Dell C9010 Modular Chassis Switch User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell C9010 Modular Chassis Switch User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Networking Conguration Guide for the
C9010 Series
Version 9.11(2.1P2)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2016 Dell Inc. or its subsidiaries. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell and
the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of
their respective companies.
2017 - 06
Rev. A00
Contents
1 About this Guide...........................................................................................................................................35
Audience........................................................................................................................................................................... 35
Conventions......................................................................................................................................................................35
Related Documents......................................................................................................................................................... 35
2 Conguration Fundamentals........................................................................................................................ 36
Accessing the Command Line........................................................................................................................................36
CLI Modes.........................................................................................................................................................................36
Navigating CLI Modes............................................................................................................................................... 38
The do Command............................................................................................................................................................. 41
Undoing Commands........................................................................................................................................................ 42
Obtaining Help..................................................................................................................................................................42
Entering and Editing Commands....................................................................................................................................42
Command History............................................................................................................................................................ 43
Filtering show Command Outputs................................................................................................................................. 43
Multiple Users in Conguration Mode...........................................................................................................................45
3 Getting Started............................................................................................................................................46
Console Access................................................................................................................................................................46
Serial Console............................................................................................................................................................. 47
Mounting an NFS File System........................................................................................................................................48
Important Points to Remember................................................................................................................................48
Default Conguration...................................................................................................................................................... 49
Conguring a Host Name............................................................................................................................................... 49
Accessing the System Remotely................................................................................................................................... 50
Accessing the System Remotely............................................................................................................................. 50
Congure the Management Port IP Address.........................................................................................................50
Congure a Management Route..............................................................................................................................50
Conguring a Username and Password...................................................................................................................51
Conguring the Enable Password...................................................................................................................................51
Manage Conguration Files.............................................................................................................................................51
File Storage.................................................................................................................................................................52
Copy Files to and from the System......................................................................................................................... 52
Save the Running-Conguration..............................................................................................................................53
Congure the Overload Bit for a Startup Scenario............................................................................................... 54
Viewing Files...............................................................................................................................................................54
Changes in Conguration Files.................................................................................................................................55
Viewing Command History............................................................................................................................................. 55
Upgrading the Dell Networking OS............................................................................................................................... 55
4 Switch Management.................................................................................................................................... 57
Conguring Privilege Levels............................................................................................................................................57
Contents
3
Creating a Custom Privilege Level........................................................................................................................... 57
Removing a Command from EXEC Mode.............................................................................................................. 57
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................57
Allowing Access to CONFIGURATION Mode Commands....................................................................................58
Allowing Access to the Following Modes................................................................................................................58
Applying a Privilege Level to a Username...............................................................................................................59
Applying a Privilege Level to a Terminal Line.......................................................................................................... 60
Conguring Logging........................................................................................................................................................ 60
Audit and Security Logs............................................................................................................................................ 60
Conguring Logging Format ...................................................................................................................................62
Setting Up a Secure Connection to a Syslog Server.............................................................................................62
Track Login Activity......................................................................................................................................................... 64
Restrictions for Tracking Login Activity...................................................................................................................64
Conguring Login Activity Tracking.........................................................................................................................64
Display Login Statistics..............................................................................................................................................64
Limit Concurrent Login Sessions....................................................................................................................................66
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 66
Conguring Concurrent Session Limit.....................................................................................................................66
Enabling the System to Clear Existing Sessions.................................................................................................... 67
Enabling Secured CLI Mode............................................................................................................................................67
Log Messages in the Internal Buer..............................................................................................................................68
Conguration Task List for System Log Management.......................................................................................... 68
Disabling System Logging............................................................................................................................................... 68
Sending System Messages to a Syslog Server............................................................................................................68
Conguring a UNIX System as a Syslog Server.....................................................................................................69
Display the Logging Buer and the Logging Conguration........................................................................................69
Changing System Logging Settings...............................................................................................................................70
Conguring a UNIX Logging Facility Level....................................................................................................................70
Synchronizing Log Messages..........................................................................................................................................71
Enabling Timestamp on Syslog Messages.................................................................................................................... 72
File Transfer Services.......................................................................................................................................................72
Conguration Task List for File Transfer Services..................................................................................................72
Enabling the FTP Server........................................................................................................................................... 73
Conguring FTP Server Parameters........................................................................................................................73
Conguring FTP Client Parameters......................................................................................................................... 73
Terminal Lines................................................................................................................................................................... 74
Denying and Permitting Access to a Terminal Line................................................................................................ 74
Conguring Login Authentication for Terminal Lines.............................................................................................75
Setting Time Out of EXEC Privilege Mode...................................................................................................................75
Using Telnet to Access Another Network Device........................................................................................................76
Lock CONFIGURATION Mode....................................................................................................................................... 77
Viewing the Conguration Lock Status...................................................................................................................77
LPC Bus Quality Degradation......................................................................................................................................... 77
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................78
Recovering from a Forgotten Password ...................................................................................................................... 79
4
Contents
Ignoring the Startup Conguration and Booting from the Factory-Default Conguration.....................................79
Recovering from a Failed Start...................................................................................................................................... 80
Restoring Factory-Default Settings...............................................................................................................................80
Important Point to Remember................................................................................................................................. 80
Restoring Factory-Default Boot Environment Variables........................................................................................ 81
Using Hashes to Verify Software Images Before Installation..................................................................................... 82
Verifying System Images on C9010 Components........................................................................................................83
When System Images on C9010 Components Do Not Match.............................................................................84
Manually Resetting the System Image on a C9010 Component......................................................................... 84
Logging in to the Virtual Console of a C9010 Component................................................................................... 85
Booting the C9010 from an Image on a Network Server..................................................................................... 85
Conguring C9010 Components to Boot from the RPM CP Image................................................................... 85
5 802.1X..........................................................................................................................................................87
The Port-Authentication Process.................................................................................................................................. 89
EAP over RADIUS......................................................................................................................................................90
Conguring 802.1X........................................................................................................................................................... 91
Related Conguration Tasks......................................................................................................................................91
Important Points to Remember...................................................................................................................................... 91
Enabling 802.1X................................................................................................................................................................ 92
Conguring dot1x Prole ................................................................................................................................................94
Conguring MAC addresses for a do1x Prole.............................................................................................................94
Conguring the Static MAB and MAB Prole .............................................................................................................95
Conguring Critical VLAN ..............................................................................................................................................96
Conguring Request Identity Re-Transmissions...........................................................................................................96
Conguring a Quiet Period after a Failed Authentication............................................................................................97
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 98
Re-Authenticating a Port................................................................................................................................................99
Conguring Dynamic VLAN Assignment with Port Authentication.......................................................................... 99
Guest and Authentication-Fail VLANs.........................................................................................................................100
Conguring a Guest VLAN...................................................................................................................................... 101
Conguring an Authentication-Fail VLAN............................................................................................................. 102
Conguring Timeouts...............................................................................................................................................103
Multi-Host Authentication.............................................................................................................................................104
Conguring Multi-Host AuthenticationConguring Single-Host Authentication............................................. 105
Multi-Supplicant Authentication...................................................................................................................................106
Conguring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication.............................107
MAC Authentication Bypass......................................................................................................................................... 108
MAB in Single-host and Multi-Host Mode............................................................................................................108
MAB in Multi-Supplicant Authentication Mode....................................................................................................109
Conguring MAC Authentication Bypass..............................................................................................................109
Dynamic CoS with 802.1X.............................................................................................................................................. 110
6 Access Control Lists (ACLs)........................................................................................................................112
IP Access Control Lists (ACLs)......................................................................................................................................112
CAM Usage................................................................................................................................................................113
Contents
5
User-Congurable CAM Allocation......................................................................................................................... 114
Allocating CAM for Ingress ACLs on the Port Extender...................................................................................... 114
Allocating CAM for Egress ACLs on the Port Extender....................................................................................... 116
Implementing ACLs .................................................................................................................................................. 117
IP Fragment Handling..................................................................................................................................................... 118
IP Fragments ACL Examples................................................................................................................................... 118
Layer 4 ACL Rules Examples................................................................................................................................... 119
Congure a Standard IP ACL........................................................................................................................................120
Conguring a Standard IP ACL Filter......................................................................................................................121
Congure an Extended IP ACL......................................................................................................................................121
Conguring Filters with a Sequence Number....................................................................................................... 122
Conguring Filters Without a Sequence Number.................................................................................................123
Congure Layer 2 and Layer 3 ACLs............................................................................................................................123
Using ACL VLAN Groups...............................................................................................................................................124
Guidelines for Conguring ACL VLAN Groups......................................................................................................124
Conguring an ACL VLAN Group...........................................................................................................................125
Allocating ACL VLAN CAM..................................................................................................................................... 126
Applying an IP ACL to an Interface.............................................................................................................................. 126
Applying Ingress ACLs on the Port Extender........................................................................................................ 127
Applying Egress ACLs.............................................................................................................................................. 128
Applying Layer 3 Egress ACLs on Control-Plane Trac...................................................................................... 128
Counting ACL Hits....................................................................................................................................................129
IP Prex Lists.................................................................................................................................................................. 129
Implementation Information.................................................................................................................................... 129
Conguration Task List for Prex Lists.................................................................................................................. 130
ACL Resequencing......................................................................................................................................................... 133
Resequencing an ACL or Prex List.......................................................................................................................134
Route Maps.....................................................................................................................................................................135
Implementation Information.................................................................................................................................... 135
Important Points to Remember.................................................................................................................................... 135
Conguration Task List for Route Maps................................................................................................................ 135
Conguring Match Routes...................................................................................................................................... 138
Conguring Set Conditions..................................................................................................................................... 139
Congure a Route Map for Route Redistribution.................................................................................................140
Congure a Route Map for Route Tagging........................................................................................................... 140
Continue Clause........................................................................................................................................................ 141
Conguring a UDF ACL.................................................................................................................................................. 141
Hot-Lock Behavior......................................................................................................................................................... 143
7 Bidirectional Forwarding Detection (BFD).................................................................................................. 144
How BFD Works............................................................................................................................................................. 144
BFD Packet Format..................................................................................................................................................145
BFD Sessions............................................................................................................................................................ 146
BFD Three-Way Handshake.................................................................................................................................... 147
Session State Changes............................................................................................................................................149
Important Points to Remember.................................................................................................................................... 149
6
Contents
Congure BFD................................................................................................................................................................ 149
Congure BFD for Physical Ports.......................................................................................................................... 150
Congure BFD for Static Routes.............................................................................................................................151
Congure BFD for OSPF.........................................................................................................................................154
Congure BFD for OSPFv3.....................................................................................................................................159
Congure BFD for IS-IS...........................................................................................................................................162
Congure BFD for BGP...........................................................................................................................................165
Congure BFD for VRRP..........................................................................................................................................171
Conguring Protocol Liveness.................................................................................................................................174
8 Border Gateway Protocol IPv4 (BGPv4).....................................................................................................175
Autonomous Systems (AS)........................................................................................................................................... 175
Sessions and Peers.........................................................................................................................................................177
Establish a Session....................................................................................................................................................177
Route Reectors.............................................................................................................................................................178
Communities............................................................................................................................................................. 179
BGP Attributes................................................................................................................................................................179
Best Path Selection Criteria.................................................................................................................................... 179
Weight.........................................................................................................................................................................181
Local Preference........................................................................................................................................................181
Multi-Exit Discriminators (MEDs)...........................................................................................................................182
Origin..........................................................................................................................................................................183
AS Path......................................................................................................................................................................183
Next Hop................................................................................................................................................................... 184
Multiprotocol BGP..........................................................................................................................................................184
Implement BGP ..............................................................................................................................................................184
Additional Path (Add-Path) Support......................................................................................................................184
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 185
Ignore Router-ID for Some Best-Path Calculations............................................................................................. 185
Four-Byte AS Numbers........................................................................................................................................... 185
AS4 Number Representation.................................................................................................................................. 186
AS Number Migration...............................................................................................................................................187
BGP4 Management Information Base (MIB)........................................................................................................189
Important Points to Remember.............................................................................................................................. 189
Conguration Information............................................................................................................................................. 190
BGP Conguration......................................................................................................................................................... 190
Enabling BGP.............................................................................................................................................................191
Conguring AS4 Number Representations........................................................................................................... 194
Conguring Peer Groups.........................................................................................................................................195
Conguring BGP Fast Fail-Over.............................................................................................................................198
Conguring Passive Peering................................................................................................................................... 199
Maintaining Existing AS Numbers During an AS Migration................................................................................ 200
Allowing an AS Number to Appear in its Own AS Path....................................................................................... 201
Enabling Neighbor Graceful Restart......................................................................................................................202
Filtering on an AS-Path Attribute...........................................................................................................................202
Regular Expressions as Filters................................................................................................................................204
Contents
7
Redistributing Routes..............................................................................................................................................205
Enabling Additional Paths....................................................................................................................................... 206
Conguring IP Community Lists............................................................................................................................ 206
Conguring an IP Extended Community List....................................................................................................... 207
Filtering Routes with Community Lists................................................................................................................. 208
Manipulating the COMMUNITY Attribute............................................................................................................209
Changing MED Attributes....................................................................................................................................... 210
Changing the LOCAL_PREFERENCE Attribute.................................................................................................. 210
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes.............. 211
Changing the WEIGHT Attribute............................................................................................................................212
Enabling Multipath....................................................................................................................................................212
Filtering BGP Routes................................................................................................................................................212
Filtering BGP Routes Using Route Maps...............................................................................................................214
Filtering BGP Routes Using AS-PATH Information.............................................................................................. 214
Conguring BGP Route Reectors........................................................................................................................ 215
Aggregating Routes..................................................................................................................................................216
Conguring BGP Confederations...........................................................................................................................216
Enabling Route Flap Dampening............................................................................................................................. 217
Changing BGP Timers..............................................................................................................................................219
Enabling BGP Neighbor Soft-Reconguration..................................................................................................... 219
Enabling or disabling BGP neighbors.....................................................................................................................220
Route Map Continue............................................................................................................................................... 222
Enabling MBGP Congurations................................................................................................................................... 222
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor......................................... 223
BGP Regular Expression Optimization........................................................................................................................ 223
Debugging BGP..............................................................................................................................................................223
Storing Last and Bad PDUs....................................................................................................................................224
Capturing PDUs....................................................................................................................................................... 225
PDU Counters.......................................................................................................................................................... 226
Sample Congurations.................................................................................................................................................. 226
9 Content Addressable Memory (CAM)........................................................................................................ 235
CAM Allocation.............................................................................................................................................................. 235
Test CAM Usage............................................................................................................................................................ 237
View CAM-ACL Settings...............................................................................................................................................237
View CAM Usage...........................................................................................................................................................238
Return to the Default CAM Conguration..................................................................................................................238
CAM Optimization......................................................................................................................................................... 239
Applications for CAM Proling..................................................................................................................................... 239
LAG HashingLAG Hashing Based on Bidirectional Flow..................................................................................... 239
Unied Forwarding Table (UFT) Modes......................................................................................................................239
Conguring UFT Modes..........................................................................................................................................240
10 Control Plane Policing (CoPP).................................................................................................................. 241
CoPP Implementation.................................................................................................................................................... 241
Protocol-based Control Plane Policing...................................................................................................................241
8
Contents
Queue-based Control Plane Policing......................................................................................................................241
CoPP Example................................................................................................................................................................243
Congure Control Plane Policing................................................................................................................................. 244
Conguring CoPP for Protocols.............................................................................................................................244
Examples of Conguring CoPP for Protocols...................................................................................................... 245
Conguring CoPP for CPU Queues...................................................................................................................... 246
Examples of Conguring CoPP for CPU Queues................................................................................................ 247
Displaying CoPP Conguration.............................................................................................................................. 248
Troubleshooting CoPP Operation................................................................................................................................. 251
Enabling CPU Trac Statistics............................................................................................................................... 251
Viewing CPU Trac Statistics................................................................................................................................ 251
Troubleshooting CPU Packet Loss........................................................................................................................ 252
Viewing Per-Protocol CoPP Counters.................................................................................................................. 253
Viewing Per-Queue CoPP Counters..................................................................................................................... 256
11 Data Center Bridging (DCB)......................................................................................................................257
Enabling Data Center Bridging..................................................................................................................................... 257
Ethernet Enhancements in Data Center Bridging..................................................................................................... 258
Priority-Based Flow Control................................................................................................................................... 259
Enhanced Transmission Selection..........................................................................................................................260
Data Center Bridging Exchange Protocol (DCBx)............................................................................................... 261
Data Center Bridging in a Trac Flow................................................................................................................... 261
QoS dot1p Trac Classication and Queue Assignment..........................................................................................262
SNMP Support for PFC and Buer Statistics Tracking............................................................................................262
DCB Maps and its Attributes........................................................................................................................................263
DCB Map: Conguration Procedure......................................................................................................................263
Important Points to Remember............................................................................................................................. 264
Applying a DCB Map on a Port.............................................................................................................................. 264
Conguring PFC without a DCB Map...................................................................................................................265
Conguring Lossless Queues................................................................................................................................. 265
Applying a DCB Map on a Line Card......................................................................................................................267
Data Center Bridging: Default Conguration..............................................................................................................267
Conguration Notes: PFC and ETS in a DCB Map....................................................................................................268
PFC Conguration Notes........................................................................................................................................268
ETS Conguration Notes........................................................................................................................................269
ETS Prerequisites and Restrictions....................................................................................................................... 269
Priority-Group Conguration Notes.......................................................................................................................270
Conguring Priority-Based Flow Control.................................................................................................................... 270
Conguring Lossless Queues.................................................................................................................................. 271
Conguring Enhanced Transmission Selection........................................................................................................... 271
Creating an ETS Priority Group..............................................................................................................................272
ETS Operation with DCBx...................................................................................................................................... 273
Congure a DCBx Operation........................................................................................................................................ 273
DCBx Operation....................................................................................................................................................... 273
DCBx Port Roles.......................................................................................................................................................274
DCB Conguration Exchange.................................................................................................................................275
Contents
9
Conguration Source Election................................................................................................................................275
Propagation of DCB Information............................................................................................................................276
Auto-Detection and Manual Conguration of the DCBx Version.......................................................................276
Behavior of Tagged Packets................................................................................................................................... 277
Conguration Example for DSCP and PFC Priorities.......................................................................................... 277
DCBx Example..........................................................................................................................................................278
DCBx Prerequisites and Restrictions.....................................................................................................................279
Conguring DCBx.................................................................................................................................................... 279
Verifying the DCB Conguration..................................................................................................................................282
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................292
PFC and ETS Conguration Examples........................................................................................................................292
Using PFC and ETS to Manage Data Center Trac................................................................................................. 293
PFC and ETS Conguration Command Examples...............................................................................................294
Using PFC and ETS to Manage Converged Ethernet Trac.............................................................................294
Hierarchical Scheduling in ETS Output Policies...................................................................................................295
Priority-Based Flow Control Using Dynamic Buer Method................................................................................... 295
Pause and Resume of Trac..................................................................................................................................295
Buer Sizes for Lossless or PFC Packets............................................................................................................ 296
Conguring the Dynamic Buer Method................................................................................................................... 296
12 Debugging and Diagnostics...................................................................................................................... 298
Oine Diagnostics.........................................................................................................................................................298
Running Port Extender Oine Diagnostics on the Switch.................................................................................298
Running Oine Diagnostics on a Standalone Switch......................................................................................... 305
TRACE Logs................................................................................................................................................................... 325
Auto Save on Reload, Crash, or Rollover.............................................................................................................. 326
Uploading Trace Logs.............................................................................................................................................. 326
Last Restart Reason......................................................................................................................................................326
show hardware Commands.......................................................................................................................................... 327
Environmental Monitoring.............................................................................................................................................329
Displaying Port Extender Environment Information ........................................................................................... 329
Display Power Supply Status..................................................................................................................................329
Display Fan Status................................................................................................................................................... 330
Display Transceiver Type.........................................................................................................................................330
Recognize an Over-Temperature Condition..........................................................................................................332
Troubleshoot an Over-Temperature Condition..................................................................................................... 333
Troubleshooting Packet Loss........................................................................................................................................335
Displaying Drop Counters........................................................................................................................................335
Displaying Dataplane Statistics.............................................................................................................................. 336
Displaying Line-Card Counters...............................................................................................................................338
Accessing Application Core Dumps.............................................................................................................................338
Mini Core Dumps........................................................................................................................................................... 339
Full Kernel Core Dumps.................................................................................................................................................340
Enabling TCP Dumps.....................................................................................................................................................340
Accessing Port Extender Core and Mini Core Dumps............................................................................................... 341
10
Contents
13 Dynamic Host Conguration Protocol (DHCP)......................................................................................... 342
DHCP Packet Format and Options............................................................................................................................. 342
Assign an IP Address using DHCP...............................................................................................................................344
Implementation Information..........................................................................................................................................345
Congure the System to be a DHCP Server............................................................................................................. 345
Conguring the Server for Automatic Address Allocation..................................................................................346
Specifying a Default Gateway................................................................................................................................ 347
Congure a Method of Hostname Resolution......................................................................................................347
Using DNS for Address Resolution........................................................................................................................ 347
Using NetBIOS WINS for Address Resolution..................................................................................................... 348
Creating Manual Binding Entries............................................................................................................................348
Debugging the DHCP Server................................................................................................................................. 348
Using DHCP Clear Commands.............................................................................................................................. 349
Congure the System to be a Relay Agent................................................................................................................ 349
Congure the System to be a DHCP Client................................................................................................................351
DHCP Client on a Management Interface.............................................................................................................351
DHCP Client Operation with Other Features........................................................................................................351
Congure Secure DHCP...............................................................................................................................................352
Option 82..................................................................................................................................................................352
DHCP Snooping.......................................................................................................................................................353
Drop DHCP Packets on Snooped VLANs Only....................................................................................................355
Dynamic ARP Inspection........................................................................................................................................ 356
Conguring Dynamic ARP Inspection................................................................................................................... 357
Source Address Validation............................................................................................................................................ 358
Enabling IP Source Address Validation..................................................................................................................358
DHCP MAC Source Address Validation................................................................................................................ 359
Enabling IP+MAC Source Address Validation.......................................................................................................359
Viewing the Number of SAV Dropped Packets................................................................................................... 359
Clearing the Number of SAV Dropped Packets...................................................................................................360
14 Equal Cost Multi-Path (ECMP).................................................................................................................361
ECMP for Flow-Based Anity......................................................................................................................................361
Enabling Deterministic ECMP Next Hop............................................................................................................... 361
Conguring the Hash Algorithm Seed................................................................................................................... 361
Link Bundle Monitoring........................................................................................................................................... 362
Managing ECMP Group Paths.....................................................................................................................................362
Creating an ECMP Group Bundle................................................................................................................................363
Modifying the ECMP Group Threshold.......................................................................................................................363
BGP Multipath Operation with Link Bankwidth.........................................................................................................364
Dynamic Re-calculation of Link Bankwidth................................................................................................................ 365
Weighted ECMP for Static Routes..............................................................................................................................366
ECMP Support in L3 Host and LPM Tables...............................................................................................................366
15 FCoE Transit.............................................................................................................................................367
Fibre Channel over Ethernet........................................................................................................................................ 367
Contents
11
Ensure Robustness in a Converged Ethernet Network............................................................................................ 367
FIP Snooping on Ethernet Bridges..............................................................................................................................369
FIP Snooping in a Switch Stack....................................................................................................................................371
Using FIP Snooping........................................................................................................................................................ 371
FIP Snooping Prerequisites......................................................................................................................................371
Important Points to Remember.............................................................................................................................. 371
Enabling the FCoE Transit Feature........................................................................................................................ 372
Enable FIP Snooping on VLANs............................................................................................................................. 372
Congure the FC-MAP Value.................................................................................................................................372
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 373
Congure a Port for a Bridge-to-FCF Link........................................................................................................... 373
Impact on Other Software Features......................................................................................................................373
FIP Snooping Restrictions.......................................................................................................................................373
Conguring FIP Snooping............................................................................................................................................. 374
Displaying FIP Snooping Information...........................................................................................................................375
FCoE Transit Conguration Example.......................................................................................................................... 380
16 FIPS Cryptography...................................................................................................................................382
Conguration Tasks....................................................................................................................................................... 382
Preparing the System....................................................................................................................................................382
Enabling FIPS Mode...................................................................................................................................................... 383
Generating Host-Keys...................................................................................................................................................383
Monitoring FIPS Mode Status......................................................................................................................................383
Disabling FIPS Mode..................................................................................................................................................... 384
17 Flex Hash and Optimized Boot-Up............................................................................................................385
Flex Hash Capability Overview.................................................................................................................................... 385
Conguring the Flex Hash Mechanism.......................................................................................................................385
LACP Fast Switchover..................................................................................................................................................386
Conguring LACP Fast Switchover............................................................................................................................ 386
LACP............................................................................................................................................................................... 386
LACP Fast Switchover............................................................................................................................................386
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 386
Sample Congurations.................................................................................................................................................. 388
................................................................................................................................................................................... 388
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.......................................................................................391
18 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 392
Protocol Overview......................................................................................................................................................... 392
Ring Status............................................................................................................................................................... 393
Multiple FRRP Rings................................................................................................................................................393
Important FRRP Points...........................................................................................................................................394
Implementing FRRP.................................................................................................................................................394
Important FRRP Concepts.....................................................................................................................................395
FRRP Conguration...................................................................................................................................................... 396
Creating the FRRP Group...................................................................................................................................... 396
12
Contents
Conguring the Control VLAN...............................................................................................................................396
Conguring and Adding the Member VLANs.......................................................................................................397
Setting the FRRP Timers........................................................................................................................................398
Clearing the FRRP Counters..................................................................................................................................399
Viewing the FRRP Conguration...........................................................................................................................399
Viewing the FRRP Information.............................................................................................................................. 399
Troubleshooting FRRP.................................................................................................................................................. 399
Conguration Checks..............................................................................................................................................399
Sample Conguration and Topology............................................................................................................................400
FRRP Support on VLT................................................................................................................................................... 401
Example Scenario.................................................................................................................................................... 402
Important Points to Remember............................................................................................................................. 403
19 GARP VLAN Registration Protocol (GVRP)..............................................................................................404
Important Points to Remember................................................................................................................................... 404
Congure GVRP............................................................................................................................................................ 405
Related Conguration Tasks...................................................................................................................................405
Enabling GVRP Globally................................................................................................................................................406
Enabling GVRP on a Layer 2 Interface........................................................................................................................406
Congure GVRP Registration...................................................................................................................................... 406
Congure a GARP Timer...............................................................................................................................................407
20 High Availability (HA)...............................................................................................................................408
High Availability on Chassis.......................................................................................................................................... 408
High Availability in a PE Stack......................................................................................................................................408
Online Insertion and Removal.......................................................................................................................................409
RPM Online Insertion.............................................................................................................................................. 409
Line Card Online Insertion.......................................................................................................................................409
Pre-conguring a Slot for a Line-Card Type.........................................................................................................409
Replacing a Line Card.............................................................................................................................................. 410
Hitless Behavior..............................................................................................................................................................410
Graceful Restart.............................................................................................................................................................. 411
Software Resiliency.........................................................................................................................................................411
System Health Monitoring....................................................................................................................................... 411
Failure and Event Logging........................................................................................................................................ 411
Trace Log....................................................................................................................................................................411
Core Dumps...............................................................................................................................................................412
System Log................................................................................................................................................................412
Control Plane Redundancy............................................................................................................................................412
Control-Plane Failover..............................................................................................................................................412
RPM Synchronization.............................................................................................................................................. 413
Forcing an RPM Failover......................................................................................................................................... 413
Specifying an Auto-Failover Limit...........................................................................................................................414
Disabling Auto-Reboot............................................................................................................................................. 414
21 Internet Group Management Protocol (IGMP)..........................................................................................415
Contents
13
IGMP Implementation Information............................................................................................................................... 415
IGMP Protocol Overview...............................................................................................................................................415
IGMP Version 2.........................................................................................................................................................415
IGMP Version 3.........................................................................................................................................................417
Congure IGMP............................................................................................................................................................. 420
Related Conguration Tasks...................................................................................................................................420
Viewing IGMP Enabled Interfaces................................................................................................................................421
Selecting an IGMP Version............................................................................................................................................421
Viewing IGMP Groups....................................................................................................................................................421
Enabling IGMP Immediate-Leave.................................................................................................................................422
IGMP Snooping..............................................................................................................................................................422
IGMP Snooping Implementation Information....................................................................................................... 422
Conguring IGMP Snooping...................................................................................................................................422
Removing a Group-Port Association..................................................................................................................... 423
Disabling Multicast Flooding...................................................................................................................................424
Specifying a Port as Connected to a Multicast Router.......................................................................................424
Conguring the Switch as Querier........................................................................................................................ 424
Fast Convergence after MSTP Topology Changes...................................................................................................425
Designating a Multicast Router Interface................................................................................................................... 425
22 Interfaces................................................................................................................................................ 426
Basic Interface Conguration.......................................................................................................................................426
Advanced Interface Conguration...............................................................................................................................426
Port Numbering..............................................................................................................................................................427
Interface Types...............................................................................................................................................................430
View Basic Interface Information.................................................................................................................................430
Resetting an Interface to its Factory Default State...................................................................................................436
Enabling a Physical Interface........................................................................................................................................436
Physical Interfaces.........................................................................................................................................................437
Port Pipes................................................................................................................................................................. 437
Setting the Speed of Ethernet Interfaces.............................................................................................................437
Conguration Task List for Physical Interfaces.................................................................................................... 438
Overview of Layer Modes...................................................................................................................................... 438
Conguring Layer 2 (Data Link) Mode..................................................................................................................439
Conguring Layer 2 (Interface) Mode.................................................................................................................. 439
Conguring Layer 3 (Network) Mode...................................................................................................................439
Conguring Layer 3 (Interface) Mode.................................................................................................................. 440
Egress Interface Selection (EIS)...................................................................................................................................441
Important Points to Remember.............................................................................................................................. 441
Conguring EIS.........................................................................................................................................................441
Management Interfaces................................................................................................................................................442
Conguring a Dedicated Management Interface ................................................................................................442
Conguring a Management Interface on an Ethernet Port................................................................................443
Port Extender Interfaces...............................................................................................................................................444
VLAN Interfaces.............................................................................................................................................................444
Loopback Interfaces...................................................................................................................................................... 445
14
Contents
Null Interfaces................................................................................................................................................................ 445
Port Channel Interfaces................................................................................................................................................446
Port Channel Denition and Standards.................................................................................................................446
Port Channel Benets.............................................................................................................................................446
Port Channel Implementation.................................................................................................................................446
10/40 Gbps Interfaces in Port Channels...............................................................................................................447
Conguration Tasks for Port Channel Interfaces................................................................................................. 447
Creating a Port Channel..........................................................................................................................................447
Adding a Physical Interface to a Port Channel.....................................................................................................448
Reassigning an Interface to a New Port Channel................................................................................................450
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 450
Adding or Removing a Port Channel from a VLAN.............................................................................................. 451
Assigning an IP Address to a Port Channel........................................................................................................... 451
Deleting or Disabling a Port Channel......................................................................................................................451
Load Balancing Through Port Channels................................................................................................................452
Changing the Hash Algorithm................................................................................................................................452
Bulk Conguration......................................................................................................................................................... 453
Interface Range........................................................................................................................................................453
Bulk Conguration Examples..................................................................................................................................453
Dening Interface Range Macros................................................................................................................................455
Dene the Interface Range.................................................................................................................................... 455
Choosing an Interface-Range Macro.................................................................................................................... 455
Monitoring and Maintaining Interfaces....................................................................................................................... 455
Maintenance Using TDR.........................................................................................................................................456
Displaying Trac Statistics on HiGig Ports.................................................................................................................457
Link Bundle Monitoring..................................................................................................................................................457
Monitoring HiGig Link Bundles.....................................................................................................................................458
Guidelines for Monitoring HiGig Link-Bundles .....................................................................................................459
Enabling HiGig Link-Bundle Monitoring................................................................................................................ 459
Non Dell-Qualied Transceivers................................................................................................................................... 460
Splitting QSFP Ports to SFP+ Ports............................................................................................................................461
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port.............................................................................461
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................462
Link Dampening..............................................................................................................................................................463
Important Points to Remember............................................................................................................................. 463
Enabling Link Dampening........................................................................................................................................463
Using Ethernet Pause Frames for Flow Control........................................................................................................465
Threshold Settings.................................................................................................................................................. 465
Enabling Pause Frames...........................................................................................................................................466
Congure the MTU Size on an Interface....................................................................................................................466
Auto-Negotiation on Ethernet Interfaces................................................................................................................... 467
Set Auto-Negotiation Options............................................................................................................................... 468
Provisioning Combo Ports............................................................................................................................................ 468
View Advanced Interface Information.........................................................................................................................469
Conguring the Interface Sampling Size...............................................................................................................470
Contents
15
Conguring the Trac Sampling Size Globally........................................................................................................... 471
Dynamic Counters..........................................................................................................................................................472
Clearing Interface Counters....................................................................................................................................472
23 Internet Protocol Security (IPSec)...........................................................................................................474
Conguring IPSec ......................................................................................................................................................... 474
24 IPv4 Routing............................................................................................................................................ 476
IP Addresses................................................................................................................................................................... 476
Implementation Information....................................................................................................................................476
Conguration Tasks for IP Addresses..........................................................................................................................477
Assigning IP Addresses to an Interface....................................................................................................................... 477
Conguring Static Routes.............................................................................................................................................478
Congure Static Routes for the Management Interface.......................................................................................... 479
Enabling Directed Broadcast........................................................................................................................................ 479
Resolution of Host Names............................................................................................................................................480
Enabling Dynamic Resolution of Host Names............................................................................................................480
Specifying the Local System Domain and a List of Domains................................................................................... 480
Conguring DNS with Traceroute................................................................................................................................ 481
ARP..................................................................................................................................................................................482
Conguration Tasks for ARP.................................................................................................................................. 482
Conguring Static ARP Entries..............................................................................................................................482
Conguring ARP Inspection Trust......................................................................................................................... 483
Conguring ARP Timeout.......................................................................................................................................483
Enabling Proxy ARP.................................................................................................................................................484
Clearing ARP Cache................................................................................................................................................484
ARP Learning via Gratuitous ARP..........................................................................................................................484
Enabling ARP Learning via Gratuitous ARP..........................................................................................................485
ARP Learning via ARP Request............................................................................................................................. 485
Conguring ARP Retries.........................................................................................................................................486
ICMP............................................................................................................................................................................... 486
Conguration Tasks for ICMP................................................................................................................................486
Enabling ICMP Unreachable Messages................................................................................................................ 486
25 IPv6 Routing............................................................................................................................................488
Protocol Overview......................................................................................................................................................... 488
Extended Address Space........................................................................................................................................489
Stateless Autoconguration................................................................................................................................... 489
IPv6 Headers............................................................................................................................................................489
IPv6 Header Fields.................................................................................................................................................. 490
Extension Header Fields..........................................................................................................................................492
IPv6 Addressing....................................................................................................................................................... 493
IPv6 Implementation on the Dell Networking OS......................................................................................................494
Conguring the LPM Table for IPv6 Extended Prexes...........................................................................................495
ICMPv6...........................................................................................................................................................................495
Path MTU Discovery.....................................................................................................................................................496
16
Contents
IPv6 Neighbor Discovery..............................................................................................................................................496
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................497
Conguring the IPv6 Recursive DNS Server........................................................................................................497
Secure Shell (SSH) Over an IPv6 Transport..............................................................................................................499
Conguration Tasks for IPv6........................................................................................................................................499
Adjusting Your CAM Prole.................................................................................................................................... 499
Assigning an IPv6 Address to an Interface...........................................................................................................500
Assigning a Static IPv6 Route.................................................................................................................................501
Conguring Telnet with IPv6.................................................................................................................................. 501
SNMP over IPv6...................................................................................................................................................... 501
Displaying IPv6 Information....................................................................................................................................502
Displaying an IPv6 Conguration...........................................................................................................................502
Displaying IPv6 Routes............................................................................................................................................503
Displaying the Running Conguration for an Interface....................................................................................... 504
Clearing IPv6 Routes...............................................................................................................................................504
Disabling ND Entry Timeout...................................................................................................................................505
Conguring IPv6 RA Guard..........................................................................................................................................505
Conguring IPv6 RA Guard on an Interface......................................................................................................... 507
Monitoring IPv6 RA Guard......................................................................................................................................507
26 Intermediate System to Intermediate System.......................................................................................... 509
IS-IS Protocol Overview............................................................................................................................................... 509
IS-IS Addressing............................................................................................................................................................ 509
Multi-Topology IS-IS....................................................................................................................................................... 510
Transition Mode........................................................................................................................................................ 510
Interface Support...................................................................................................................................................... 511
Adjacencies................................................................................................................................................................ 511
Graceful Restart.............................................................................................................................................................. 511
Timers......................................................................................................................................................................... 511
Implementation Information........................................................................................................................................... 511
Conguration Information..............................................................................................................................................512
Conguration Tasks for IS-IS.................................................................................................................................. 513
Conguring the Distance of a Route.....................................................................................................................520
Changing the IS-Type...............................................................................................................................................521
Redistributing IPv4 Routes.....................................................................................................................................523
Redistributing IPv6 Routes.....................................................................................................................................524
Conguring Authentication Passwords.................................................................................................................525
Setting the Overload Bit......................................................................................................................................... 525
Debugging IS-IS....................................................................................................................................................... 526
IS-IS Metric Styles.........................................................................................................................................................527
Congure Metric Values................................................................................................................................................527
Maximum Values in the Routing Table.................................................................................................................. 528
Change the IS-IS Metric Style in One Level Only................................................................................................528
Leaks from One Level to Another..........................................................................................................................529
Sample Congurations..................................................................................................................................................530
Contents
17
27 iSCSI Optimization...................................................................................................................................533
iSCSI Optimization Overview....................................................................................................................................... 533
Default iSCSI Optimization Values...............................................................................................................................535
iSCSI Optimization Prerequisites................................................................................................................................. 536
Conguring iSCSI Optimization................................................................................................................................... 536
Displaying iSCSI Optimization Information................................................................................................................. 538
Enable and Disable iSCSI Optimization.......................................................................................................................539
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.......................................................................540
Monitoring iSCSI Trac Flows.....................................................................................................................................540
Information Monitored in iSCSI Trac Flows.............................................................................................................540
Detection and Auto-Conguration for Dell EqualLogic Arrays..................................................................................541
Conguring Detection and Ports for Dell Compellent Arrays....................................................................................541
Application of Quality of Service to iSCSI Trac Flows........................................................................................... 542
28 Link Aggregation Control Protocol (LACP).............................................................................................. 543
Introduction to Dynamic LAGs and LACP.................................................................................................................. 543
Important Points to Remember............................................................................................................................. 543
LACP Modes............................................................................................................................................................ 544
Conguring LACP Commands...............................................................................................................................544
LACP Conguration Tasks............................................................................................................................................545
Creating a LAG.........................................................................................................................................................545
Conguring the LAG Interfaces as Dynamic........................................................................................................545
Setting the LACP Long Timeout........................................................................................................................... 546
Monitoring and Debugging LACP..........................................................................................................................546
Shared LAG State Tracking.......................................................................................................................................... 547
Conguring Shared LAG State Tracking............................................................................................................... 547
Important Points about Shared LAG State Tracking...........................................................................................549
LACP Basic Conguration Example............................................................................................................................ 549
Congure a LAG on ALPHA................................................................................................................................... 549
29 Layer 2.....................................................................................................................................................557
Manage the MAC Address Table................................................................................................................................. 557
Clearing the MAC Address Table........................................................................................................................... 557
Setting the Aging Time for Dynamic Entries........................................................................................................557
Conguring a Static MAC Address........................................................................................................................558
Displaying the MAC Address Table........................................................................................................................558
MAC Learning Limit.......................................................................................................................................................558
Setting the MAC Learning Limit............................................................................................................................ 559
mac learning-limit Dynamic.................................................................................................................................... 559
mac learning-limit mac-address-sticky................................................................................................................. 559
mac learning-limit station-move............................................................................................................................ 560
mac learning-limit no-station-move...................................................................................................................... 560
Learning Limit Violation Actions.............................................................................................................................560
Setting Station Move Violation Actions................................................................................................................560
Recovering from Learning Limit and Station Move Violations............................................................................561
18
Contents
Disabling MAC Address Learning on the System................................................................................................. 561
NIC Teaming................................................................................................................................................................... 562
Congure Redundant Pairs.......................................................................................................................................... 563
Important Points about Conguring Redundant Pairs........................................................................................565
Far-End Failure Detection.............................................................................................................................................566
FEFD State Changes...............................................................................................................................................567
Conguring FEFD.................................................................................................................................................... 568
Enabling FEFD on an Interface.............................................................................................................................. 568
Debugging FEFD......................................................................................................................................................569
30 Link Layer Discovery Protocol (LLDP)...................................................................................................... 571
802.1AB (LLDP) Overview.............................................................................................................................................571
Protocol Data Units.................................................................................................................................................. 571
Optional TLVs................................................................................................................................................................. 572
Management TLVs...................................................................................................................................................572
TIA-1057 (LLDP-MED) Overview.................................................................................................................................574
TIA Organizationally Specic TLVs.........................................................................................................................574
Congure LLDP..............................................................................................................................................................578
Related Conguration Tasks................................................................................................................................... 578
Important Points to Remember..............................................................................................................................578
LLDP Compatibility.................................................................................................................................................. 579
CONFIGURATION versus INTERFACE Congurations............................................................................................ 579
Enabling LLDP................................................................................................................................................................580
Disabling and Undoing LLDP..................................................................................................................................580
Enabling LLDP on Management Ports........................................................................................................................580
Disabling and Undoing LLDP on Management Ports..........................................................................................580
Advertising TLVs.............................................................................................................................................................581
Viewing the LLDP Conguration................................................................................................................................. 582
Viewing Information Advertised by Adjacent LLDP Agents..................................................................................... 583
Conguring LLDPDU Intervals..................................................................................................................................... 584
Conguring Transmit and Receive Mode....................................................................................................................584
Conguring a Time to Live........................................................................................................................................... 585
Debugging LLDP............................................................................................................................................................586
Relevant Management Objects................................................................................................................................... 586
31 Multicast Source Discovery Protocol (MSDP)..........................................................................................592
Protocol Overview.........................................................................................................................................................592
Anycast RP.....................................................................................................................................................................593
Implementation Information..........................................................................................................................................594
Congure Multicast Source Discovery Protocol........................................................................................................594
Related Conguration Tasks...................................................................................................................................594
Enable MSDP................................................................................................................................................................. 598
Manage the Source-Active Cache..............................................................................................................................599
Viewing the Source-Active Cache........................................................................................................................ 599
Limiting the Source-Active Cache.........................................................................................................................599
Clearing the Source-Active Cache........................................................................................................................600
Contents
19
Enabling the Rejected Source-Active Cache.......................................................................................................600
Accept Source-Active Messages that Fail the RFP Check..................................................................................... 600
Specifying Source-Active Messages...........................................................................................................................604
Limiting the Source-Active Messages from a Peer...................................................................................................605
Preventing MSDP from Caching a Local Source.......................................................................................................605
Preventing MSDP from Caching a Remote Source.................................................................................................. 606
Preventing MSDP from Advertising a Local Source................................................................................................. 606
Logging Changes in Peership States...........................................................................................................................607
Terminating a Peership..................................................................................................................................................607
Clearing Peer Statistics.................................................................................................................................................608
Debugging MSDP..........................................................................................................................................................608
MSDP with Anycast RP................................................................................................................................................609
Conguring Anycast RP................................................................................................................................................ 610
Reducing Source-Active Message Flooding.......................................................................................................... 611
Specifying the RP Address Used in SA Messages................................................................................................611
MSDP Sample Congurations...................................................................................................................................... 613
32 Multiple Spanning Tree Protocol (MSTP)................................................................................................. 618
Protocol Overview..........................................................................................................................................................618
Spanning Tree Variations............................................................................................................................................... 619
Implementation Information.................................................................................................................................... 619
Congure Multiple Spanning Tree Protocol.................................................................................................................619
Related Conguration Tasks....................................................................................................................................619
Enable Multiple Spanning Tree Globally...................................................................................................................... 620
Adding and Removing Interfaces.................................................................................................................................620
Creating Multiple Spanning Tree Instances................................................................................................................ 620
Inuencing MSTP Root Selection................................................................................................................................ 621
Interoperate with Non-Dell Bridges.............................................................................................................................622
Changing the Region Name or Revision..................................................................................................................... 622
Modifying Global Parameters....................................................................................................................................... 623
Modifying the Interface Parameters............................................................................................................................624
Conguring an EdgePort.............................................................................................................................................. 625
Flush MAC Addresses after a Topology Change....................................................................................................... 626
MSTP Sample Congurations......................................................................................................................................626
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationExample Running-Conguration.....................................................................................................626
Debugging and Verifying MSTP Congurations........................................................................................................ 629
33 Multicast Features....................................................................................................................................631
Enabling IP Multicast......................................................................................................................................................631
Implementation Information.......................................................................................................................................... 631
First Packet Forwarding for Lossless Multicast.........................................................................................................632
Multicast Policies...........................................................................................................................................................632
IPv4 Multicast Policies............................................................................................................................................ 632
Understanding Multicast Traceroute (mtrace).......................................................................................................... 639
Important Points to Remember............................................................................................................................. 640
20
Contents
/