PowerSwitch S4048T-ON

Dell PowerSwitch S4048T-ON User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4048T-ON User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S4048T–ON
System
9.11(0.0)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 01
Rev. A00
Contents
1 About this Guide...........................................................................................................................................35
Audience........................................................................................................................................................................... 35
Conventions......................................................................................................................................................................35
Related Documents......................................................................................................................................................... 35
2 Configuration Fundamentals........................................................................................................................36
Accessing the Command Line........................................................................................................................................36
CLI Modes.........................................................................................................................................................................36
Navigating CLI Modes...............................................................................................................................................38
The do Command............................................................................................................................................................. 41
Undoing Commands.........................................................................................................................................................41
Obtaining Help..................................................................................................................................................................42
Entering and Editing Commands................................................................................................................................... 42
Command History............................................................................................................................................................43
Filtering show Command Outputs.................................................................................................................................43
Example of the grep Keyword..................................................................................................................................43
Multiple Users in Configuration Mode...........................................................................................................................44
3 Getting Started........................................................................................................................................... 45
Console Access................................................................................................................................................................46
Serial Console.............................................................................................................................................................46
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................47
Entering CLI commands Using an SSH Connection..............................................................................................47
Executing Local CLI Scripts Using an SSH Connection........................................................................................47
Default Configuration...................................................................................................................................................... 48
Configuring a Host Name............................................................................................................................................... 48
Accessing the System Remotely................................................................................................................................... 48
Accessing the System Remotely............................................................................................................................. 48
Configure the Management Port IP Address.........................................................................................................49
Configure a Management Route............................................................................................................................. 49
Configuring a Username and Password..................................................................................................................49
Configuring the Enable Password................................................................................................................................. 50
Configuration File Management.................................................................................................................................... 50
Copy Files to and from the System.........................................................................................................................50
Mounting an NFS File System.................................................................................................................................. 51
Save the Running-Configuration............................................................................................................................. 53
Configure the Overload Bit for a Startup Scenario...............................................................................................53
Viewing Files...............................................................................................................................................................53
Compressing Configuration Files............................................................................................................................. 54
Managing the File System.............................................................................................................................................. 57
Enabling Software Features on Devices Using a Command Option......................................................................... 57
View Command History.................................................................................................................................................. 58
Contents
3
Upgrading Dell Networking OS......................................................................................................................................58
Verify Software Images Before Installation..................................................................................................................58
Using HTTP for File Transfers....................................................................................................................................... 59
4 Management................................................................................................................................................ 61
Configuring Privilege Levels............................................................................................................................................61
Creating a Custom Privilege Level........................................................................................................................... 61
Removing a Command from EXEC Mode..............................................................................................................62
Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 62
Allowing Access to CONFIGURATION Mode Commands................................................................................... 62
Allowing Access to Different Modes.......................................................................................................................62
Applying a Privilege Level to a Username...............................................................................................................64
Applying a Privilege Level to a Terminal Line......................................................................................................... 64
Configuring Logging........................................................................................................................................................ 64
Audit and Security Logs............................................................................................................................................65
Configuring Logging Format .................................................................................................................................. 66
Display the Logging Buffer and the Logging Configuration................................................................................. 67
Setting Up a Secure Connection to a Syslog Server............................................................................................ 67
Sending System Messages to a Syslog Server......................................................................................................69
Track Login Activity.........................................................................................................................................................69
Restrictions for Tracking Login Activity..................................................................................................................69
Configuring Login Activity Tracking........................................................................................................................ 69
Display Login Statistics..............................................................................................................................................70
Limit Concurrent Login Sessions.................................................................................................................................... 71
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................71
Configuring Concurrent Session Limit..................................................................................................................... 71
Enabling the System to Clear Existing Sessions.................................................................................................... 72
Enabling Secured CLI Mode........................................................................................................................................... 73
Log Messages in the Internal Buffer............................................................................................................................. 73
Configuration Task List for System Log Management......................................................................................... 73
Disabling System Logging............................................................................................................................................... 73
Sending System Messages to a Syslog Server............................................................................................................74
Configuring a UNIX System as a Syslog Server.....................................................................................................74
Changing System Logging Settings.............................................................................................................................. 74
Display the Logging Buffer and the Logging Configuration....................................................................................... 75
Configuring a UNIX Logging Facility Level....................................................................................................................76
Synchronizing Log Messages......................................................................................................................................... 77
Enabling Timestamp on Syslog Messages.................................................................................................................... 77
File Transfer Services......................................................................................................................................................78
Configuration Task List for File Transfer Services.................................................................................................78
Enabling the FTP Server........................................................................................................................................... 78
Configuring FTP Server Parameters....................................................................................................................... 78
Configuring FTP Client Parameters.........................................................................................................................79
Terminal Lines...................................................................................................................................................................79
Denying and Permitting Access to a Terminal Line...............................................................................................80
Configuring Login Authentication for Terminal Lines.............................................................................................81
4
Contents
Setting Timeout for EXEC Privilege Mode...................................................................................................................82
Using Telnet to get to Another Network Device.........................................................................................................82
Lock CONFIGURATION Mode.......................................................................................................................................83
Viewing the Configuration Lock Status.................................................................................................................. 83
Restoring the Factory Default Settings........................................................................................................................83
Important Points to Remember............................................................................................................................... 84
Restoring Factory Default Environment Variables................................................................................................ 84
5 802.1X......................................................................................................................................................... 86
Port-Authentication Process..........................................................................................................................................88
EAP over RADIUS......................................................................................................................................................88
Configuring 802.1X.......................................................................................................................................................... 89
Related Configuration Tasks.................................................................................................................................... 89
Important Points to Remember..................................................................................................................................... 89
Enabling 802.1X................................................................................................................................................................90
Configuring Request Identity Re-Transmissions.......................................................................................................... 91
Configuring a Quiet Period after a Failed Authentication.....................................................................................92
Forcibly Authorizing or Unauthorizing a Port...............................................................................................................93
Re-Authenticating a Port................................................................................................................................................93
Configuring Timeouts......................................................................................................................................................94
Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................... 95
Guest and Authentication-Fail VLANs.......................................................................................................................... 96
Configuring a Guest VLAN....................................................................................................................................... 97
Configuring an Authentication-Fail VLAN...............................................................................................................97
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)...................................99
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................................................................99
Guidelines for Configuring ACL VLAN Groups...........................................................................................................100
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters..............................................100
Configuring ACL VLAN Groups..............................................................................................................................100
Configuring FP Blocks for VLAN Parameters....................................................................................................... 101
Viewing CAM Usage...................................................................................................................................................... 102
Allocating FP Blocks for VLAN Processes.................................................................................................................. 103
Unified Forwarding Table (UFT) Modes..................................................................................................................... 104
Configuring UFT Modes.......................................................................................................................................... 104
7 Access Control Lists (ACLs)...................................................................................................................... 106
IP Access Control Lists (ACLs).................................................................................................................................... 107
CAM Usage...............................................................................................................................................................108
Implementing ACLs on Dell Networking OS......................................................................................................... 108
Important Points to Remember.....................................................................................................................................110
Configuration Task List for Route Maps................................................................................................................110
Configuring Match Routes.......................................................................................................................................112
Configuring Set Conditions......................................................................................................................................113
Configure a Route Map for Route Redistribution................................................................................................. 114
Configure a Route Map for Route Tagging........................................................................................................... 115
Contents
5
Continue Clause........................................................................................................................................................ 115
IP Fragment Handling.....................................................................................................................................................116
IP Fragments ACL Examples................................................................................................................................... 116
Layer 4 ACL Rules Examples................................................................................................................................... 116
Configure a Standard IP ACL.........................................................................................................................................117
Configuring a Standard IP ACL Filter..................................................................................................................... 118
Configure an Extended IP ACL..................................................................................................................................... 119
Configuring Filters with a Sequence Number........................................................................................................119
Configuring Filters Without a Sequence Number................................................................................................ 120
Configure Layer 2 and Layer 3 ACLs............................................................................................................................121
Assign an IP ACL to an Interface..................................................................................................................................122
Applying an IP ACL.........................................................................................................................................................122
Counting ACL Hits....................................................................................................................................................123
Configure Ingress ACLs.................................................................................................................................................123
Configure Egress ACLs..................................................................................................................................................123
Applying Egress Layer 3 ACLs (Control-Plane)....................................................................................................124
IP Prefix Lists..................................................................................................................................................................125
Implementation Information....................................................................................................................................125
Configuration Task List for Prefix Lists.................................................................................................................125
ACL Resequencing.........................................................................................................................................................129
Resequencing an ACL or Prefix List...................................................................................................................... 129
Route Maps......................................................................................................................................................................131
Implementation Information.....................................................................................................................................131
Logging of ACL Processes.............................................................................................................................................131
Guidelines for Configuring ACL Logging............................................................................................................... 132
Configuring ACL Logging........................................................................................................................................ 132
Flow-Based Monitoring Support for ACLs..................................................................................................................133
Behavior of Flow-Based Monitoring...................................................................................................................... 133
Enabling Flow-Based Monitoring............................................................................................................................135
Configuring UDF ACL.................................................................................................................................................... 136
Configuring IP Mirror Access Group............................................................................................................................138
Sample Configuration.............................................................................................................................................. 139
Example of viewing IP mirror–access–group applied to an Interface...............................................................139
8 Bidirectional Forwarding Detection (BFD)..................................................................................................140
How BFD Works.............................................................................................................................................................140
BFD Packet Format.................................................................................................................................................. 141
BFD Sessions............................................................................................................................................................ 142
BFD Three-Way Handshake................................................................................................................................... 143
Session State Changes............................................................................................................................................145
Important Points to Remember....................................................................................................................................145
Configure BFD................................................................................................................................................................ 145
Configure BFD for Physical Ports.......................................................................................................................... 146
Configure BFD for Static Routes........................................................................................................................... 147
Configure BFD for OSPF........................................................................................................................................ 150
Configure BFD for OSPFv3.................................................................................................................................... 153
6
Contents
Configure BFD for IS-IS...........................................................................................................................................154
Configure BFD for BGP...........................................................................................................................................156
Configure BFD for VRRP........................................................................................................................................ 163
Configuring Protocol Liveness................................................................................................................................166
Troubleshooting BFD............................................................................................................................................... 166
9 Border Gateway Protocol IPv4 (BGPv4)....................................................................................................168
Autonomous Systems (AS)...........................................................................................................................................168
Sessions and Peers........................................................................................................................................................ 170
Establish a Session................................................................................................................................................... 170
Route Reflectors............................................................................................................................................................. 171
BGP Attributes................................................................................................................................................................172
Best Path Selection Criteria....................................................................................................................................173
Weight........................................................................................................................................................................174
Local Preference.......................................................................................................................................................174
Multi-Exit Discriminators (MEDs).......................................................................................................................... 175
Origin..........................................................................................................................................................................176
AS Path......................................................................................................................................................................177
Next Hop....................................................................................................................................................................177
Multiprotocol BGP..........................................................................................................................................................177
Implement BGP with Dell Networking OS...................................................................................................................178
Additional Path (Add-Path) Support..................................................................................................................... 178
Advertise IGP Cost as MED for Redistributed Routes........................................................................................178
Ignore Router-ID in Best-Path Calculation............................................................................................................179
Four-Byte AS Numbers........................................................................................................................................... 179
AS4 Number Representation.................................................................................................................................. 179
AS Number Migration...............................................................................................................................................181
BGP4 Management Information Base (MIB)....................................................................................................... 182
Important Points to Remember..............................................................................................................................182
Configuration Information............................................................................................................................................. 183
BGP Configuration......................................................................................................................................................... 183
Enabling BGP............................................................................................................................................................ 184
Configuring AS4 Number Representations...........................................................................................................187
Configuring Peer Groups.........................................................................................................................................189
Configuring BGP Fast Fall-Over..............................................................................................................................191
Configuring Passive Peering................................................................................................................................... 193
Maintaining Existing AS Numbers During an AS Migration.................................................................................193
Allowing an AS Number to Appear in its Own AS Path.......................................................................................194
Enabling Graceful Restart....................................................................................................................................... 195
Enabling Neighbor Graceful Restart...................................................................................................................... 196
Filtering on an AS-Path Attribute...........................................................................................................................196
Regular Expressions as Filters................................................................................................................................ 198
Redistributing Routes.............................................................................................................................................. 199
Enabling Additional Paths....................................................................................................................................... 200
Configuring IP Community Lists............................................................................................................................200
Configuring an IP Extended Community List........................................................................................................201
Contents
7
Filtering Routes with Community Lists.................................................................................................................202
Manipulating the COMMUNITY Attribute............................................................................................................203
Changing MED Attributes...................................................................................................................................... 204
Changing the LOCAL_PREFERENCE Attribute................................................................................................. 204
Configuring the local System or a Different System to be the Next Hop for BGP-Learned Routes...........205
Changing the WEIGHT Attribute...........................................................................................................................206
Enabling Multipath...................................................................................................................................................206
Filtering BGP Routes...............................................................................................................................................206
Filtering BGP Routes Using Route Maps............................................................................................................. 208
Filtering BGP Routes Using AS-PATH Information.............................................................................................208
Configuring BGP Route Reflectors.......................................................................................................................209
Aggregating Routes................................................................................................................................................. 210
Configuring BGP Confederations...........................................................................................................................210
Enabling Route Flap Dampening..............................................................................................................................211
Changing BGP Timers..............................................................................................................................................213
Enabling BGP Neighbor Soft-Reconfiguration..................................................................................................... 213
Enabling or disabling BGP neighbors......................................................................................................................214
Route Map Continue................................................................................................................................................216
Enabling MBGP Configurations....................................................................................................................................216
BGP Regular Expression Optimization.........................................................................................................................217
Debugging BGP.............................................................................................................................................................. 217
Storing Last and Bad PDUs.................................................................................................................................... 218
Capturing PDUs........................................................................................................................................................219
PDU Counters..........................................................................................................................................................220
Sample Configurations..................................................................................................................................................220
10 Content Addressable Memory (CAM)...................................................................................................... 227
CAM Allocation...............................................................................................................................................................227
Test CAM Usage........................................................................................................................................................... 229
View CAM-ACL Settings..............................................................................................................................................229
View CAM Usage........................................................................................................................................................... 231
CAM Optimization..........................................................................................................................................................231
Troubleshoot CAM Profiling..........................................................................................................................................231
QoS CAM Region Limitation.................................................................................................................................. 232
11 Control Plane Policing (CoPP)..................................................................................................................233
Configure Control Plane Policing.................................................................................................................................234
Configuring CoPP for Protocols............................................................................................................................235
Configuring CoPP for CPU Queues...................................................................................................................... 237
CoPP for OSPFv3 Packets.................................................................................................................................... 238
Configuring CoPP for OSPFv3...............................................................................................................................241
Displaying CoPP Configuration ..............................................................................................................................241
12 Data Center Bridging (DCB).....................................................................................................................244
Ethernet Enhancements in Data Center Bridging..................................................................................................... 244
Priority-Based Flow Control...................................................................................................................................245
8
Contents
Enhanced Transmission Selection......................................................................................................................... 246
Data Center Bridging Exchange Protocol (DCBx).............................................................................................. 247
Data Center Bridging in a Traffic Flow................................................................................................................. 248
Enabling Data Center Bridging.....................................................................................................................................248
DCB Maps and its Attributes................................................................................................................................. 249
Data Center Bridging: Default Configuration.............................................................................................................250
Configuring Priority-Based Flow Control................................................................................................................... 250
Configuring Lossless Queues..................................................................................................................................251
Configuring PFC in a DCB Map................................................................................................................................... 252
PFC Configuration Notes....................................................................................................................................... 252
PFC Prerequisites and Restrictions.......................................................................................................................253
Applying a DCB Map on a Port....................................................................................................................................253
Configuring PFC without a DCB Map.........................................................................................................................254
Configuring Lossless QueuesExample:................................................................................................................. 254
Priority-Based Flow Control Using Dynamic Buffer Method...................................................................................256
Pause and Resume of Traffic.................................................................................................................................256
Buffer Sizes for Lossless or PFC Packets............................................................................................................256
Behavior of Tagged Packets........................................................................................................................................257
Configuration Example for DSCP and PFC Priorities................................................................................................257
Using PFC to Manage Converged Ethernet Traffic................................................................................................. 258
Configure Enhanced Transmission Selection.............................................................................................................258
ETS Prerequisites and Restrictions.......................................................................................................................258
Creating an ETS Priority Group............................................................................................................................. 258
ETS Operation with DCBx......................................................................................................................................260
Configuring Bandwidth Allocation for DCBx CIN................................................................................................ 260
Configuring ETS in a DCB Map.............................................................................................................................. 261
Hierarchical Scheduling in ETS Output Policies.........................................................................................................262
Using ETS to Manage Converged Ethernet Traffic..................................................................................................263
Applying DCB Policies in a Switch Stack....................................................................................................................263
Configure a DCBx Operation........................................................................................................................................263
DCBx Operation.......................................................................................................................................................263
DCBx Port Roles......................................................................................................................................................264
DCB Configuration Exchange................................................................................................................................ 265
Configuration Source Election...............................................................................................................................265
Propagation of DCB Information...........................................................................................................................266
Auto-Detection and Manual Configuration of the DCBx Version..................................................................... 266
DCBx Example..........................................................................................................................................................267
DCBx Prerequisites and Restrictions.................................................................................................................... 267
Configuring DCBx.................................................................................................................................................... 267
Verifying the DCB Configuration..................................................................................................................................271
QoS dot1p Traffic Classification and Queue Assignment.........................................................................................280
Configuring the Dynamic Buffer Method....................................................................................................................281
Sample DCB Configuration...........................................................................................................................................282
PFC and ETS Configuration Command Examples.............................................................................................. 284
13 Dynamic Host Configuration Protocol (DHCP)........................................................................................ 285
Contents
9
DHCP Packet Format and Options.............................................................................................................................285
Assign an IP Address using DHCP...............................................................................................................................287
Implementation Information......................................................................................................................................... 288
Configure the System to be a DHCP Server............................................................................................................. 288
Configuring the Server for Automatic Address Allocation................................................................................. 289
Specifying a Default Gateway................................................................................................................................290
Configure a Method of Hostname Resolution.....................................................................................................290
Using DNS for Address Resolution........................................................................................................................290
Using NetBIOS WINS for Address Resolution......................................................................................................291
Creating Manual Binding Entries............................................................................................................................ 291
Debugging the DHCP Server..................................................................................................................................291
Using DHCP Clear Commands.............................................................................................................................. 292
Configure the System to be a Relay Agent................................................................................................................292
Configure the System to be a DHCP Client...............................................................................................................294
Configuring the DHCP Client System...................................................................................................................294
DHCP Client on a Management Interface............................................................................................................295
DHCP Client Operation with Other Features...................................................................................................... 296
Configure the System for User Port Stacking (Option 230)...................................................................................297
Configure Secure DHCP...............................................................................................................................................297
Option 82.................................................................................................................................................................. 297
DHCP Snooping.......................................................................................................................................................298
Drop DHCP Packets on Snooped VLANs Only.................................................................................................... 301
Dynamic ARP Inspection........................................................................................................................................ 302
Configuring Dynamic ARP Inspection................................................................................................................... 303
Source Address Validation............................................................................................................................................304
Enabling IP Source Address Validation................................................................................................................. 304
DHCP MAC Source Address Validation............................................................................................................... 305
Enabling IP+MAC Source Address Validation......................................................................................................305
Viewing the Number of SAV Dropped Packets...................................................................................................306
Clearing the Number of SAV Dropped Packets.................................................................................................. 306
14 Equal Cost Multi-Path (ECMP)................................................................................................................307
ECMP for Flow-Based Affinity.................................................................................................................................... 307
Configuring the Hash Algorithm............................................................................................................................ 307
Enabling Deterministic ECMP Next Hop.............................................................................................................. 307
Configuring the Hash Algorithm Seed.................................................................................................................. 308
Link Bundle Monitoring................................................................................................................................................. 308
Managing ECMP Group Paths.............................................................................................................................. 309
Creating an ECMP Group Bundle..........................................................................................................................309
Modifying the ECMP Group Threshold................................................................................................................ 309
RTAG7............................................................................................................................................................................. 310
Flow-based Hashing for ECMP.....................................................................................................................................311
15 FIP Snooping............................................................................................................................................ 314
Fibre Channel over Ethernet.........................................................................................................................................314
Ensure Robustness in a Converged Ethernet Network............................................................................................ 314
10
Contents
FIP Snooping on Ethernet Bridges...............................................................................................................................316
FIP Snooping in a Switch Stack....................................................................................................................................318
Using FIP Snooping........................................................................................................................................................318
FIP Snooping Prerequisites..................................................................................................................................... 318
Important Points to Remember..............................................................................................................................318
Enabling the FCoE Transit Feature........................................................................................................................319
Enable FIP Snooping on VLANs.............................................................................................................................320
Configure the FC-MAP Value................................................................................................................................320
Configure a Port for a Bridge-to-Bridge Link...................................................................................................... 320
Configure a Port for a Bridge-to-FCF Link.......................................................................................................... 320
Impact on Other Software Features.....................................................................................................................320
FIP Snooping Restrictions....................................................................................................................................... 321
Configuring FIP Snooping........................................................................................................................................321
Displaying FIP Snooping Information...........................................................................................................................322
FCoE Transit Configuration Example.......................................................................................................................... 327
16 FIPS Cryptography.................................................................................................................................. 329
Configuration Tasks...................................................................................................................................................... 329
Preparing the System................................................................................................................................................... 329
Enabling FIPS Mode......................................................................................................................................................330
Generating Host-Keys.................................................................................................................................................. 330
Monitoring FIPS Mode Status..................................................................................................................................... 330
Disabling FIPS Mode...................................................................................................................................................... 331
17 Force10 Resilient Ring Protocol (FRRP)...................................................................................................332
Protocol Overview.........................................................................................................................................................332
Ring Status...............................................................................................................................................................333
Multiple FRRP Rings................................................................................................................................................333
Important FRRP Points...........................................................................................................................................334
Important FRRP Concepts.....................................................................................................................................335
Implementing FRRP.......................................................................................................................................................336
FRRP Configuration...................................................................................................................................................... 336
Creating the FRRP Group...................................................................................................................................... 336
Configuring the Control VLAN...............................................................................................................................337
Configuring and Adding the Member VLANs.......................................................................................................338
Setting the FRRP Timers........................................................................................................................................339
Clearing the FRRP Counters..................................................................................................................................339
Viewing the FRRP Configuration...........................................................................................................................339
Viewing the FRRP Information.............................................................................................................................. 339
Troubleshooting FRRP..................................................................................................................................................340
Configuration Checks..............................................................................................................................................340
Sample Configuration and Topology........................................................................................................................... 340
FRRP Support on VLT...................................................................................................................................................341
Example Scenario.................................................................................................................................................... 342
Important Points to Remember............................................................................................................................. 343
Contents
11
18 GARP VLAN Registration Protocol (GVRP)............................................................................................. 344
Important Points to Remember................................................................................................................................... 344
Configure GVRP............................................................................................................................................................ 345
Related Configuration Tasks..................................................................................................................................345
Enabling GVRP Globally................................................................................................................................................ 346
Enabling GVRP on a Layer 2 Interface....................................................................................................................... 346
Configure GVRP Registration...................................................................................................................................... 346
Configure a GARP Timer.............................................................................................................................................. 347
RPM Redundancy..........................................................................................................................................................347
19 High Availability (HA)............................................................................................................................... 349
Component Redundancy..............................................................................................................................................349
Automatic and Manual Stack Unit Failover..........................................................................................................349
Synchronization between Management and Standby Units............................................................................. 350
Forcing a Stack Unit Failover.................................................................................................................................350
Specifying an Auto-Failover Limit.......................................................................................................................... 351
Disabling Auto-Reboot.............................................................................................................................................351
Manually Synchronizing Management and Standby Units..................................................................................351
Pre-Configuring a Stack Unit Slot................................................................................................................................351
Removing a Provisioned Logical Stack Unit...............................................................................................................352
Hitless Behavior............................................................................................................................................................. 352
Graceful Restart............................................................................................................................................................ 352
Software Resiliency.......................................................................................................................................................353
Software Component Health Monitoring.............................................................................................................353
System Health Monitoring......................................................................................................................................353
Failure and Event Logging......................................................................................................................................353
Hot-Lock Behavior........................................................................................................................................................ 354
20 Internet Group Management Protocol (IGMP)........................................................................................355
IGMP Implementation Information..............................................................................................................................355
IGMP Protocol Overview............................................................................................................................................. 355
IGMP Version 2........................................................................................................................................................355
IGMP Version 3........................................................................................................................................................357
Configure IGMP.............................................................................................................................................................360
Related Configuration Tasks..................................................................................................................................360
Viewing IGMP Enabled Interfaces................................................................................................................................361
Selecting an IGMP Version........................................................................................................................................... 361
Viewing IGMP Groups................................................................................................................................................... 361
Adjusting Timers............................................................................................................................................................ 362
Adjusting Query and Response Timers.................................................................................................................362
Preventing a Host from Joining a Group....................................................................................................................363
Enabling IGMP Immediate-Leave................................................................................................................................ 366
IGMP Snooping..............................................................................................................................................................366
IGMP Snooping Implementation Information.......................................................................................................366
Configuring IGMP Snooping.................................................................................................................................. 366
12
Contents
Removing a Group-Port Association.....................................................................................................................367
Disabling Multicast Flooding...................................................................................................................................367
Specifying a Port as Connected to a Multicast Router......................................................................................368
Configuring the Switch as Querier........................................................................................................................368
Fast Convergence after MSTP Topology Changes..................................................................................................369
Egress Interface Selection (EIS) for HTTP and IGMP Applications....................................................................... 369
Protocol Separation.................................................................................................................................................369
Enabling and Disabling Management Egress Interface Selection......................................................................370
Handling of Management Route Configuration....................................................................................................371
Handling of Switch-Initiated Traffic...................................................................................................................... 372
Handling of Switch-Destined Traffic.....................................................................................................................372
Handling of Transit Traffic (Traffic Separation).................................................................................................. 373
Mapping of Management Applications and Traffic Type....................................................................................373
Behavior of Various Applications for Switch-Initiated Traffic ...........................................................................374
Behavior of Various Applications for Switch-Destined Traffic ......................................................................... 375
Interworking of EIS With Various Applications.....................................................................................................376
Designating a Multicast Router Interface................................................................................................................... 377
21 Interfaces................................................................................................................................................. 378
Basic Interface Configuration.......................................................................................................................................378
Advanced Interface Configuration...............................................................................................................................378
Interface Types.............................................................................................................................................................. 379
View Basic Interface Information.................................................................................................................................379
Resetting an Interface to its Factory Default State.................................................................................................. 381
Enabling a Physical Interface........................................................................................................................................382
Physical Interfaces.........................................................................................................................................................382
Configuration Task List for Physical Interfaces...................................................................................................382
Overview of Layer Modes...................................................................................................................................... 382
Configuring Layer 2 (Data Link) Mode................................................................................................................. 383
Configuring Layer 2 (Interface) Mode..................................................................................................................383
Configuring Layer 3 (Network) Mode.................................................................................................................. 384
Configuring Layer 3 (Interface) Mode..................................................................................................................384
Egress Interface Selection (EIS)................................................................................................................................. 385
Important Points to Remember.............................................................................................................................385
Configuring EIS........................................................................................................................................................ 385
Management Interfaces............................................................................................................................................... 386
Configuring Management Interfaces.................................................................................................................... 386
Configuring a Management Interface on an Ethernet Port............................................................................... 387
VLAN Interfaces............................................................................................................................................................ 388
Loopback Interfaces......................................................................................................................................................389
Null Interfaces................................................................................................................................................................389
Port Channel Interfaces................................................................................................................................................389
Port Channel Definition and Standards................................................................................................................ 390
Port Channel Benefits.............................................................................................................................................390
Port Channel Implementation................................................................................................................................ 390
Interfaces in Port Channels.....................................................................................................................................391
Contents
13
Configuration Tasks for Port Channel Interfaces................................................................................................ 391
Creating a Port Channel..........................................................................................................................................391
Adding a Physical Interface to a Port Channel.................................................................................................... 392
Reassigning an Interface to a New Port Channel............................................................................................... 393
Configuring the Minimum Oper Up Links in a Port Channel.............................................................................. 394
Adding or Removing a Port Channel from a VLAN.............................................................................................394
Assigning an IP Address to a Port Channel..........................................................................................................395
Deleting or Disabling a Port Channel.....................................................................................................................396
Load Balancing Through Port Channels............................................................................................................... 396
Changing the Hash Algorithm................................................................................................................................396
Bulk Configuration......................................................................................................................................................... 397
Interface Range........................................................................................................................................................397
Bulk Configuration Examples..................................................................................................................................397
Defining Interface Range Macros................................................................................................................................399
Define the Interface Range....................................................................................................................................399
Choosing an Interface-Range Macro....................................................................................................................399
Monitoring and Maintaining Interfaces.......................................................................................................................400
Maintenance Using TDR..........................................................................................................................................401
Non Dell-Qualified Transceivers................................................................................................................................... 401
Splitting 40G Ports without Reload............................................................................................................................ 402
Splitting QSFP Ports to SFP+ Ports...........................................................................................................................403
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port................................................................................. 404
Important Points to Remember.............................................................................................................................404
Example Scenarios.................................................................................................................................................. 405
Link Dampening............................................................................................................................................................. 406
Important Points to Remember.............................................................................................................................406
Enabling Link Dampening........................................................................................................................................406
Link Bundle Monitoring................................................................................................................................................. 408
Using Ethernet Pause Frames for Flow Control........................................................................................................408
Enabling Pause Frames...........................................................................................................................................409
Configure the MTU Size on an Interface................................................................................................................... 409
Port-Pipes....................................................................................................................................................................... 410
Auto-Negotiation on Ethernet Interfaces................................................................................................................... 410
Setting the Speed of Ethernet Interfaces............................................................................................................. 411
Set Auto-Negotiation Options................................................................................................................................412
View Advanced Interface Information......................................................................................................................... 413
Configuring the Interface Sampling Size...............................................................................................................413
Configuring the Traffic Sampling Size Globally.......................................................................................................... 415
Dynamic Counters..........................................................................................................................................................416
Clearing Interface Counters....................................................................................................................................416
22 Internet Protocol Security (IPSec)...........................................................................................................418
Configuring IPSec ..........................................................................................................................................................418
23 IPv4 Routing............................................................................................................................................420
IP Addresses................................................................................................................................................................... 421
14
Contents
Implementation Information.................................................................................................................................... 421
Configuration Tasks for IP Addresses......................................................................................................................... 421
Assigning IP Addresses to an Interface....................................................................................................................... 421
Configuring Static Routes............................................................................................................................................ 422
Configure Static Routes for the Management Interface......................................................................................... 423
IPv4 Path MTU Discovery Overview.......................................................................................................................... 424
Using the Configured Source IP Address in ICMP Messages................................................................................. 424
Configuring the ICMP Source Interface...............................................................................................................424
Configuring the Duration to Establish a TCP Connection........................................................................................425
Enabling Directed Broadcast........................................................................................................................................425
Resolution of Host Names............................................................................................................................................425
Enabling Dynamic Resolution of Host Names............................................................................................................426
Specifying the Local System Domain and a List of Domains...................................................................................426
Configuring DNS with Traceroute...............................................................................................................................427
ARP..................................................................................................................................................................................427
Configuration Tasks for ARP........................................................................................................................................428
Configuring Static ARP Entries....................................................................................................................................428
Enabling Proxy ARP.......................................................................................................................................................428
Clearing ARP Cache......................................................................................................................................................429
ARP Learning via Gratuitous ARP............................................................................................................................... 429
Enabling ARP Learning via Gratuitous ARP............................................................................................................... 429
ARP Learning via ARP Request...................................................................................................................................429
Configuring ARP Retries...............................................................................................................................................430
ICMP................................................................................................................................................................................ 431
Configuration Tasks for ICMP...................................................................................................................................... 431
Enabling ICMP Unreachable Messages.......................................................................................................................431
UDP Helper..................................................................................................................................................................... 431
Configure UDP Helper............................................................................................................................................. 431
Important Points to Remember............................................................................................................................. 432
Enabling UDP Helper.....................................................................................................................................................432
Configuring a Broadcast Address................................................................................................................................432
Configurations Using UDP Helper............................................................................................................................... 433
UDP Helper with Broadcast-All Addresses................................................................................................................ 433
UDP Helper with Subnet Broadcast Addresses........................................................................................................ 434
UDP Helper with Configured Broadcast Addresses..................................................................................................434
UDP Helper with No Configured Broadcast Addresses........................................................................................... 435
Troubleshooting UDP Helper....................................................................................................................................... 435
24 IPv6 Routing............................................................................................................................................436
Protocol Overview.........................................................................................................................................................436
Extended Address Space........................................................................................................................................437
Stateless Autoconfiguration................................................................................................................................... 437
IPv6 Headers............................................................................................................................................................437
IPv6 Header Fields...................................................................................................................................................438
Extension Header Fields......................................................................................................................................... 440
Addressing.................................................................................................................................................................441
Contents
15
Implementing IPv6 with Dell Networking OS.............................................................................................................442
ICMPv6...........................................................................................................................................................................443
Path MTU Discovery.....................................................................................................................................................444
IPv6 Neighbor Discovery.............................................................................................................................................. 444
IPv6 Neighbor Discovery of MTU Packets.......................................................................................................... 445
Configuration Task List for IPv6 RDNSS................................................................................................................... 445
Configuring the IPv6 Recursive DNS Server.......................................................................................................445
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................446
Displaying IPv6 RDNSS Information......................................................................................................................447
Secure Shell (SSH) Over an IPv6 Transport..............................................................................................................447
Configuration Tasks for IPv6....................................................................................................................................... 448
Adjusting Your CAM-Profile................................................................................................................................... 448
Assigning an IPv6 Address to an Interface...........................................................................................................449
Assigning a Static IPv6 Route................................................................................................................................449
Configuring Telnet with IPv6................................................................................................................................. 450
SNMP over IPv6......................................................................................................................................................450
Displaying IPv6 Information....................................................................................................................................450
Displaying an IPv6 Interface Information...............................................................................................................451
Showing IPv6 Routes.............................................................................................................................................. 451
Showing the Running-Configuration for an Interface........................................................................................ 453
Clearing IPv6 Routes...............................................................................................................................................453
Configuring IPv6 RA Guard..........................................................................................................................................453
Configuring IPv6 RA Guard on an Interface........................................................................................................ 455
Monitoring IPv6 RA Guard..................................................................................................................................... 456
25 iSCSI Optimization.................................................................................................................................. 457
iSCSI Optimization Overview.......................................................................................................................................457
Monitoring iSCSI Traffic Flows..............................................................................................................................459
Application of Quality of Service to iSCSI Traffic Flows.................................................................................... 459
Information Monitored in iSCSI Traffic Flows......................................................................................................459
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................... 460
Configuring Detection and Ports for Dell Compellent Arrays............................................................................ 460
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer............................................................... 461
Enable and Disable iSCSI Optimization..................................................................................................................461
Default iSCSI Optimization Values.............................................................................................................................. 462
iSCSI Optimization Prerequisites.................................................................................................................................462
Configuring iSCSI Optimization................................................................................................................................... 462
Displaying iSCSI Optimization Information................................................................................................................. 464
26 Intermediate System to Intermediate System..........................................................................................466
IS-IS Protocol Overview............................................................................................................................................... 466
IS-IS Addressing............................................................................................................................................................ 466
Multi-Topology IS-IS......................................................................................................................................................467
Transition Mode....................................................................................................................................................... 467
Interface Support.................................................................................................................................................... 468
Adjacencies...............................................................................................................................................................468
16
Contents
Graceful Restart............................................................................................................................................................ 468
Timers....................................................................................................................................................................... 468
Implementation Information......................................................................................................................................... 468
Configuration Information............................................................................................................................................ 469
Configuration Tasks for IS-IS.................................................................................................................................470
Configuring the Distance of a Route.....................................................................................................................477
Changing the IS-Type............................................................................................................................................. 478
Redistributing IPv4 Routes.....................................................................................................................................480
Redistributing IPv6 Routes..................................................................................................................................... 481
Configuring Authentication Passwords................................................................................................................ 482
Setting the Overload Bit.........................................................................................................................................482
Debugging IS-IS....................................................................................................................................................... 483
IS-IS Metric Styles.........................................................................................................................................................484
Configure Metric Values............................................................................................................................................... 484
Maximum Values in the Routing Table..................................................................................................................485
Change the IS-IS Metric Style in One Level Only............................................................................................... 485
Leaks from One Level to Another......................................................................................................................... 486
Sample Configurations.................................................................................................................................................. 487
27 Link Aggregation Control Protocol (LACP)..............................................................................................490
Introduction to Dynamic LAGs and LACP..................................................................................................................490
Important Points to Remember.............................................................................................................................490
LACP Modes.............................................................................................................................................................491
Configuring LACP Commands................................................................................................................................491
LACP Configuration Tasks........................................................................................................................................... 492
Creating a LAG.........................................................................................................................................................492
Configuring the LAG Interfaces as Dynamic........................................................................................................492
Setting the LACP Long Timeout........................................................................................................................... 493
Monitoring and Debugging LACP..........................................................................................................................493
Shared LAG State Tracking......................................................................................................................................... 494
Configuring Shared LAG State Tracking.............................................................................................................. 494
Important Points about Shared LAG State Tracking..........................................................................................496
LACP Basic Configuration Example............................................................................................................................ 496
Configure a LAG on ALPHA...................................................................................................................................496
28 Layer 2.................................................................................................................................................... 505
Manage the MAC Address Table................................................................................................................................ 505
Clearing the MAC Address Table.......................................................................................................................... 505
Setting the Aging Time for Dynamic Entries....................................................................................................... 505
Configuring a Static MAC Address....................................................................................................................... 506
Displaying the MAC Address Table.......................................................................................................................506
MAC Learning Limit...................................................................................................................................................... 506
Setting the MAC Learning Limit............................................................................................................................ 507
mac learning-limit Dynamic.....................................................................................................................................507
mac learning-limit mac-address-sticky................................................................................................................. 507
mac learning-limit station-move............................................................................................................................ 508
Contents
17
mac learning-limit no-station-move...................................................................................................................... 508
Learning Limit Violation Actions............................................................................................................................ 508
Setting Station Move Violation Actions................................................................................................................509
Recovering from Learning Limit and Station Move Violations.......................................................................... 509
NIC Teaming................................................................................................................................................................... 510
Configure Redundant Pairs............................................................................................................................................511
Important Points about Configuring Redundant Pairs........................................................................................ 513
Far-End Failure Detection............................................................................................................................................. 514
FEFD State Changes............................................................................................................................................... 515
Configuring FEFD.....................................................................................................................................................516
Enabling FEFD on an Interface...............................................................................................................................516
Debugging FEFD.......................................................................................................................................................517
29 Link Layer Discovery Protocol (LLDP)..................................................................................................... 519
802.1AB (LLDP) Overview............................................................................................................................................519
Protocol Data Units..................................................................................................................................................519
Optional TLVs................................................................................................................................................................ 520
Management TLVs..................................................................................................................................................520
TIA-1057 (LLDP-MED) Overview............................................................................................................................... 522
TIA Organizationally Specific TLVs........................................................................................................................522
Configure LLDP............................................................................................................................................................. 526
Related Configuration Tasks..................................................................................................................................526
Important Points to Remember.............................................................................................................................526
LLDP Compatibility..................................................................................................................................................527
CONFIGURATION versus INTERFACE Configurations............................................................................................527
Enabling LLDP................................................................................................................................................................527
Disabling and Undoing LLDP..................................................................................................................................528
Enabling LLDP on Management Ports........................................................................................................................528
Disabling and Undoing LLDP on Management Ports..........................................................................................528
Advertising TLVs........................................................................................................................................................... 528
Viewing the LLDP Configuration.................................................................................................................................530
Viewing Information Advertised by Adjacent LLDP Agents.....................................................................................530
Configuring LLDPDU Intervals......................................................................................................................................531
Configuring Transmit and Receive Mode...................................................................................................................532
Configuring the Time to Live Value.............................................................................................................................532
Debugging LLDP............................................................................................................................................................533
Relevant Management Objects................................................................................................................................... 534
30 Microsoft Network Load Balancing..........................................................................................................539
NLB Unicast Mode Scenario........................................................................................................................................539
NLB Multicast Mode Scenario.....................................................................................................................................539
Limitations of the NLB Feature................................................................................................................................... 540
Microsoft Clustering..................................................................................................................................................... 540
Enable and Disable VLAN Flooding ............................................................................................................................ 540
Configuring a Switch for NLB .....................................................................................................................................540
Enabling a Switch for Multicast NLB.....................................................................................................................541
18
Contents
31 Multicast Source Discovery Protocol (MSDP)......................................................................................... 542
Protocol Overview.........................................................................................................................................................542
Anycast RP.....................................................................................................................................................................543
Implementation Information......................................................................................................................................... 544
Configure Multicast Source Discovery Protocol....................................................................................................... 544
Related Configuration Tasks..................................................................................................................................544
Enable MSDP................................................................................................................................................................. 548
Manage the Source-Active Cache..............................................................................................................................549
Viewing the Source-Active Cache........................................................................................................................ 549
Limiting the Source-Active Cache........................................................................................................................ 549
Clearing the Source-Active Cache........................................................................................................................550
Enabling the Rejected Source-Active Cache.......................................................................................................550
Accept Source-Active Messages that Fail the RFP Check.....................................................................................550
Specifying Source-Active Messages.......................................................................................................................... 553
Limiting the Source-Active Messages from a Peer.................................................................................................. 554
Preventing MSDP from Caching a Local Source...................................................................................................... 554
Preventing MSDP from Caching a Remote Source................................................................................................. 555
Preventing MSDP from Advertising a Local Source.................................................................................................555
Logging Changes in Peership States..........................................................................................................................556
Terminating a Peership.................................................................................................................................................556
Clearing Peer Statistics.................................................................................................................................................557
Debugging MSDP.......................................................................................................................................................... 557
MSDP with Anycast RP................................................................................................................................................558
Configuring Anycast RP............................................................................................................................................... 559
Reducing Source-Active Message Flooding........................................................................................................560
Specifying the RP Address Used in SA Messages..............................................................................................560
MSDP Sample Configurations..................................................................................................................................... 562
32 Multiple Spanning Tree Protocol (MSTP)................................................................................................565
Protocol Overview........................................................................................................................................................ 565
Spanning Tree Variations..............................................................................................................................................566
Implementation Information................................................................................................................................... 566
Configure Multiple Spanning Tree Protocol...............................................................................................................566
Related Configuration Tasks.................................................................................................................................. 567
Enable Multiple Spanning Tree Globally......................................................................................................................567
Adding and Removing Interfaces.................................................................................................................................567
Creating Multiple Spanning Tree Instances............................................................................................................... 568
Influencing MSTP Root Selection............................................................................................................................... 569
Interoperate with Non-Dell Bridges............................................................................................................................ 569
Changing the Region Name or Revision.....................................................................................................................570
Modifying Global Parameters.......................................................................................................................................570
Modifying the Interface Parameters............................................................................................................................571
Configuring an EdgePort.............................................................................................................................................. 572
Flush MAC Addresses after a Topology Change.......................................................................................................573
MSTP Sample Configurations......................................................................................................................................573
Contents
19
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration.......................................................................................574
Debugging and Verifying MSTP Configurations........................................................................................................ 577
33 Multicast Features...................................................................................................................................579
Enabling IP Multicast.....................................................................................................................................................579
Implementation Information......................................................................................................................................... 579
Multicast Policies...........................................................................................................................................................580
IPv4 Multicast Policies............................................................................................................................................580
Understanding Multicast Traceroute (mtrace)......................................................................................................... 587
Important Points to Remember.............................................................................................................................588
Printing Multicast Traceroute (mtrace) Paths..........................................................................................................588
Supported Error Codes.................................................................................................................................................589
mtrace Scenarios...........................................................................................................................................................590
34 Object Tracking.......................................................................................................................................596
Object Tracking Overview............................................................................................................................................596
Track Layer 2 Interfaces.........................................................................................................................................597
Track Layer 3 Interfaces.........................................................................................................................................597
Track IPv4 and IPv6 Routes.................................................................................................................................. 598
Set Tracking Delays.................................................................................................................................................599
VRRP Object Tracking............................................................................................................................................599
Object Tracking Configuration.....................................................................................................................................599
Tracking a Layer 2 Interface.................................................................................................................................. 599
Tracking a Layer 3 Interface.................................................................................................................................. 600
Track an IPv4/IPv6 Route..................................................................................................................................... 602
Displaying Tracked Objects..........................................................................................................................................605
35 Open Shortest Path First (OSPFv2 and OSPFv3)................................................................................... 607
Protocol Overview.........................................................................................................................................................607
Autonomous System (AS) Areas...........................................................................................................................607
Area Types............................................................................................................................................................... 608
Networks and Neighbors........................................................................................................................................609
Router Types............................................................................................................................................................609
Designated and Backup Designated Routers........................................................................................................ 611
Link-State Advertisements (LSAs).........................................................................................................................611
Router Priority and Cost..........................................................................................................................................612
OSPF with Dell Networking OS....................................................................................................................................613
Graceful Restart....................................................................................................................................................... 614
Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................615
Multi-Process OSPFv2 with VRF.......................................................................................................................... 615
OSPF ACK Packing..................................................................................................................................................615
Setting OSPF Adjacency with Cisco Routers.......................................................................................................615
Configuration Information............................................................................................................................................. 616
Configuration Task List for OSPFv2 (OSPF for IPv4)........................................................................................616
Configuration Task List for OSPFv3 (OSPF for IPv6)....................................................................................... 630
20
Contents
/