PowerSwitch S4048T-ON

Dell PowerSwitch S4048T-ON Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4048T-ON Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Configuration
Guide for the S4048T ON
System
9.13.0.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 12
Rev. A00
Contents
1 About this Guide...........................................................................................................................................36
Audience........................................................................................................................................................................... 36
Conventions......................................................................................................................................................................36
Related Documents......................................................................................................................................................... 36
2 Conguration Fundamentals........................................................................................................................ 37
Accessing the Command Line........................................................................................................................................ 37
CLI Modes.........................................................................................................................................................................37
Navigating CLI Modes............................................................................................................................................... 39
The do Command............................................................................................................................................................ 42
Undoing Commands........................................................................................................................................................ 42
Obtaining Help..................................................................................................................................................................43
Entering and Editing Commands....................................................................................................................................43
Command History............................................................................................................................................................ 44
Filtering show Command Outputs................................................................................................................................. 44
Example of the grep Keyword.................................................................................................................................. 44
Multiple Users in Conguration Mode...........................................................................................................................45
3 Getting Started............................................................................................................................................46
Console Access................................................................................................................................................................ 47
Serial Console............................................................................................................................................................. 47
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................48
Entering CLI commands Using an SSH Connection..............................................................................................48
Executing Local CLI Scripts Using an SSH Connection........................................................................................48
Default Conguration...................................................................................................................................................... 49
Conguring a Host Name............................................................................................................................................... 49
Accessing the System Remotely....................................................................................................................................49
Accessing the System Remotely..............................................................................................................................49
Congure the Management Port IP Address......................................................................................................... 49
Congure a Management Route..............................................................................................................................50
Conguring a Username and Password..................................................................................................................50
Conguring the Enable Password...................................................................................................................................51
Conguration File Management......................................................................................................................................51
Copy Files to and from the System......................................................................................................................... 52
Mounting an NFS File System..................................................................................................................................52
Save the Running-Conguration..............................................................................................................................54
Congure the Overload Bit for a Startup Scenario............................................................................................... 55
Viewing Files...............................................................................................................................................................55
Compressing Conguration Files............................................................................................................................. 56
Managing the File System.............................................................................................................................................. 58
Enabling Software Features on Devices Using a Command Option..........................................................................59
View Command History.................................................................................................................................................. 60
Contents
3
Upgrading Dell EMC Networking OS............................................................................................................................ 60
Verify Software Images Before Installation...................................................................................................................60
Using HTTP for File Transfers.........................................................................................................................................61
4 Management................................................................................................................................................63
Conguring Privilege Levels............................................................................................................................................63
Creating a Custom Privilege Level...........................................................................................................................64
Removing a Command from EXEC Mode.............................................................................................................. 64
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................64
Allowing Access to CONFIGURATION Mode Commands....................................................................................64
Allowing Access to Dierent Modes........................................................................................................................64
Applying a Privilege Level to a Username...............................................................................................................66
Applying a Privilege Level to a Terminal Line.......................................................................................................... 66
Conguring Logging........................................................................................................................................................ 66
Audit and Security Logs............................................................................................................................................ 67
Conguring Logging Format ...................................................................................................................................69
Display the Logging Buer and the Logging Conguration..................................................................................69
Setting Up a Secure Connection to a Syslog Server.............................................................................................70
Sending System Messages to a Syslog Server.......................................................................................................71
Track Login Activity.......................................................................................................................................................... 71
Restrictions for Tracking Login Activity................................................................................................................... 71
Conguring Login Activity Tracking..........................................................................................................................71
Display Login Statistics.............................................................................................................................................. 72
Limit Concurrent Login Sessions....................................................................................................................................73
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................73
Conguring Concurrent Session Limit.....................................................................................................................74
Enabling the System to Clear Existing Sessions.....................................................................................................74
Enabling Secured CLI Mode........................................................................................................................................... 75
Log Messages in the Internal Buer..............................................................................................................................75
Conguration Task List for System Log Management.......................................................................................... 75
Disabling System Logging............................................................................................................................................... 75
Sending System Messages to a Syslog Server............................................................................................................ 76
Conguring a UNIX System as a Syslog Server.....................................................................................................76
Changing System Logging Settings...............................................................................................................................76
Display the Logging Buer and the Logging Conguration........................................................................................ 77
Conguring a UNIX Logging Facility Level....................................................................................................................78
Synchronizing Log Messages......................................................................................................................................... 79
Enabling Timestamp on Syslog Messages.................................................................................................................... 79
File Transfer Services...................................................................................................................................................... 80
Conguration Task List for File Transfer Services..................................................................................................80
Enabling the FTP Server...........................................................................................................................................80
Conguring FTP Server Parameters....................................................................................................................... 80
Conguring FTP Client Parameters..........................................................................................................................81
Terminal Lines....................................................................................................................................................................81
Denying and Permitting Access to a Terminal Line................................................................................................82
Conguring Login Authentication for Terminal Lines.............................................................................................83
4
Contents
Setting Timeout for EXEC Privilege Mode................................................................................................................... 84
Using Telnet to get to Another Network Device..........................................................................................................84
Lock CONFIGURATION Mode.......................................................................................................................................85
Viewing the Conguration Lock Status...................................................................................................................85
Restoring the Factory Default Settings........................................................................................................................ 85
Important Points to Remember................................................................................................................................86
Restoring Factory Default Environment Variables................................................................................................. 86
Viewing the Reason for Last System Reboot...............................................................................................................87
5 802.1X......................................................................................................................................................... 89
Port-Authentication Process...........................................................................................................................................91
EAP over RADIUS.......................................................................................................................................................91
Conguring 802.1X...........................................................................................................................................................92
Related Conguration Tasks..................................................................................................................................... 92
Important Points to Remember......................................................................................................................................92
Enabling 802.1X................................................................................................................................................................ 93
Conguring Request Identity Re-Transmissions...........................................................................................................94
Conguring a Quiet Period after a Failed Authentication..................................................................................... 95
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 96
Re-Authenticating a Port................................................................................................................................................96
Conguring Timeouts...................................................................................................................................................... 97
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................98
Guest and Authentication-Fail VLANs.......................................................................................................................... 99
Conguring a Guest VLAN......................................................................................................................................100
Conguring an Authentication-Fail VLAN............................................................................................................. 100
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 102
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 102
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 103
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................103
Conguring ACL VLAN Groups.............................................................................................................................. 103
Conguring FP Blocks for VLAN Parameters.......................................................................................................104
Viewing CAM Usage...................................................................................................................................................... 105
Allocating FP Blocks for VLAN Processes.................................................................................................................. 106
Unied Forwarding Table (UFT) Modes...................................................................................................................... 107
Conguring UFT Modes.......................................................................................................................................... 107
7 Access Control Lists (ACLs)....................................................................................................................... 108
IP Access Control Lists (ACLs).....................................................................................................................................109
CAM Usage................................................................................................................................................................110
Implementing ACLs on Dell EMC Networking OS................................................................................................ 110
Important Points to Remember..................................................................................................................................... 112
Conguration Task List for Route Maps.................................................................................................................112
Conguring Match Routes.......................................................................................................................................114
Conguring Set Conditions......................................................................................................................................115
Congure a Route Map for Route Redistribution..................................................................................................116
Contents
5
Congure a Route Map for Route Tagging............................................................................................................ 117
Continue Clause.........................................................................................................................................................117
IP Fragment Handling..................................................................................................................................................... 118
IP Fragments ACL Examples................................................................................................................................... 118
Layer 4 ACL Rules Examples................................................................................................................................... 118
Congure a Standard IP ACL.........................................................................................................................................119
Conguring a Standard IP ACL Filter..................................................................................................................... 120
Congure an Extended IP ACL......................................................................................................................................121
Conguring Filters with a Sequence Number........................................................................................................121
Conguring Filters Without a Sequence Number.................................................................................................122
Congure Layer 2 and Layer 3 ACLs............................................................................................................................123
Assign an IP ACL to an Interface.................................................................................................................................. 124
Applying an IP ACL.........................................................................................................................................................124
Counting ACL Hits....................................................................................................................................................125
Congure Ingress ACLs................................................................................................................................................. 125
Congure Egress ACLs..................................................................................................................................................125
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 126
IP Prex Lists...................................................................................................................................................................127
Implementation Information.....................................................................................................................................127
Conguration Task List for Prex Lists.................................................................................................................. 127
ACL Resequencing.......................................................................................................................................................... 131
Resequencing an ACL or Prex List........................................................................................................................131
Route Maps.....................................................................................................................................................................133
Implementation Information.................................................................................................................................... 133
Logging of ACL Processes............................................................................................................................................ 133
Guidelines for Conguring ACL Logging................................................................................................................134
Conguring ACL Logging.........................................................................................................................................134
Flow-Based Monitoring..................................................................................................................................................135
Behavior of Flow-Based Monitoring.......................................................................................................................135
Enabling Flow-Based Monitoring............................................................................................................................ 137
Conguring UDF ACL.................................................................................................................................................... 138
Conguring IP Mirror Access Group............................................................................................................................ 140
Sample Conguration............................................................................................................................................... 141
Example of viewing IP mirror–access–group applied to an Interface................................................................ 141
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 142
How BFD Works............................................................................................................................................................. 142
BFD Packet Format..................................................................................................................................................143
BFD Sessions............................................................................................................................................................ 144
BFD Three-Way Handshake.................................................................................................................................... 145
Session State Changes............................................................................................................................................ 147
Important Points to Remember.................................................................................................................................... 147
Congure BFD.................................................................................................................................................................147
Congure BFD for Physical Ports...........................................................................................................................148
Congure BFD for Static Routes............................................................................................................................150
Congure BFD for OSPF.........................................................................................................................................152
6
Contents
Congure BFD for OSPFv3.....................................................................................................................................157
Congure BFD for IS-IS...........................................................................................................................................160
Congure BFD for BGP........................................................................................................................................... 162
Congure BFD for VRRP.........................................................................................................................................169
Conguring Protocol Liveness................................................................................................................................ 172
9 Border Gateway Protocol IPv4 (BGPv4).....................................................................................................173
Autonomous Systems (AS)........................................................................................................................................... 173
Sessions and Peers.........................................................................................................................................................175
Establish a Session................................................................................................................................................... 175
Route Reectors.............................................................................................................................................................176
BGP Attributes................................................................................................................................................................177
Best Path Selection Criteria.................................................................................................................................... 177
Weight........................................................................................................................................................................179
Local Preference.......................................................................................................................................................179
Multi-Exit Discriminators (MEDs)...........................................................................................................................180
Origin...........................................................................................................................................................................181
AS Path......................................................................................................................................................................182
Next Hop................................................................................................................................................................... 182
Multiprotocol BGP..........................................................................................................................................................182
Implement BGP with Dell EMC Networking OS.........................................................................................................183
Additional Path (Add-Path) Support......................................................................................................................183
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 183
Ignore Router-ID in Best-Path Calculation............................................................................................................ 184
Four-Byte AS Numbers............................................................................................................................................184
AS4 Number Representation.................................................................................................................................. 184
AS Number Migration.............................................................................................................................................. 186
BGP4 Management Information Base (MIB)........................................................................................................ 187
Important Points to Remember...............................................................................................................................187
Conguration Information..............................................................................................................................................188
BGP Conguration......................................................................................................................................................... 188
Enabling BGP............................................................................................................................................................ 189
Conguring AS4 Number Representations........................................................................................................... 192
Conguring Peer Groups.........................................................................................................................................194
Conguring BGP Fast Fall-Over.............................................................................................................................196
Conguring Passive Peering................................................................................................................................... 198
Maintaining Existing AS Numbers During an AS Migration................................................................................. 198
Allowing an AS Number to Appear in its Own AS Path....................................................................................... 199
Enabling Graceful Restart.......................................................................................................................................200
Enabling Neighbor Graceful Restart...................................................................................................................... 201
Filtering on an AS-Path Attribute........................................................................................................................... 201
Regular Expressions as Filters................................................................................................................................203
Redistributing Routes..............................................................................................................................................204
Enabling Additional Paths....................................................................................................................................... 205
Conguring IP Community Lists............................................................................................................................ 205
Conguring an IP Extended Community List....................................................................................................... 206
Contents
7
Filtering Routes with Community Lists................................................................................................................. 207
Manipulating the COMMUNITY Attribute............................................................................................................208
Changing MED Attributes.......................................................................................................................................209
Changing the LOCAL_PREFERENCE Attribute..................................................................................................209
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............. 210
Changing the WEIGHT Attribute.............................................................................................................................211
Enabling Multipath.................................................................................................................................................... 211
Filtering BGP Routes.................................................................................................................................................211
Filtering BGP Routes Using Route Maps...............................................................................................................213
Filtering BGP Routes Using AS-PATH Information.............................................................................................. 213
Conguring BGP Route Reectors........................................................................................................................ 214
Aggregating Routes..................................................................................................................................................215
Conguring BGP Confederations...........................................................................................................................215
Enabling Route Flap Dampening.............................................................................................................................216
Changing BGP Timers..............................................................................................................................................218
Enabling BGP Neighbor Soft-Reconguration..................................................................................................... 218
Enabling or disabling BGP neighbors..................................................................................................................... 219
Route Map Continue................................................................................................................................................221
Enabling MBGP Congurations.................................................................................................................................... 221
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor......................................... 222
BGP Regular Expression Optimization........................................................................................................................222
Debugging BGP..............................................................................................................................................................222
Storing Last and Bad PDUs....................................................................................................................................223
Capturing PDUs....................................................................................................................................................... 224
PDU Counters.......................................................................................................................................................... 225
Sample Congurations.................................................................................................................................................. 225
10 Content Addressable Memory (CAM).......................................................................................................232
CAM Allocation...............................................................................................................................................................232
Test CAM Usage............................................................................................................................................................ 234
View CAM-ACL Settings.............................................................................................................................................. 234
View CAM Usage...........................................................................................................................................................236
Conguring CAM Threshold and Silence Period........................................................................................................236
Setting CAM Threshold and Silence Period..........................................................................................................237
CAM Optimization......................................................................................................................................................... 238
Troubleshoot CAM Proling..........................................................................................................................................238
QoS CAM Region Limitation...................................................................................................................................238
11 Control Plane Policing (CoPP).................................................................................................................. 239
Congure Control Plane Policing................................................................................................................................. 240
Conguring CoPP for Protocols............................................................................................................................. 241
Conguring CoPP for CPU Queues...................................................................................................................... 243
CoPP for OSPFv3 Packets.....................................................................................................................................244
Conguring CoPP for OSPFv3...............................................................................................................................247
Displaying CoPP Conguration ............................................................................................................................. 247
8
Contents
12 Data Center Bridging (DCB).....................................................................................................................250
Ethernet Enhancements in Data Center Bridging..................................................................................................... 250
Priority-Based Flow Control....................................................................................................................................251
Enhanced Transmission Selection..........................................................................................................................252
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................253
Data Center Bridging in a Trac Flow.................................................................................................................. 254
Enabling Data Center Bridging.....................................................................................................................................254
DCB Maps and its Attributes................................................................................................................................. 255
Data Center Bridging: Default Conguration..............................................................................................................256
Conguring Priority-Based Flow Control....................................................................................................................256
Conguring Lossless Queues..................................................................................................................................257
Conguring PFC in a DCB Map................................................................................................................................... 258
PFC Conguration Notes....................................................................................................................................... 258
PFC Prerequisites and Restrictions.......................................................................................................................259
Applying a DCB Map on a Port....................................................................................................................................259
Conguring PFC without a DCB Map.........................................................................................................................260
Conguring Lossless QueuesExample:..................................................................................................................260
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................262
Pause and Resume of Trac..................................................................................................................................262
Buer Sizes for Lossless or PFC Packets............................................................................................................ 262
Behavior of Tagged Packets.........................................................................................................................................263
Conguration Example for DSCP and PFC Priorities................................................................................................263
Using PFC to Manage Converged Ethernet Trac...................................................................................................264
Congure Enhanced Transmission Selection..............................................................................................................264
ETS Prerequisites and Restrictions....................................................................................................................... 264
Creating an ETS Priority Group............................................................................................................................. 265
ETS Operation with DCBx......................................................................................................................................266
Conguring Bandwidth Allocation for DCBx CIN................................................................................................ 266
Conguring ETS in a DCB Map..............................................................................................................................267
Hierarchical Scheduling in ETS Output Policies......................................................................................................... 268
Using ETS to Manage Converged Ethernet Trac...................................................................................................269
Applying DCB Policies in a Switch Stack....................................................................................................................269
Congure a DCBx Operation........................................................................................................................................269
DCBx Operation.......................................................................................................................................................269
DCBx Port Roles...................................................................................................................................................... 270
DCB Conguration Exchange................................................................................................................................. 271
Conguration Source Election.................................................................................................................................271
Propagation of DCB Information............................................................................................................................272
Auto-Detection and Manual Conguration of the DCBx Version.......................................................................272
DCBx Example..........................................................................................................................................................273
DCBx Prerequisites and Restrictions.....................................................................................................................273
Conguring DCBx.....................................................................................................................................................274
Verifying the DCB Conguration..................................................................................................................................277
QoS dot1p Trac Classication and Queue Assignment.......................................................................................... 287
Conguring the Dynamic Buer Method................................................................................................................... 288
Contents
9
Sample DCB Conguration...........................................................................................................................................289
PFC and ETS Conguration Command Examples.............................................................................................. 290
13 Dynamic Host Conguration Protocol (DHCP)..........................................................................................291
DHCP Packet Format and Options.............................................................................................................................. 291
Assign an IP Address using DHCP...............................................................................................................................293
Implementation Information..........................................................................................................................................294
Congure the System to be a DHCP Server..............................................................................................................294
Conguring the Server for Automatic Address Allocation..................................................................................295
Specifying a Default Gateway................................................................................................................................296
Congure a Method of Hostname Resolution..................................................................................................... 296
Using DNS for Address Resolution........................................................................................................................296
Using NetBIOS WINS for Address Resolution......................................................................................................297
Creating Manual Binding Entries............................................................................................................................297
Debugging the DHCP Server................................................................................................................................. 297
Using DHCP Clear Commands.............................................................................................................................. 298
Congure the System to be a Relay Agent................................................................................................................ 298
Congure the System to be a DHCP Client...............................................................................................................300
Conguring the DHCP Client System...................................................................................................................300
DHCP Client on a Management Interface............................................................................................................302
DHCP Client Operation with Other Features.......................................................................................................302
Congure the System for User Port Stacking (Option 230)....................................................................................303
Congure Secure DHCP...............................................................................................................................................303
Option 82..................................................................................................................................................................304
DHCP Snooping.......................................................................................................................................................304
Drop DHCP Packets on Snooped VLANs Only....................................................................................................309
Dynamic ARP Inspection........................................................................................................................................ 309
Conguring Dynamic ARP Inspection....................................................................................................................310
Source Address Validation..............................................................................................................................................311
Enabling IP Source Address Validation....................................................................................................................311
DHCP MAC Source Address Validation................................................................................................................. 312
Enabling IP+MAC Source Address Validation........................................................................................................312
Viewing the Number of SAV Dropped Packets.................................................................................................... 313
Clearing the Number of SAV Dropped Packets....................................................................................................313
14 Equal Cost Multi-Path (ECMP).................................................................................................................314
ECMP for Flow-Based Anity......................................................................................................................................314
Conguring the Hash Algorithm............................................................................................................................. 314
Enabling Deterministic ECMP Next Hop............................................................................................................... 314
Conguring the Hash Algorithm Seed................................................................................................................... 315
Link Bundle Monitoring.................................................................................................................................................. 315
Managing ECMP Group Paths................................................................................................................................316
Creating an ECMP Group Bundle...........................................................................................................................316
Modifying the ECMP Group Threshold................................................................................................................. 316
RTAG7.............................................................................................................................................................................. 317
Flow-based Hashing for ECMP.................................................................................................................................... 318
10
Contents
15 FIP Snooping............................................................................................................................................ 321
Fibre Channel over Ethernet.........................................................................................................................................321
Ensure Robustness in a Converged Ethernet Network.............................................................................................321
FIP Snooping on Ethernet Bridges.............................................................................................................................. 323
FIP Snooping in a Switch Stack...................................................................................................................................325
Using FIP Snooping....................................................................................................................................................... 325
FIP Snooping Prerequisites.....................................................................................................................................325
Important Points to Remember............................................................................................................................. 325
Enabling the FCoE Transit Feature........................................................................................................................326
Enable FIP Snooping on VLANs............................................................................................................................. 327
Congure the FC-MAP Value.................................................................................................................................327
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 327
Congure a Port for a Bridge-to-FCF Link........................................................................................................... 327
Impact on Other Software Features......................................................................................................................327
FIP Snooping Restrictions...................................................................................................................................... 328
Conguring FIP Snooping.......................................................................................................................................328
Displaying FIP Snooping Information...........................................................................................................................329
FCoE Transit Conguration Example...........................................................................................................................334
16 FIPS Cryptography...................................................................................................................................336
Conguration Tasks....................................................................................................................................................... 336
Preparing the System....................................................................................................................................................336
Enabling FIPS Mode...................................................................................................................................................... 337
Generating Host-Keys................................................................................................................................................... 337
Monitoring FIPS Mode Status......................................................................................................................................337
Disabling FIPS Mode..................................................................................................................................................... 338
17 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 339
Protocol Overview......................................................................................................................................................... 339
Ring Status............................................................................................................................................................... 340
Multiple FRRP Rings............................................................................................................................................... 340
Important FRRP Points............................................................................................................................................341
Important FRRP Concepts..................................................................................................................................... 342
Implementing FRRP.......................................................................................................................................................343
FRRP Conguration.......................................................................................................................................................343
Creating the FRRP Group.......................................................................................................................................343
Conguring the Control VLAN............................................................................................................................... 344
Conguring and Adding the Member VLANs.......................................................................................................345
Setting the FRRP Timers........................................................................................................................................346
Clearing the FRRP Counters..................................................................................................................................346
Viewing the FRRP Conguration...........................................................................................................................346
Viewing the FRRP Information...............................................................................................................................346
Troubleshooting FRRP...................................................................................................................................................347
Conguration Checks..............................................................................................................................................347
Sample Conguration and Topology............................................................................................................................ 347
Contents
11
FRRP Support on VLT...................................................................................................................................................348
Example Scenario.................................................................................................................................................... 349
Important Points to Remember............................................................................................................................. 350
18 GARP VLAN Registration Protocol (GVRP).............................................................................................. 351
Important Points to Remember.................................................................................................................................... 351
Congure GVRP............................................................................................................................................................ 352
Related Conguration Tasks...................................................................................................................................352
Enabling GVRP Globally................................................................................................................................................ 353
Enabling GVRP on a Layer 2 Interface........................................................................................................................353
Congure GVRP Registration...................................................................................................................................... 353
Congure a GARP Timer.............................................................................................................................................. 354
RPM Redundancy..........................................................................................................................................................354
19 High Availability (HA)............................................................................................................................... 356
Component Redundancy.............................................................................................................................................. 356
Automatic and Manual Stack Unit Failover.......................................................................................................... 356
Synchronization between Management and Standby Units.............................................................................. 357
Forcing a Stack Unit Failover..................................................................................................................................357
Specifying an Auto-Failover Limit..........................................................................................................................358
Disabling Auto-Reboot............................................................................................................................................ 358
Manually Synchronizing Management and Standby Units................................................................................. 358
Pre-Conguring a Stack Unit Slot...............................................................................................................................358
Removing a Provisioned Logical Stack Unit............................................................................................................... 358
Hitless Behavior............................................................................................................................................................. 359
Graceful Restart............................................................................................................................................................ 359
Software Resiliency.......................................................................................................................................................359
Software Component Health Monitoring............................................................................................................. 359
System Health Monitoring......................................................................................................................................360
Failure and Event Logging...................................................................................................................................... 360
Hot-Lock Behavior......................................................................................................................................................... 361
20 Internet Group Management Protocol (IGMP).........................................................................................362
IGMP Implementation Information.............................................................................................................................. 362
IGMP Protocol Overview..............................................................................................................................................362
IGMP Version 2........................................................................................................................................................362
IGMP Version 3........................................................................................................................................................364
Congure IGMP............................................................................................................................................................. 367
Related Conguration Tasks................................................................................................................................... 367
Viewing IGMP Enabled Interfaces............................................................................................................................... 368
Selecting an IGMP Version...........................................................................................................................................368
Viewing IGMP Groups...................................................................................................................................................368
Adjusting Timers............................................................................................................................................................ 369
Adjusting Query and Response Timers................................................................................................................. 369
Preventing a Host from Joining a Group.....................................................................................................................370
Enabling IGMP Immediate-Leave.................................................................................................................................373
12
Contents
IGMP Snooping.............................................................................................................................................................. 373
IGMP Snooping Implementation Information....................................................................................................... 373
Conguring IGMP Snooping...................................................................................................................................373
Removing a Group-Port Association..................................................................................................................... 374
Disabling Multicast Flooding................................................................................................................................... 374
Specifying a Port as Connected to a Multicast Router.......................................................................................375
Conguring the Switch as Querier........................................................................................................................ 375
Fast Convergence after MSTP Topology Changes................................................................................................... 376
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................ 376
Protocol Separation................................................................................................................................................. 376
Enabling and Disabling Management Egress Interface Selection.......................................................................377
Handling of Management Route Conguration....................................................................................................378
Handling of Switch-Initiated Trac....................................................................................................................... 379
Handling of Switch-Destined Trac......................................................................................................................379
Handling of Transit Trac (Trac Separation).................................................................................................... 380
Mapping of Management Applications and Trac Type.....................................................................................380
Behavior of Various Applications for Switch-Initiated Trac .............................................................................381
Behavior of Various Applications for Switch-Destined Trac ...........................................................................382
Interworking of EIS With Various Applications.....................................................................................................383
Designating a Multicast Router Interface................................................................................................................... 383
21 Interfaces................................................................................................................................................. 385
Basic Interface Conguration.......................................................................................................................................385
Advanced Interface Conguration...............................................................................................................................385
Interface Types...............................................................................................................................................................386
View Basic Interface Information.................................................................................................................................386
Resetting an Interface to its Factory Default State...................................................................................................388
Enabling a Physical Interface........................................................................................................................................389
Physical Interfaces.........................................................................................................................................................389
Conguration Task List for Physical Interfaces....................................................................................................389
Overview of Layer Modes...................................................................................................................................... 390
Conguring Layer 2 (Data Link) Mode..................................................................................................................390
Conguring Layer 2 (Interface) Mode.................................................................................................................. 390
Conguring Layer 3 (Network) Mode................................................................................................................... 391
Conguring Layer 3 (Interface) Mode................................................................................................................... 391
Egress Interface Selection (EIS)..................................................................................................................................392
Important Points to Remember............................................................................................................................. 392
Conguring EIS........................................................................................................................................................ 392
Management Interfaces................................................................................................................................................393
Conguring Management Interfaces.....................................................................................................................393
Conguring a Management Interface on an Ethernet Port................................................................................394
VLAN Interfaces............................................................................................................................................................ 395
Loopback Interfaces......................................................................................................................................................396
Null Interfaces................................................................................................................................................................ 396
Port Channel Interfaces................................................................................................................................................396
Port Channel Denition and Standards................................................................................................................. 397
Contents
13
Port Channel Benets............................................................................................................................................. 397
Port Channel Implementation.................................................................................................................................397
Interfaces in Port Channels.................................................................................................................................... 398
Conguration Tasks for Port Channel Interfaces.................................................................................................398
Creating a Port Channel......................................................................................................................................... 398
Adding a Physical Interface to a Port Channel.....................................................................................................399
Reassigning an Interface to a New Port Channel................................................................................................400
Conguring the Minimum Oper Up Links in a Port Channel............................................................................... 401
Adding or Removing a Port Channel from a VLAN..............................................................................................401
Assigning an IP Address to a Port Channel.......................................................................................................... 402
Deleting or Disabling a Port Channel.....................................................................................................................403
Load Balancing Through Port Channels................................................................................................................403
Changing the Hash Algorithm................................................................................................................................403
Bulk Conguration......................................................................................................................................................... 404
Interface Range....................................................................................................................................................... 404
Bulk Conguration Examples..................................................................................................................................404
Dening Interface Range Macros................................................................................................................................ 406
Dene the Interface Range.................................................................................................................................... 406
Choosing an Interface-Range Macro.................................................................................................................... 406
Monitoring and Maintaining Interfaces........................................................................................................................407
Maintenance Using TDR.........................................................................................................................................408
Non Dell-Qualied Transceivers................................................................................................................................... 408
Splitting 40G Ports without Reload.............................................................................................................................409
Splitting QSFP Ports to SFP+ Ports............................................................................................................................410
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port................................................................................... 411
Important Points to Remember............................................................................................................................... 411
Example Scenarios.................................................................................................................................................... 411
Link Dampening.............................................................................................................................................................. 413
Important Points to Remember.............................................................................................................................. 413
Conguration Example of Link Dampening........................................................................................................... 414
Enabling Link Dampening.........................................................................................................................................416
Link Bundle Monitoring.................................................................................................................................................. 417
Using Ethernet Pause Frames for Flow Control.........................................................................................................418
Enabling Pause Frames............................................................................................................................................418
Congure the MTU Size on an Interface.....................................................................................................................419
Port-Pipes.......................................................................................................................................................................420
Auto-Negotiation on Ethernet Interfaces...................................................................................................................420
Setting the Speed of Ethernet Interfaces............................................................................................................ 420
Set Auto-Negotiation Options................................................................................................................................422
View Advanced Interface Information.........................................................................................................................422
Conguring the Interface Sampling Size...............................................................................................................423
Conguring the Trac Sampling Size Globally...........................................................................................................424
Dynamic Counters......................................................................................................................................................... 426
Clearing Interface Counters....................................................................................................................................426
22 Internet Protocol Security (IPSec)...........................................................................................................428
14
Contents
Conguring IPSec .........................................................................................................................................................428
23 IPv4 Routing............................................................................................................................................430
IP Addresses....................................................................................................................................................................431
Implementation Information.................................................................................................................................... 431
Conguration Tasks for IP Addresses.......................................................................................................................... 431
Assigning IP Addresses to an Interface........................................................................................................................431
Conguring Static Routes.............................................................................................................................................432
Congure Static Routes for the Management Interface.......................................................................................... 433
IPv4 Path MTU Discovery Overview.......................................................................................................................... 434
Using the Congured Source IP Address in ICMP Messages..................................................................................434
Conguring the ICMP Source Interface............................................................................................................... 434
Conguring the Duration to Establish a TCP Connection........................................................................................ 435
Enabling Directed Broadcast........................................................................................................................................ 435
Resolution of Host Names............................................................................................................................................435
Enabling Dynamic Resolution of Host Names............................................................................................................436
Specifying the Local System Domain and a List of Domains................................................................................... 436
Conguring DNS with Traceroute................................................................................................................................437
ARP..................................................................................................................................................................................437
Conguration Tasks for ARP........................................................................................................................................ 438
Conguring Static ARP Entries....................................................................................................................................438
Enabling Proxy ARP.......................................................................................................................................................438
Clearing ARP Cache......................................................................................................................................................439
ARP Learning via Gratuitous ARP................................................................................................................................439
Enabling ARP Learning via Gratuitous ARP................................................................................................................439
ARP Learning via ARP Request................................................................................................................................... 439
Conguring ARP Retries...............................................................................................................................................440
ICMP................................................................................................................................................................................ 441
Conguration Tasks for ICMP.......................................................................................................................................441
Enabling ICMP Unreachable Messages....................................................................................................................... 441
UDP Helper..................................................................................................................................................................... 441
Congure UDP Helper............................................................................................................................................. 441
Important Points to Remember..............................................................................................................................442
Enabling UDP Helper.....................................................................................................................................................442
Conguring a Broadcast Address................................................................................................................................ 442
Congurations Using UDP Helper............................................................................................................................... 443
UDP Helper with Broadcast-All Addresses.................................................................................................................443
UDP Helper with Subnet Broadcast Addresses.........................................................................................................444
UDP Helper with Congured Broadcast Addresses..................................................................................................444
UDP Helper with No Congured Broadcast Addresses............................................................................................445
Troubleshooting UDP Helper........................................................................................................................................445
24 IPv6 Routing............................................................................................................................................ 446
Protocol Overview......................................................................................................................................................... 446
Extended Address Space........................................................................................................................................447
Stateless Autoconguration....................................................................................................................................447
Contents
15
IPv6 Headers............................................................................................................................................................447
IPv6 Header Fields...................................................................................................................................................448
Extension Header Fields......................................................................................................................................... 450
Addressing................................................................................................................................................................. 451
Implementing IPv6 with Dell EMC Networking OS................................................................................................... 452
ICMPv6...........................................................................................................................................................................453
Path MTU Discovery.....................................................................................................................................................454
IPv6 Neighbor Discovery..............................................................................................................................................454
IPv6 Neighbor Discovery of MTU Packets.......................................................................................................... 455
Conguration Task List for IPv6 RDNSS.................................................................................................................... 455
Conguring the IPv6 Recursive DNS Server....................................................................................................... 455
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................456
Displaying IPv6 RDNSS Information......................................................................................................................457
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 457
Conguration Tasks for IPv6........................................................................................................................................458
Adjusting Your CAM-Prole....................................................................................................................................458
Assigning an IPv6 Address to an Interface...........................................................................................................459
Assigning a Static IPv6 Route................................................................................................................................459
Conguring Telnet with IPv6..................................................................................................................................460
SNMP over IPv6......................................................................................................................................................460
Displaying IPv6 Information....................................................................................................................................460
Displaying an IPv6 Interface Information...............................................................................................................461
Showing IPv6 Routes...............................................................................................................................................461
Showing the Running-Conguration for an Interface......................................................................................... 463
Clearing IPv6 Routes...............................................................................................................................................463
Disabling ND Entry Timeout................................................................................................................................... 463
Conguring IPv6 RA Guard.......................................................................................................................................... 464
Conguring IPv6 RA Guard on an Interface.........................................................................................................465
Monitoring IPv6 RA Guard..................................................................................................................................... 466
25 iSCSI Optimization...................................................................................................................................467
iSCSI Optimization Overview....................................................................................................................................... 467
Monitoring iSCSI Trac Flows...............................................................................................................................469
Application of Quality of Service to iSCSI Trac Flows..................................................................................... 469
Information Monitored in iSCSI Trac Flows.......................................................................................................469
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 470
Conguring Detection and Ports for Dell Compellent Arrays............................................................................. 470
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer..................................................................471
Enable and Disable iSCSI Optimization..................................................................................................................471
Default iSCSI Optimization Values............................................................................................................................... 472
iSCSI Optimization Prerequisites..................................................................................................................................472
Conguring iSCSI Optimization....................................................................................................................................472
Displaying iSCSI Optimization Information..................................................................................................................474
26 Intermediate System to Intermediate System...........................................................................................476
IS-IS Protocol Overview................................................................................................................................................476
16
Contents
IS-IS Addressing.............................................................................................................................................................476
Multi-Topology IS-IS.......................................................................................................................................................477
Transition Mode........................................................................................................................................................477
Interface Support.....................................................................................................................................................478
Adjacencies...............................................................................................................................................................478
Graceful Restart.............................................................................................................................................................478
Timers........................................................................................................................................................................478
Implementation Information..........................................................................................................................................478
Conguration Information............................................................................................................................................. 479
Conguration Tasks for IS-IS..................................................................................................................................480
Conguring the Distance of a Route..................................................................................................................... 487
Changing the IS-Type.............................................................................................................................................. 488
Redistributing IPv4 Routes.....................................................................................................................................490
Redistributing IPv6 Routes......................................................................................................................................491
Conguring Authentication Passwords.................................................................................................................492
Setting the Overload Bit......................................................................................................................................... 492
Debugging IS-IS....................................................................................................................................................... 493
IS-IS Metric Styles.........................................................................................................................................................494
Congure Metric Values............................................................................................................................................... 494
Maximum Values in the Routing Table.................................................................................................................. 494
Change the IS-IS Metric Style in One Level Only................................................................................................494
Leaks from One Level to Another..........................................................................................................................496
Sample Congurations.................................................................................................................................................. 497
27 Link Aggregation Control Protocol (LACP)...............................................................................................499
Introduction to Dynamic LAGs and LACP.................................................................................................................. 499
Important Points to Remember............................................................................................................................. 499
LACP Modes............................................................................................................................................................500
Conguring LACP Commands...............................................................................................................................500
LACP Conguration Tasks.............................................................................................................................................501
Creating a LAG......................................................................................................................................................... 501
Conguring the LAG Interfaces as Dynamic.........................................................................................................501
Setting the LACP Long Timeout........................................................................................................................... 502
Monitoring and Debugging LACP..........................................................................................................................502
Shared LAG State Tracking.......................................................................................................................................... 503
Conguring Shared LAG State Tracking...............................................................................................................503
Important Points about Shared LAG State Tracking...........................................................................................505
LACP Basic Conguration Example............................................................................................................................ 505
Congure a LAG on ALPHA...................................................................................................................................505
28 Layer 2..................................................................................................................................................... 514
Manage the MAC Address Table.................................................................................................................................. 514
Clearing the MAC Address Table............................................................................................................................ 514
Setting the Aging Time for Dynamic Entries.........................................................................................................514
Conguring a Static MAC Address........................................................................................................................ 515
Displaying the MAC Address Table.........................................................................................................................515
Contents
17
MAC Learning Limit........................................................................................................................................................515
Setting the MAC Learning Limit............................................................................................................................. 516
mac learning-limit Dynamic..................................................................................................................................... 516
mac learning-limit mac-address-sticky.................................................................................................................. 516
mac learning-limit station-move............................................................................................................................. 517
mac learning-limit no-station-move........................................................................................................................517
Learning Limit Violation Actions..............................................................................................................................517
Setting Station Move Violation Actions.................................................................................................................518
Recovering from Learning Limit and Station Move Violations............................................................................518
NIC Teaming....................................................................................................................................................................519
Congure Redundant Pairs...........................................................................................................................................520
Important Points about Conguring Redundant Pairs........................................................................................ 522
Far-End Failure Detection.............................................................................................................................................523
FEFD State Changes...............................................................................................................................................524
Conguring FEFD.................................................................................................................................................... 525
Enabling FEFD on an Interface.............................................................................................................................. 525
Debugging FEFD......................................................................................................................................................526
29 Link Layer Discovery Protocol (LLDP)..................................................................................................... 528
802.1AB (LLDP) Overview............................................................................................................................................528
Protocol Data Units................................................................................................................................................. 528
Optional TLVs................................................................................................................................................................. 529
Management TLVs.................................................................................................................................................. 529
TIA-1057 (LLDP-MED) Overview................................................................................................................................. 531
TIA Organizationally Specic TLVs.........................................................................................................................531
Congure LLDP............................................................................................................................................................. 535
Related Conguration Tasks...................................................................................................................................535
Important Points to Remember............................................................................................................................. 535
LLDP Compatibility..................................................................................................................................................536
CONFIGURATION versus INTERFACE Congurations............................................................................................ 536
Enabling LLDP................................................................................................................................................................536
Disabling and Undoing LLDP.................................................................................................................................. 537
Enabling LLDP on Management Ports........................................................................................................................ 537
Disabling and Undoing LLDP on Management Ports.......................................................................................... 537
Advertising TLVs............................................................................................................................................................ 537
Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................539
Reserved Unrecognized LLDP TLVs..................................................................................................................... 539
Organizational Specic Unrecognized LLDP TLVs..............................................................................................539
Viewing Unrecognized LLDP TLVs........................................................................................................................ 539
Viewing the LLDP Conguration................................................................................................................................. 540
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................540
Examples of Viewing Information Advertised by Neighbors.............................................................................. 540
Conguring LLDPDU Intervals..................................................................................................................................... 542
Conguring LLDP Notication Interval....................................................................................................................... 543
Conguring Transmit and Receive Mode....................................................................................................................543
Conguring the Time to Live Value............................................................................................................................. 544
18
Contents
Debugging LLDP............................................................................................................................................................545
Relevant Management Objects................................................................................................................................... 546
30 Microsoft Network Load Balancing...........................................................................................................551
NLB Unicast Mode Scenario.........................................................................................................................................551
NLB Multicast Mode Scenario......................................................................................................................................551
Limitations of the NLB Feature....................................................................................................................................552
Microsoft Clustering......................................................................................................................................................552
Enable and Disable VLAN Flooding ............................................................................................................................ 552
Conguring a Switch for NLB .....................................................................................................................................552
Enabling a Switch for Multicast NLB.................................................................................................................... 553
31 Multicast Source Discovery Protocol (MSDP)..........................................................................................554
Protocol Overview.........................................................................................................................................................554
Anycast RP.....................................................................................................................................................................555
Implementation Information......................................................................................................................................... 556
Congure Multicast Source Discovery Protocol........................................................................................................556
Related Conguration Tasks...................................................................................................................................556
Enable MSDP.................................................................................................................................................................560
Manage the Source-Active Cache...............................................................................................................................561
Viewing the Source-Active Cache......................................................................................................................... 561
Limiting the Source-Active Cache......................................................................................................................... 561
Clearing the Source-Active Cache........................................................................................................................562
Enabling the Rejected Source-Active Cache....................................................................................................... 562
Accept Source-Active Messages that Fail the RFP Check......................................................................................562
Specifying Source-Active Messages.......................................................................................................................... 565
Limiting the Source-Active Messages from a Peer...................................................................................................566
Preventing MSDP from Caching a Local Source.......................................................................................................566
Preventing MSDP from Caching a Remote Source.................................................................................................. 567
Preventing MSDP from Advertising a Local Source..................................................................................................567
Logging Changes in Peership States...........................................................................................................................568
Terminating a Peership..................................................................................................................................................568
Clearing Peer Statistics.................................................................................................................................................569
Debugging MSDP..........................................................................................................................................................569
MSDP with Anycast RP................................................................................................................................................570
Conguring Anycast RP.................................................................................................................................................571
Reducing Source-Active Message Flooding.........................................................................................................572
Specifying the RP Address Used in SA Messages.............................................................................................. 572
MSDP Sample Congurations......................................................................................................................................574
32 Multiple Spanning Tree Protocol (MSTP).................................................................................................577
Protocol Overview......................................................................................................................................................... 577
Spanning Tree Variations...............................................................................................................................................578
Implementation Information....................................................................................................................................578
Congure Multiple Spanning Tree Protocol................................................................................................................ 578
Related Conguration Tasks................................................................................................................................... 579
Contents
19
Enable Multiple Spanning Tree Globally.......................................................................................................................579
Adding and Removing Interfaces................................................................................................................................. 579
Creating Multiple Spanning Tree Instances................................................................................................................580
Inuencing MSTP Root Selection................................................................................................................................ 581
Interoperate with Non-Dell Bridges..............................................................................................................................581
Changing the Region Name or Revision..................................................................................................................... 582
Modifying Global Parameters....................................................................................................................................... 582
Modifying the Interface Parameters........................................................................................................................... 583
Conguring an EdgePort.............................................................................................................................................. 584
Flush MAC Addresses after a Topology Change....................................................................................................... 585
MSTP Sample Congurations......................................................................................................................................585
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................586
Debugging and Verifying MSTP Congurations........................................................................................................ 589
33 Multicast Features................................................................................................................................... 591
Enabling IP Multicast..................................................................................................................................................... 591
Implementation Information.......................................................................................................................................... 591
Multicast Policies...........................................................................................................................................................592
IPv4 Multicast Policies............................................................................................................................................ 592
Understanding Multicast Traceroute (mtrace).......................................................................................................... 599
Important Points to Remember............................................................................................................................. 600
Printing Multicast Traceroute (mtrace) Paths........................................................................................................... 600
Supported Error Codes..................................................................................................................................................601
mtrace Scenarios...........................................................................................................................................................602
34 Object Tracking....................................................................................................................................... 608
Object Tracking Overview............................................................................................................................................ 608
Track Layer 2 Interfaces......................................................................................................................................... 609
Track Layer 3 Interfaces......................................................................................................................................... 609
Track IPv4 and IPv6 Routes....................................................................................................................................610
Set Tracking Delays...................................................................................................................................................611
VRRP Object Tracking..............................................................................................................................................611
Object Tracking Conguration.......................................................................................................................................611
Tracking a Layer 2 Interface.....................................................................................................................................611
Tracking a Layer 3 Interface....................................................................................................................................612
Track an IPv4/IPv6 Route.......................................................................................................................................614
Displaying Tracked Objects............................................................................................................................................617
35 Open Shortest Path First (OSPFv2 and OSPFv3).................................................................................... 619
Protocol Overview..........................................................................................................................................................619
Autonomous System (AS) Areas............................................................................................................................619
Area Types................................................................................................................................................................ 620
Networks and Neighbors.........................................................................................................................................621
Router Types............................................................................................................................................................. 621
Designated and Backup Designated Routers....................................................................................................... 623
20
Contents
/