................................................................131
Conguring Filters with a Sequence Number........................................................................................................131
Conguring Filters Without a Sequence Number.................................................................................................134
Congure Layer 2 and Layer 3 ACLs............................................................................................................................134
Assign an IP ACL to an Interface..................................................................................................................................135
Applying an IP ACL.........................................................................................................................................................135
Counting ACL Hits....................................................................................................................................................136
Congure Ingress ACLs................................................................................................................................................. 136
Congure Egress ACLs.................................................................................................................................................. 137
Applying Egress Layer 3 ACLs (Control-Plane).....................................................................................................137
IP Prex Lists.................................................................................................................................................................. 138
Implementation Information.................................................................................................................................... 138
Conguration Task List for Prex Lists.................................................................................................................. 139
ACL Resequencing......................................................................................................................................................... 142
Resequencing an ACL or Prex List.......................................................................................................................143
Route Maps.....................................................................................................................................................................144
Implementation Information.................................................................................................................................... 144
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 145
How BFD Works............................................................................................................................................................. 145
BFD Packet Format..................................................................................................................................................146
BFD Sessions............................................................................................................................................................ 147
BFD Three-Way Handshake.................................................................................................................................... 148
Session State Changes............................................................................................................................................150
6
Contents
Important Points to Remember....................................................................................................................................150
Congure BFD................................................................................................................................................................ 150
Congure BFD for Physical Ports........................................................................................................................... 151
Congure BFD for Static Routes............................................................................................................................154
Congure BFD for OSPF.........................................................................................................................................157
Congure BFD for OSPFv3.....................................................................................................................................162
Congure BFD for IS-IS...........................................................................................................................................165
Congure BFD for BGP........................................................................................................................................... 167
Congure BFD for VRRP.........................................................................................................................................176
Conguring Protocol Liveness................................................................................................................................ 179
9 Border Gateway Protocol IPv4 (BGPv4).................................................................................................... 180
Autonomous Systems (AS)...........................................................................................................................................180
Sessions and Peers.........................................................................................................................................................182
Establish a Session................................................................................................................................................... 182
Route Reectors.............................................................................................................................................................183
BGP Attributes................................................................................................................................................................184
Best Path Selection Criteria....................................................................................................................................184
Weight........................................................................................................................................................................186
Local Preference.......................................................................................................................................................186
Multi-Exit Discriminators (MEDs)...........................................................................................................................187
Origin..........................................................................................................................................................................188
AS Path......................................................................................................................................................................189
Next Hop................................................................................................................................................................... 189
Multiprotocol BGP..........................................................................................................................................................189
Implement BGP with Dell EMC Networking OS.........................................................................................................190
Additional Path (Add-Path) Support......................................................................................................................190
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 190
Ignore Router-ID in Best-Path Calculation.............................................................................................................191
Four-Byte AS Numbers............................................................................................................................................ 191
AS4 Number Representation...................................................................................................................................191
AS Number Migration.............................................................................................................................................. 193
BGP4 Management Information Base (MIB)........................................................................................................194
Important Points to Remember.............................................................................................................................. 194
Conguration Information............................................................................................................................................. 195
BGP Conguration......................................................................................................................................................... 195
Enabling BGP............................................................................................................................................................ 196
Conguring AS4 Number Representations...........................................................................................................199
Conguring Peer Groups.........................................................................................................................................201
Conguring BGP Fast Fall-Over............................................................................................................................ 203
Conguring Passive Peering...................................................................................................................................205
Maintaining Existing AS Numbers During an AS Migration................................................................................ 205
Allowing an AS Number to Appear in its Own AS Path...................................................................................... 206
Enabling Graceful Restart.......................................................................................................................................207
Enabling Neighbor Graceful Restart......................................................................................................................208
Filtering on an AS-Path Attribute.......................................................................................................................... 208
Contents
7
Regular Expressions as Filters.................................................................................................................................210
Redistributing Routes............................................................................................................................................... 211
Enabling Additional Paths........................................................................................................................................ 212
Conguring IP Community Lists............................................................................................................................. 212
Conguring an IP Extended Community List........................................................................................................ 213
Filtering Routes with Community Lists.................................................................................................................. 214
Manipulating the COMMUNITY Attribute.............................................................................................................215
Changing MED Attributes....................................................................................................................................... 216
Changing the LOCAL_PREFERENCE Attribute.................................................................................................. 216
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............. 217
Changing the WEIGHT Attribute............................................................................................................................218
Enabling Multipath....................................................................................................................................................218
Filtering BGP Routes................................................................................................................................................218
Filtering BGP Routes Using Route Maps..............................................................................................................220
Filtering BGP Routes Using AS-PATH Information..............................................................................................220
Conguring BGP Route Reectors........................................................................................................................ 221
Aggregating Routes.................................................................................................................................................222
Conguring BGP Confederations.......................................................................................................................... 222
Enabling Route Flap Dampening............................................................................................................................ 223
Changing BGP Timers.............................................................................................................................................225
Enabling BGP Neighbor Soft-Reconguration.....................................................................................................225
Enabling or disabling BGP neighbors.....................................................................................................................226
Route Map Continue............................................................................................................................................... 228
Enabling MBGP Congurations................................................................................................................................... 228
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor......................................... 229
BGP Regular Expression Optimization........................................................................................................................229
Debugging BGP............................................................................................................................................................. 229
Storing Last and Bad PDUs....................................................................................................................................230
Capturing PDUs........................................................................................................................................................231
PDU Counters.......................................................................................................................................................... 232
Sample Congurations.................................................................................................................................................. 232
10 Content Addressable Memory (CAM).......................................................................................................239
CAM Allocation...............................................................................................................................................................239
Test CAM Usage.............................................................................................................................................................241
View CAM-ACL Settings............................................................................................................................................... 241
View CAM Usage...........................................................................................................................................................242
Conguring CAM Threshold and Silence Period........................................................................................................243
Setting CAM Threshold and Silence Period..........................................................................................................243
CAM Optimization......................................................................................................................................................... 244
Troubleshoot CAM Proling..........................................................................................................................................244
QoS CAM Region Limitation...................................................................................................................................245
Syslog Error When the Table is Full....................................................................................................................... 245
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................245
Syslog Warning for Discrepancies Between Congured Extended Prexes....................................................245
Unied Forwarding Table (UFT) Modes......................................................................................................................245
8
Contents
Conguring UFT Modes..........................................................................................................................................246
11 Control Plane Policing (CoPP).................................................................................................................. 247
Congure Control Plane Policing................................................................................................................................. 248
Conguring CoPP for Protocols............................................................................................................................ 249
Conguring CoPP for CPU Queues....................................................................................................................... 251
Protocol to CPU Queue Mapping..........................................................................................................................252
Conguring Protocol to CPU Queue Mapping.....................................................................................................252
Displaying CoPP Conguration ............................................................................................................................. 253
12 Data Center Bridging (DCB).....................................................................................................................255
Ethernet Enhancements in Data Center Bridging..................................................................................................... 255
Priority-Based Flow Control................................................................................................................................... 256
Enhanced Transmission Selection..........................................................................................................................257
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................258
Data Center Bridging in a Trac Flow.................................................................................................................. 259
Enabling Data Center Bridging.....................................................................................................................................259
DCB Maps and its Attributes................................................................................................................................. 260
Data Center Bridging: Default Conguration..............................................................................................................260
Conguring Priority-Based Flow Control.....................................................................................................................261
Conguring Lossless Queues................................................................................................................................. 262
Conguring PFC in a DCB Map................................................................................................................................... 263
PFC Conguration Notes........................................................................................................................................263
PFC Prerequisites and Restrictions....................................................................................................................... 264
Applying a DCB Map on a Port.................................................................................................................................... 264
Conguring PFC without a DCB Map.........................................................................................................................265
Priority-Based Flow Control Using Dynamic Buer Method................................................................................... 265
Pause and Resume of Trac..................................................................................................................................265
Buer Sizes for Lossless or PFC Packets............................................................................................................ 266
Shared headroom for lossless or PFC packets.......................................................................................................... 266
Example Scenario.....................................................................................................................................................267
Conguring Shared Head Room Buer................................................................................................................ 268
Viewing Shared Head Room Usage.......................................................................................................................268
Monitoring Buer Statistics for Tracking Purposes............................................................................................ 269
Behavior of Tagged Packets.........................................................................................................................................269
SNMP Support for PFC and Buer Statistics Tracking............................................................................................270
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................270
Conguration Example for DSCP and PFC Priorities.................................................................................................271
Using PFC to Manage Converged Ethernet Trac....................................................................................................271
Generation of PFC for a Priority for Untagged Packets............................................................................................271
Congure Enhanced Transmission Selection..............................................................................................................272
Creating an ETS Priority Group..............................................................................................................................272
ETS Operation with DCBx...................................................................................................................................... 273
Conguring ETS in a DCB Map..............................................................................................................................273
Hierarchical Scheduling in ETS Output Policies......................................................................................................... 275
Using ETS to Manage Converged Ethernet Trac................................................................................................... 275
Contents
9
Applying DCB Policies in a Switch Stack.................................................................................................................... 275
Congure a DCBx Operation........................................................................................................................................275
DCBx Operation....................................................................................................................................................... 276
DCBx Port Roles...................................................................................................................................................... 276
DCB Conguration Exchange.................................................................................................................................277
Conguration Source Election................................................................................................................................278
Propagation of DCB Information............................................................................................................................278
Auto-Detection and Manual Conguration of the DCBx Version.......................................................................279
DCBx Example..........................................................................................................................................................279
DCBx Prerequisites and Restrictions.....................................................................................................................280
Conguring DCBx....................................................................................................................................................280
Verifying the DCB Conguration..................................................................................................................................284
QoS dot1p Trac Classication and Queue Assignment...........................................................................................291
Conguring the Dynamic Buer Method.................................................................................................................... 291
Sample DCB Conguration...........................................................................................................................................292
PFC and ETS Conguration Command Examples...............................................................................................294
13 Dynamic Host Conguration Protocol (DHCP).........................................................................................295
DHCP Packet Format and Options............................................................................................................................. 295
Assign an IP Address using DHCP............................................................................................................................... 297
Implementation Information..........................................................................................................................................298
Congure the System to be a DHCP Server............................................................................................................. 298
Conguring the Server for Automatic Address Allocation..................................................................................299
Specifying a Default Gateway................................................................................................................................300
Congure a Method of Hostname Resolution..................................................................................................... 300
Using DNS for Address Resolution........................................................................................................................300
Using NetBIOS WINS for Address Resolution...................................................................................................... 301
Creating Manual Binding Entries............................................................................................................................ 301
Debugging the DHCP Server..................................................................................................................................301
Using DHCP Clear Commands.............................................................................................................................. 302
Congure the System to be a DHCP Client............................................................................................................... 302
Conguring the DHCP Client System...................................................................................................................302
DHCP Client on a Management Interface............................................................................................................304
DHCP Client Operation with Other Features.......................................................................................................304
Congure the System for User Port Stacking (Option 230)................................................................................... 305
Congure Secure DHCP...............................................................................................................................................305
Option 82..................................................................................................................................................................306
DHCP Snooping.......................................................................................................................................................306
Drop DHCP Packets on Snooped VLANs Only..................................................................................................... 311
Dynamic ARP Inspection......................................................................................................................................... 312
Conguring Dynamic ARP Inspection.................................................................................................................... 312
Source Address Validation............................................................................................................................................. 313
Enabling IP Source Address Validation...................................................................................................................314
DHCP MAC Source Address Validation................................................................................................................. 314
Enabling IP+MAC Source Address Validation....................................................................................................... 315
Viewing the Number of SAV Dropped Packets.................................................................................................... 315
10
Contents
Clearing the Number of SAV Dropped Packets....................................................................................................316
14 Equal Cost Multi-Path (ECMP).................................................................................................................317
ECMP for Flow-Based Anity......................................................................................................................................317
Conguring the Hash Algorithm Seed................................................................................................................... 317
Link Bundle Monitoring.................................................................................................................................................. 317
Managing ECMP Group Paths................................................................................................................................318
Creating an ECMP Group Bundle...........................................................................................................................318
Modifying the ECMP Group Threshold................................................................................................................. 319
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table.......................................319
Support for ECMP in host table............................................................................................................................ 320
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 320
RTAG7.......................................................................................................................................................................320
Flow-based Hashing for ECMP.............................................................................................................................. 321
15 FIP Snooping............................................................................................................................................325
Fibre Channel over Ethernet........................................................................................................................................ 325
Ensure Robustness in a Converged Ethernet Network............................................................................................325
FIP Snooping on Ethernet Bridges.............................................................................................................................. 327
Using FIP Snooping....................................................................................................................................................... 329
FIP Snooping Prerequisites.....................................................................................................................................329
Important Points to Remember............................................................................................................................. 329
Enabling the FCoE Transit Feature........................................................................................................................330
Enable FIP Snooping on VLANs..............................................................................................................................331
Congure the FC-MAP Value................................................................................................................................. 331
Congure a Port for a Bridge-to-Bridge Link........................................................................................................331
Congure a Port for a Bridge-to-FCF Link............................................................................................................331
Impact on Other Software Features..................................................................................................................... 332
FIP Snooping Restrictions...................................................................................................................................... 332
Conguring FIP Snooping.......................................................................................................................................332
Displaying FIP Snooping Information...........................................................................................................................333
FCoE Transit Conguration Example...........................................................................................................................338
16 Flex Hash and Optimized Boot-Up............................................................................................................340
Flex Hash Capability Overview.................................................................................................................................... 340
Conguring the Flex Hash Mechanism.......................................................................................................................340
Conguring Fast Boot and LACP Fast Switchover....................................................................................................341
Optimizing the Boot Time..............................................................................................................................................341
Booting Process When Optimized Boot Time Mechanism is Enabled...............................................................341
Guidelines for Conguring Optimized Booting Mechanism................................................................................342
Interoperation of Applications with Fast Boot and System States..........................................................................343
LACP and IPv4 Routing.......................................................................................................................................... 343
LACP and IPv6 Routing.......................................................................................................................................... 343
BGP Graceful Restart............................................................................................................................................. 344
Cold Boot Caused by Power Cycling the System................................................................................................344
Unexpected Reload of the System........................................................................................................................344
Contents
11
Software Upgrade................................................................................................................................................... 344
LACP Fast Switchover............................................................................................................................................344
Changes to BGP Multipath.................................................................................................................................... 345
Delayed Installation of ECMP Routes Into BGP...................................................................................................345
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 345
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 346
17 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 347
Protocol Overview......................................................................................................................................................... 347
Ring Status............................................................................................................................................................... 348
Multiple FRRP Rings................................................................................................................................................348
Important FRRP Points...........................................................................................................................................349
Important FRRP Concepts.....................................................................................................................................350
Implementing FRRP....................................................................................................................................................... 351
FRRP Conguration....................................................................................................................................................... 351
Creating the FRRP Group....................................................................................................................................... 351
Conguring the Control VLAN...............................................................................................................................352
Conguring and Adding the Member VLANs.......................................................................................................353
Setting the FRRP Timers........................................................................................................................................354
Clearing the FRRP Counters..................................................................................................................................354
Viewing the FRRP Conguration...........................................................................................................................354
Viewing the FRRP Information.............................................................................................................................. 355
Troubleshooting FRRP.................................................................................................................................................. 355
Conguration Checks..............................................................................................................................................355
Sample Conguration and Topology............................................................................................................................355
FRRP Support on VLT...................................................................................................................................................357
Example Scenario.....................................................................................................................................................357
Important Points to Remember............................................................................................................................. 358
18 GARP VLAN Registration Protocol (GVRP)..............................................................................................360
Important Points to Remember................................................................................................................................... 360
Congure GVRP............................................................................................................................................................. 361
Related Conguration Tasks....................................................................................................................................361
Enabling GVRP Globally................................................................................................................................................ 362
Enabling GVRP on a Layer 2 Interface........................................................................................................................362
Congure GVRP Registration...................................................................................................................................... 362
Congure a GARP Timer.............................................................................................................................................. 363
19 Internet Group Management Protocol (IGMP)......................................................................................... 364
IGMP Implementation Information.............................................................................................................................. 364
IGMP Protocol Overview..............................................................................................................................................364
IGMP Version 2........................................................................................................................................................ 364
IGMP Version 3........................................................................................................................................................366
Congure IGMP............................................................................................................................................................. 369
Related Conguration Tasks...................................................................................................................................369
Viewing IGMP Enabled Interfaces............................................................................................................................... 370
12
Contents
Selecting an IGMP Version........................................................................................................................................... 370
Viewing IGMP Groups................................................................................................................................................... 370
Adjusting Timers............................................................................................................................................................. 371
Adjusting Query and Response Timers.................................................................................................................. 371
Enabling IGMP Immediate-Leave.................................................................................................................................372
IGMP Snooping.............................................................................................................................................................. 372
IGMP Snooping Implementation Information....................................................................................................... 372
Conguring IGMP Snooping...................................................................................................................................372
Removing a Group-Port Association..................................................................................................................... 373
Disabling Multicast Flooding................................................................................................................................... 373
Specifying a Port as Connected to a Multicast Router.......................................................................................373
Conguring the Switch as Querier.........................................................................................................................374
Fast Convergence after MSTP Topology Changes................................................................................................... 374
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................375
Protocol Separation................................................................................................................................................. 375
Enabling and Disabling Management Egress Interface Selection...................................................................... 376
Handling of Management Route Conguration....................................................................................................377
Handling of Switch-Initiated Trac........................................................................................................................377
Handling of Switch-Destined Trac......................................................................................................................378
Handling of Transit Trac (Trac Separation).....................................................................................................379
Mapping of Management Applications and Trac Type.....................................................................................379
Behavior of Various Applications for Switch-Initiated Trac ............................................................................380
Behavior of Various Applications for Switch-Destined Trac ........................................................................... 381
Interworking of EIS With Various Applications.....................................................................................................382
Designating a Multicast Router Interface................................................................................................................... 382
20 Interfaces................................................................................................................................................ 383
Basic Interface Conguration.......................................................................................................................................383
Advanced Interface Conguration...............................................................................................................................383
Interface Types...............................................................................................................................................................384
View Basic Interface Information.................................................................................................................................384
Resetting an Interface to its Factory Default State...................................................................................................386
Enabling a Physical Interface........................................................................................................................................387
Physical Interfaces.........................................................................................................................................................387
Conguration Task List for Physical Interfaces.................................................................................................... 387
Overview of Layer Modes...................................................................................................................................... 388
Conguring Layer 2 (Data Link) Mode..................................................................................................................388
Conguring Layer 2 (Interface) Mode.................................................................................................................. 389
Conguring Layer 3 (Network) Mode...................................................................................................................389
Conguring Layer 3 (Interface) Mode.................................................................................................................. 389
Egress Interface Selection (EIS)..................................................................................................................................390
Important Points to Remember............................................................................................................................. 390
Conguring EIS........................................................................................................................................................ 390
Management Interfaces.................................................................................................................................................391
Conguring Management Interfaces..................................................................................................................... 391
Conguring a Management Interface on an Ethernet Port................................................................................392
Contents
13
S6100 — OIR...........................................................................................................................................................393
VLAN Interfaces............................................................................................................................................................ 394
Loopback Interfaces......................................................................................................................................................394
Null Interfaces................................................................................................................................................................ 395
Port Channel Interfaces................................................................................................................................................395
Port Channel Denition and Standards.................................................................................................................395
Port Channel Benets.............................................................................................................................................395
Port Channel Implementation.................................................................................................................................396
Interfaces in Port Channels.................................................................................................................................... 396
Conguration Tasks for Port Channel Interfaces.................................................................................................396
Creating a Port Channel..........................................................................................................................................397
Adding a Physical Interface to a Port Channel.....................................................................................................397
Reassigning an Interface to a New Port Channel................................................................................................399
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 399
Adding or Removing a Port Channel from a VLAN............................................................................................. 400
Assigning an IP Address to a Port Channel...........................................................................................................401
Deleting or Disabling a Port Channel......................................................................................................................401
Load Balancing Through Port Channels................................................................................................................ 401
Load-Balancing Method..........................................................................................................................................402
Changing the Hash Algorithm................................................................................................................................402
Bulk Conguration......................................................................................................................................................... 403
Interface Range........................................................................................................................................................403
Bulk Conguration Examples..................................................................................................................................404
Dening Interface Range Macros................................................................................................................................ 405
Dene the Interface Range.................................................................................................................................... 406
Choosing an Interface-Range Macro....................................................................................................................406
Monitoring and Maintaining Interfaces....................................................................................................................... 406
Split 40G Ports on a 16X40G QSFP+ Module............................................................................................................407
Splitting 100G Ports...................................................................................................................................................... 408
Link Dampening............................................................................................................................................................. 409
Important Points to Remember............................................................................................................................. 409
Conguration Example of Link Dampening........................................................................................................... 410
Enabling Link Dampening.........................................................................................................................................412
Link Bundle Monitoring.................................................................................................................................................. 413
Using Ethernet Pause Frames for Flow Control......................................................................................................... 414
Enabling Pause Frames............................................................................................................................................414
Congure the MTU Size on an Interface.....................................................................................................................415
Port-Pipes....................................................................................................................................................................... 416
CR4 Auto-Negotiation................................................................................................................................................... 416
FEC Conguration..........................................................................................................................................................416
Setting the Speed of Ethernet Interfaces...................................................................................................................418
Syslog Warning Upon Connecting SFP28 Optics with QSA.....................................................................................419
Adjusting the Keepalive Timer.......................................................................................................................................419
View Advanced Interface Information.........................................................................................................................420
Conguring the Interface Sampling Size.............................................................................................................. 420
14
Contents
Conguring the Trac Sampling Size Globally........................................................................................................... 421
Dynamic Counters......................................................................................................................................................... 423
Clearing Interface Counters....................................................................................................................................423
Enhanced Validation of Interface Ranges...................................................................................................................424
Compressing Conguration Files................................................................................................................................. 424
21 IPv4 Routing.............................................................................................................................................428
IP Addresses...................................................................................................................................................................429
Implementation Information....................................................................................................................................429
Conguration Tasks for IP Addresses..........................................................................................................................429
Assigning IP Addresses to an Interface.......................................................................................................................429
Conguring Static Routes............................................................................................................................................ 430
Congure Static Routes for the Management Interface...........................................................................................431
Using the Congured Source IP Address in ICMP Messages..................................................................................432
Conguring the ICMP Source Interface............................................................................................................... 432
Conguring the Duration to Establish a TCP Connection........................................................................................ 432
Enabling Directed Broadcast........................................................................................................................................ 433
Resolution of Host Names............................................................................................................................................433
Enabling Dynamic Resolution of Host Names............................................................................................................433
Specifying the Local System Domain and a List of Domains................................................................................... 434
Conguring DNS with Traceroute................................................................................................................................434
ARP................................................................................................................................................................................. 435
Conguration Tasks for ARP........................................................................................................................................ 435
Conguring Static ARP Entries....................................................................................................................................435
Enabling Proxy ARP.......................................................................................................................................................436
Clearing ARP Cache......................................................................................................................................................436
ARP Learning via Gratuitous ARP................................................................................................................................436
Enabling ARP Learning via Gratuitous ARP................................................................................................................ 437
ARP Learning via ARP Request....................................................................................................................................437
Conguring ARP Retries...............................................................................................................................................438
ICMP............................................................................................................................................................................... 438
Conguration Tasks for ICMP...................................................................................................................................... 438
Enabling ICMP Unreachable Messages...................................................................................................................... 438
UDP Helper.....................................................................................................................................................................439
Congure UDP Helper.............................................................................................................................................439
Important Points to Remember............................................................................................................................. 439
Enabling UDP Helper.....................................................................................................................................................439
Conguring a Broadcast Address................................................................................................................................ 439
Congurations Using UDP Helper............................................................................................................................... 440
UDP Helper with Broadcast-All Addresses.................................................................................................................440
UDP Helper with Subnet Broadcast Addresses..........................................................................................................441
UDP Helper with Congured Broadcast Addresses...................................................................................................441
UDP Helper with No Congured Broadcast Addresses............................................................................................442
Troubleshooting UDP Helper........................................................................................................................................ 442
22 IPv6 Routing............................................................................................................................................443
Contents
15
Protocol Overview.........................................................................................................................................................443
Extended Address Space........................................................................................................................................444
Stateless Autoconguration................................................................................................................................... 444
IPv6 Headers............................................................................................................................................................444
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support................................................................... 445
IPv6 Header Fields...................................................................................................................................................446
Extension Header Fields..........................................................................................................................................448
Addressing................................................................................................................................................................ 449
Implementing IPv6 with Dell EMC Networking OS...................................................................................................450
ICMPv6...........................................................................................................................................................................450
Path MTU Discovery.....................................................................................................................................................450
IPv6 Neighbor Discovery...............................................................................................................................................451
IPv6 Neighbor Discovery of MTU Packets........................................................................................................... 451
Conguring the IPv6 Recursive DNS Server........................................................................................................ 451
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................452
Displaying IPv6 RDNSS Information......................................................................................................................453
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 453
Conguration Tasks for IPv6........................................................................................................................................ 454
Adjusting Your CAM-Prole....................................................................................................................................454
Assigning an IPv6 Address to an Interface...........................................................................................................455
Assigning a Static IPv6 Route................................................................................................................................455
Conguring Telnet with IPv6..................................................................................................................................456
SNMP over IPv6......................................................................................................................................................456
Displaying IPv6 Information....................................................................................................................................456
Displaying an IPv6 Interface Information.............................................................................................................. 457
Showing IPv6 Routes..............................................................................................................................................458
Showing the Running-Conguration for an Interface.........................................................................................459
Clearing IPv6 Routes...............................................................................................................................................459
Disabling ND Entry Timeout................................................................................................................................... 460
Conguring IPv6 RA Guard.......................................................................................................................................... 460
Conguring IPv6 RA Guard on an Interface.........................................................................................................462
Monitoring IPv6 RA Guard......................................................................................................................................462
23 iSCSI Optimization...................................................................................................................................463
iSCSI Optimization Overview....................................................................................................................................... 463
Monitoring iSCSI Trac Flows...............................................................................................................................465
Application of Quality of Service to iSCSI Trac Flows..................................................................................... 465
Information Monitored in iSCSI Trac Flows.......................................................................................................465
Detection and Auto-Conguration for Dell EqualLogic Arrays...........................................................................466
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................466
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer................................................................. 467
Enable and Disable iSCSI Optimization................................................................................................................. 467
Default iSCSI Optimization Values...............................................................................................................................468
iSCSI Optimization Prerequisites................................................................................................................................. 468
Conguring iSCSI Optimization................................................................................................................................... 468
Displaying iSCSI Optimization Information..................................................................................................................470
16
Contents
24 Intermediate System to Intermediate System...........................................................................................472
IS-IS Protocol Overview................................................................................................................................................472
IS-IS Addressing.............................................................................................................................................................472
Multi-Topology IS-IS.......................................................................................................................................................473
Transition Mode........................................................................................................................................................473
Interface Support.....................................................................................................................................................474
Adjacencies............................................................................................................................................................... 474
Graceful Restart.............................................................................................................................................................474
Timers........................................................................................................................................................................474
Implementation Information..........................................................................................................................................474
Conguration Information.............................................................................................................................................475
Conguration Tasks for IS-IS..................................................................................................................................476
Conguring the Distance of a Route.....................................................................................................................483
Changing the IS-Type.............................................................................................................................................. 484
Redistributing IPv4 Routes.....................................................................................................................................486
Redistributing IPv6 Routes..................................................................................................................................... 487
Conguring Authentication Passwords.................................................................................................................488
Setting the Overload Bit......................................................................................................................................... 488
Debugging IS-IS....................................................................................................................................................... 489
IS-IS Metric Styles.........................................................................................................................................................490
Congure Metric Values............................................................................................................................................... 490
Maximum Values in the Routing Table................................................................................................................... 491
Change the IS-IS Metric Style in One Level Only.................................................................................................491
Leaks from One Level to Another..........................................................................................................................492
Sample Congurations.................................................................................................................................................. 493
25 In-Service Software Upgrade.................................................................................................................. 496
ISSU Introduction.......................................................................................................................................................... 496
Warmboot Limitations.............................................................................................................................................496
Fastboot 2.0 (Zero Loss Upgrade).............................................................................................................................. 496
L2 ISSU........................................................................................................................................................................... 497
L3 ISSU........................................................................................................................................................................... 497
CoPP............................................................................................................................................................................... 498
Mirroring ow control packets..................................................................................................................................... 498
PFC..................................................................................................................................................................................498
QoS..................................................................................................................................................................................498
Tunnel Conguration..................................................................................................................................................... 498
26 Link Aggregation Control Protocol (LACP).............................................................................................. 500
Introduction to Dynamic LAGs and LACP.................................................................................................................. 500
Important Points to Remember............................................................................................................................. 500
LACP Modes.............................................................................................................................................................501
Conguring LACP Commands................................................................................................................................501
LACP Conguration Tasks............................................................................................................................................502
Creating a LAG.........................................................................................................................................................502
Contents
17
Conguring the LAG Interfaces as Dynamic........................................................................................................502
Setting the LACP Long Timeout........................................................................................................................... 503
Monitoring and Debugging LACP..........................................................................................................................503
Shared LAG State Tracking.......................................................................................................................................... 504
Conguring Shared LAG State Tracking...............................................................................................................504
Important Points about Shared LAG State Tracking...........................................................................................506
LACP Basic Conguration Example............................................................................................................................ 506
Congure a LAG on ALPHA...................................................................................................................................506
27 Layer 2..................................................................................................................................................... 515
Manage the MAC Address Table..................................................................................................................................515
Clearing the MAC Address Table............................................................................................................................515
Setting the Aging Time for Dynamic Entries.........................................................................................................515
Conguring a Static MAC Address.........................................................................................................................516
Displaying the MAC Address Table.........................................................................................................................516
MAC Learning Limit........................................................................................................................................................516
Setting the MAC Learning Limit............................................................................................................................. 517
mac learning-limit Dynamic......................................................................................................................................517
mac learning-limit mac-address-sticky.................................................................................................................. 517
mac learning-limit station-move............................................................................................................................. 518
mac learning-limit no-station-move....................................................................................................................... 518
Learning Limit Violation Actions..............................................................................................................................518
Setting Station Move Violation Actions.................................................................................................................519
Recovering from Learning Limit and Station Move Violations............................................................................519
Disabling MAC Address Learning on the System.................................................................................................520
NIC Teaming................................................................................................................................................................... 520
Congure Redundant Pairs........................................................................................................................................... 521
Important Points about Conguring Redundant Pairs........................................................................................ 523
Far-End Failure Detection............................................................................................................................................. 524
FEFD State Changes...............................................................................................................................................525
Conguring FEFD.................................................................................................................................................... 526
Enabling FEFD on an Interface...............................................................................................................................526
Debugging FEFD...................................................................................................................................................... 527
28 Link Layer Discovery Protocol (LLDP)..................................................................................................... 529
802.1AB (LLDP) Overview............................................................................................................................................529
Protocol Data Units................................................................................................................................................. 529
Optional TLVs.................................................................................................................................................................530
Management TLVs.................................................................................................................................................. 530
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 532
TIA Organizationally Specic TLVs........................................................................................................................ 532
Congure LLDP............................................................................................................................................................. 536
Related Conguration Tasks...................................................................................................................................536
Important Points to Remember............................................................................................................................. 536
LLDP Compatibility..................................................................................................................................................536
CONFIGURATION versus INTERFACE Congurations............................................................................................ 536
18
Contents
Enabling LLDP................................................................................................................................................................ 537
Disabling and Undoing LLDP.................................................................................................................................. 537
Enabling LLDP on Management Ports........................................................................................................................538
Disabling and Undoing LLDP on Management Ports..........................................................................................538
Advertising TLVs............................................................................................................................................................ 538
Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................539
Reserved Unrecognized LLDP TLVs..................................................................................................................... 540
Organizational Specic Unrecognized LLDP TLVs..............................................................................................540
Viewing Unrecognized LLDP TLVs........................................................................................................................540
Viewing the LLDP Conguration................................................................................................................................. 540
Viewing Information Advertised by Adjacent LLDP Neighbors.................................................................................541
Examples of Viewing Information Advertised by Neighbors............................................................................... 541
Conguring LLDPDU Intervals..................................................................................................................................... 543
Conguring Transmit and Receive Mode....................................................................................................................543
Conguring the Time to Live Value............................................................................................................................. 544
Debugging LLDP............................................................................................................................................................545
Relevant Management Objects................................................................................................................................... 546
29 Microsoft Network Load Balancing...........................................................................................................551
NLB Unicast Mode Scenario.........................................................................................................................................551
NLB Multicast Mode Scenario......................................................................................................................................551
Limitations of the NLB Feature....................................................................................................................................552
Microsoft Clustering......................................................................................................................................................552
Enable and Disable VLAN Flooding ............................................................................................................................ 552
Conguring a Switch for NLB .....................................................................................................................................552
Enabling a Switch for Multicast NLB.................................................................................................................... 553
30 Multicast Source Discovery Protocol (MSDP).........................................................................................554
Protocol Overview.........................................................................................................................................................554
Anycast RP.....................................................................................................................................................................555
Implementation Information......................................................................................................................................... 556
Congure Multicast Source Discovery Protocol........................................................................................................556
Related Conguration Tasks...................................................................................................................................556
Enable MSDP.................................................................................................................................................................560
Manage the Source-Active Cache...............................................................................................................................561
Viewing the Source-Active Cache......................................................................................................................... 561
Limiting the Source-Active Cache......................................................................................................................... 561
Clearing the Source-Active Cache........................................................................................................................562
Enabling the Rejected Source-Active Cache....................................................................................................... 562
Accept Source-Active Messages that Fail the RFP Check......................................................................................562
Specifying Source-Active Messages.......................................................................................................................... 565
Limiting the Source-Active Messages from a Peer...................................................................................................566
Preventing MSDP from Caching a Local Source.......................................................................................................566
Preventing MSDP from Caching a Remote Source.................................................................................................. 567
Preventing MSDP from Advertising a Local Source..................................................................................................567
Logging Changes in Peership States...........................................................................................................................568
Contents
19
Terminating a Peership..................................................................................................................................................568
Clearing Peer Statistics.................................................................................................................................................569
Debugging MSDP..........................................................................................................................................................569
MSDP with Anycast RP................................................................................................................................................570
Conguring Anycast RP.................................................................................................................................................571
Reducing Source-Active Message Flooding.........................................................................................................572
Specifying the RP Address Used in SA Messages.............................................................................................. 572
MSDP Sample Congurations......................................................................................................................................574
31 Multiple Spanning Tree Protocol (MSTP)................................................................................................. 577
Protocol Overview......................................................................................................................................................... 577
Spanning Tree Variations...............................................................................................................................................578
Implementation Information....................................................................................................................................578
Congure Multiple Spanning Tree Protocol................................................................................................................ 578
Related Conguration Tasks................................................................................................................................... 579
Enable Multiple Spanning Tree Globally.......................................................................................................................579
Adding and Removing Interfaces.................................................................................................................................579
Creating Multiple Spanning Tree Instances................................................................................................................ 580
Inuencing MSTP Root Selection................................................................................................................................580
Interoperate with Non-Dell Bridges..............................................................................................................................581
Changing the Region Name or Revision......................................................................................................................581
Modifying Global Parameters....................................................................................................................................... 582
Modifying the Interface Parameters........................................................................................................................... 583
Conguring an EdgePort.............................................................................................................................................. 584
Flush MAC Addresses after a Topology Change....................................................................................................... 585
MSTP Sample Congurations......................................................................................................................................585
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................585
Debugging and Verifying MSTP Congurations.........................................................................................................587
32 Multicast Features...................................................................................................................................589
Enabling IP Multicast.....................................................................................................................................................589
Implementation Information......................................................................................................................................... 589
Multicast Policies...........................................................................................................................................................590
IPv4 Multicast Policies............................................................................................................................................590
Understanding Multicast Traceroute (mtrace)...........................................................................................................597
Important Points to Remember............................................................................................................................. 598
Printing Multicast Traceroute (mtrace) Paths........................................................................................................... 598
Supported Error Codes.................................................................................................................................................599
mtrace Scenarios...........................................................................................................................................................600
33 Object Tracking....................................................................................................................................... 606
Object Tracking Overview............................................................................................................................................ 606
Track Layer 2 Interfaces..........................................................................................................................................607
Track Layer 3 Interfaces..........................................................................................................................................607
Track IPv4 and IPv6 Routes...................................................................................................................................608
20
Contents
/