Networking Z9500

Dell Networking Z9500 User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell Networking Z9500 User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Networking Configuration Guide for the
Z9500 Switch
9.8(0.0)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2015 - 05
Rev. A00
Contents
1 About this Guide................................................................................................. 33
Audience..............................................................................................................................................33
Conventions........................................................................................................................................ 33
Related Documents............................................................................................................................ 33
2 Configuration Fundamentals........................................................................... 35
Accessing the Command Line............................................................................................................35
CLI Modes............................................................................................................................................35
Navigating CLI Modes................................................................................................................... 36
The do Command...............................................................................................................................39
Undoing Commands.......................................................................................................................... 40
Obtaining Help.................................................................................................................................... 41
Entering and Editing Commands........................................................................................................41
Command History...............................................................................................................................42
Filtering show Command Outputs.....................................................................................................43
Multiple Users in Configuration Mode............................................................................................... 45
3 Getting Started....................................................................................................46
Console Access...................................................................................................................................46
Serial Console................................................................................................................................47
Default Configuration.........................................................................................................................48
Configuring a Host Name...................................................................................................................48
Accessing the System Remotely........................................................................................................ 49
Accessing the Z9500 Remotely....................................................................................................49
Configure the Management Port IP Address............................................................................... 49
Configure a Management Route..................................................................................................49
Configuring a Username and Password.......................................................................................50
Configuring the Enable Password......................................................................................................50
Manage Configuration Files................................................................................................................ 51
File Storage.....................................................................................................................................51
Copy Files to and from the System...............................................................................................51
Save the Running-Configuration..................................................................................................53
Configure the Overload Bit for a Startup Scenario...................................................................... 53
Using HTTP for File Transfers........................................................................................................53
Changes in Configuration Files.....................................................................................................54
Enabling Software Features on Devices Using a Command Option................................................ 55
View Command History......................................................................................................................56
Upgrading the Dell Networking OS....................................................................................................56
3
Using Hashes to Validate Software Images........................................................................................56
4 Switch Management.......................................................................................... 58
Configuring Privilege Levels............................................................................................................... 58
Creating a Custom Privilege Level................................................................................................58
Removing a Command from EXEC Mode................................................................................... 58
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 59
Allowing Access to CONFIGURATION Mode Commands.......................................................... 59
Allowing Access to the Following Modes.................................................................................... 59
Applying a Privilege Level to a Username.....................................................................................61
Applying a Privilege Level to a Terminal Line............................................................................... 61
Configuring Logging........................................................................................................................... 61
Audit and Security Logs.................................................................................................................62
Configuring Logging Format ...................................................................................................... 64
Setting Up a Secure Connection to a Syslog Server....................................................................65
Track Login Activity.............................................................................................................................66
Restrictions for Tracking Login Activity........................................................................................66
Configuring Login Activity Tracking............................................................................................. 66
Display Login Statistics..................................................................................................................67
Limit Concurrent Login Sessions....................................................................................................... 68
Restrictions for Limiting the Number of Concurrent Sessions................................................... 68
Configuring Concurrent Session Limit.........................................................................................68
Enabling the System to Clear Existing Sessions...........................................................................68
Log Messages in the Internal Buffer...................................................................................................69
Configuration Task List for System Log Management................................................................ 69
Disabling System Logging...................................................................................................................70
Sending System Messages to a Syslog Server....................................................................................70
Configuring a UNIX System as a Syslog Server.............................................................................71
Display the Logging Buffer and the Logging Configuration..............................................................71
Changing System Logging Settings....................................................................................................72
Configuring a UNIX Logging Facility Level.........................................................................................73
Synchronizing Log Messages..............................................................................................................74
Enabling Timestamp on Syslog Messages..........................................................................................74
File Transfer Services...........................................................................................................................75
Configuration Task List for File Transfer Services........................................................................ 75
Enabling the FTP Server.................................................................................................................75
Configuring FTP Server Parameters..............................................................................................76
Configuring FTP Client Parameters.............................................................................................. 76
Terminal Lines......................................................................................................................................77
Denying and Permitting Access to a Terminal Line..................................................................... 77
Configuring Login Authentication for Terminal Lines................................................................. 78
Setting Time Out of EXEC Privilege Mode......................................................................................... 79
4
Using Telnet to Access Another Network Device..............................................................................79
Lock CONFIGURATION Mode........................................................................................................... 80
Viewing the Configuration Lock Status........................................................................................80
Recovering from a Forgotten Password on the Z9500.....................................................................81
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration............ 82
Recovering from a Failed Start on the Z9500....................................................................................82
Restoring Factory-Default Settings.................................................................................................... 83
Important Points to Remember....................................................................................................83
Restoring Factory-Default Boot Environment Variables............................................................. 83
5 802.1X...................................................................................................................86
The Port-Authentication Process.......................................................................................................87
EAP over RADIUS...........................................................................................................................89
Configuring 802.1X............................................................................................................................. 89
Related Configuration Tasks.........................................................................................................89
Important Points to Remember......................................................................................................... 90
Enabling 802.1X................................................................................................................................... 91
Configuring Request Identity Re-Transmissions............................................................................... 92
Configuring a Quiet Period after a Failed Authentication........................................................... 93
Forcibly Authorizing or Unauthorizing a Port....................................................................................94
Re-Authenticating a Port.................................................................................................................... 95
Configuring Timeouts.........................................................................................................................96
Configuring Dynamic VLAN Assignment with Port Authentication.................................................. 97
Guest and Authentication-Fail VLANs................................................................................................98
Configuring a Guest VLAN............................................................................................................99
Configuring an Authentication-Fail VLAN....................................................................................99
6 Access Control Lists (ACLs).............................................................................101
IP Access Control Lists (ACLs).......................................................................................................... 102
CAM Usage.................................................................................................................................. 103
Implementing ACLs ....................................................................................................................104
IP Fragment Handling....................................................................................................................... 105
IP Fragments ACL Examples....................................................................................................... 105
Layer 4 ACL Rules Examples.......................................................................................................106
Configure a Standard IP ACL............................................................................................................ 107
Configuring a Standard IP ACL Filter..........................................................................................108
Configure an Extended IP ACL.........................................................................................................109
Configuring Filters with a Sequence Number............................................................................109
Configuring Filters Without a Sequence Number.......................................................................111
Configure Layer 2 and Layer 3 ACLs.................................................................................................112
Using ACL VLAN Groups................................................................................................................... 112
Guidelines for Configuring ACL VLAN Groups........................................................................... 113
5
Configuring an ACL VLAN Group................................................................................................113
Allocating ACL VLAN CAM...........................................................................................................114
Applying an IP ACL to an Interface................................................................................................... 115
Configure Ingress ACLs............................................................................................................... 116
Configure Egress ACLs................................................................................................................ 116
Applying Egress Layer 3 ACLs (Control-Plane)...........................................................................117
Counting ACL Hits....................................................................................................................... 118
IP Prefix Lists...................................................................................................................................... 118
Implementation Information.......................................................................................................119
Configuration Task List for Prefix Lists........................................................................................119
ACL Resequencing............................................................................................................................ 123
Resequencing an ACL or Prefix List............................................................................................123
Route Maps........................................................................................................................................125
Implementation Information.......................................................................................................125
Important Points to Remember........................................................................................................125
Configuration Task List for Route Maps..................................................................................... 125
Configuring Match Routes..........................................................................................................128
Configuring Set Conditions........................................................................................................ 129
Configure a Route Map for Route Redistribution...................................................................... 130
Configure a Route Map for Route Tagging................................................................................ 131
Continue Clause.......................................................................................................................... 131
Configuring UDF ACL........................................................................................................................132
7 Bare Metal Provisioning (BMP)....................................................................... 135
Enhanced Behavior of the stop bmp Command.............................................................................135
Removal of User-Defined String Parameter in the reload-type Command...................................135
Service Tag Information in the Option 60 String.............................................................................135
8 Bidirectional Forwarding Detection (BFD)...................................................136
How BFD Works................................................................................................................................ 136
BFD Packet Format......................................................................................................................137
BFD Sessions................................................................................................................................139
BFD Three-Way Handshake........................................................................................................139
Session State Changes................................................................................................................140
Important Points to Remember........................................................................................................ 141
Configure BFD................................................................................................................................... 141
Configure BFD for Static Routes.................................................................................................142
Configure BFD for OSPF............................................................................................................. 143
Configure BFD for OSPFv3..........................................................................................................147
Configure BFD for IS-IS.............................................................................................................. 148
Configure BFD for BGP................................................................................................................151
Configure BFD for VRRP............................................................................................................. 158
6
Configuring Protocol Liveness....................................................................................................161
9 Border Gateway Protocol IPv4 (BGPv4).......................................................162
Autonomous Systems (AS)................................................................................................................162
Sessions and Peers............................................................................................................................164
Establish a Session.......................................................................................................................165
Route Reflectors................................................................................................................................166
Communities...............................................................................................................................166
BGP Attributes................................................................................................................................... 167
Best Path Selection Criteria.........................................................................................................167
Weight..........................................................................................................................................169
Local Preference......................................................................................................................... 169
Multi-Exit Discriminators (MEDs)................................................................................................ 170
Origin............................................................................................................................................171
AS Path......................................................................................................................................... 172
Next Hop......................................................................................................................................172
Multiprotocol BGP.............................................................................................................................172
Implement BGP ................................................................................................................................ 173
Additional Path (Add-Path) Support............................................................................................173
Advertise IGP Cost as MED for Redistributed Routes.................................................................173
Ignore Router-ID for Some Best-Path Calculations.................................................................. 174
Four-Byte AS Numbers................................................................................................................174
AS4 Number Representation.......................................................................................................175
AS Number Migration.................................................................................................................. 176
BGP4 Management Information Base (MIB)...............................................................................178
Important Points to Remember..................................................................................................178
Configuration Information................................................................................................................179
BGP Configuration............................................................................................................................ 179
Enabling BGP...............................................................................................................................180
Configuring AS4 Number Representations................................................................................184
Configuring Peer Groups............................................................................................................ 185
Configuring BGP Fast Fail-Over................................................................................................. 188
Configuring Passive Peering.......................................................................................................190
Maintaining Existing AS Numbers During an AS Migration........................................................ 191
Allowing an AS Number to Appear in its Own AS Path..............................................................192
Enabling Neighbor Graceful Restart...........................................................................................193
Filtering on an AS-Path Attribute................................................................................................ 193
Regular Expressions as Filters..................................................................................................... 195
Redistributing Routes..................................................................................................................196
Enabling Additional Paths............................................................................................................197
Configuring IP Community Lists.................................................................................................197
Configuring an IP Extended Community List.............................................................................199
7
Filtering Routes with Community Lists......................................................................................200
Manipulating the COMMUNITY Attribute.................................................................................. 200
Changing MED Attributes........................................................................................................... 202
Changing the LOCAL_PREFERENCE Attribute.......................................................................... 203
Changing the NEXT_HOP Attribute........................................................................................... 203
Changing the WEIGHT Attribute................................................................................................204
Enabling Multipath......................................................................................................................204
Filtering BGP Routes...................................................................................................................205
Filtering BGP Routes Using Route Maps....................................................................................206
Filtering BGP Routes Using AS-PATH Information....................................................................207
Configuring BGP Route Reflectors............................................................................................ 208
Aggregating Routes.................................................................................................................... 208
Configuring BGP Confederations.............................................................................................. 209
Enabling Route Flap Dampening................................................................................................209
Changing BGP Timers................................................................................................................. 212
Enabling BGP Neighbor Soft-Reconfiguration...........................................................................213
Route Map Continue...................................................................................................................214
Enabling MBGP Configurations........................................................................................................ 215
BGP Regular Expression Optimization............................................................................................. 215
Debugging BGP.................................................................................................................................216
Storing Last and Bad PDUs..........................................................................................................217
Capturing PDUs...........................................................................................................................218
PDU Counters..............................................................................................................................219
Sample Configurations..................................................................................................................... 219
10 Content Addressable Memory (CAM).........................................................229
CAM Allocation................................................................................................................................. 229
Test CAM Usage................................................................................................................................ 231
View CAM-ACL Settings....................................................................................................................231
View CAM Usage...............................................................................................................................232
Return to the Default CAM Configuration....................................................................................... 233
CAM Optimization............................................................................................................................ 234
Applications for CAM Profiling......................................................................................................... 234
LAG HashingLAG Hashing Based on Bidirectional Flow........................................................... 234
Unified Forwarding Table (UFT) Modes........................................................................................... 234
Configuring UFT Modes..............................................................................................................235
11 Control Plane Policing (CoPP)..................................................................... 236
Z9500 CoPP Implementation.......................................................................................................... 236
Protocol-based Control Plane Policing.....................................................................................236
Queue-based Control Plane Policing........................................................................................ 237
CoPP Example...................................................................................................................................238
8
Configure Control Plane Policing.................................................................................................... 239
Configuring CoPP for Protocols................................................................................................ 239
Examples of Configuring CoPP for Protocols............................................................................241
Configuring CoPP for CPU Queues...........................................................................................242
Examples of Configuring CoPP for CPU Queues......................................................................243
Displaying CoPP Configuration..................................................................................................243
Troubleshooting CoPP Operation................................................................................................... 247
Enabling CPU Traffic Statistics....................................................................................................247
Viewing CPU Traffic Statistics.....................................................................................................247
Troubleshooting CPU Packet Loss............................................................................................ 248
Viewing Per-Protocol CoPP Counters.......................................................................................250
Viewing Per-Queue CoPP Counters..........................................................................................253
12 Data Center Bridging (DCB)......................................................................... 254
Ethernet Enhancements in Data Center Bridging........................................................................... 254
Priority-Based Flow Control....................................................................................................... 255
Enhanced Transmission Selection............................................................................................. 256
Data Center Bridging Exchange Protocol (DCBx)......................................................................257
Data Center Bridging in a Traffic Flow.......................................................................................258
Priority-Based Flow Control.............................................................................................................258
Enhanced Transmission Selection...................................................................................................260
Data Center Bridging Exchange Protocol (DCBx)........................................................................... 261
Enabling Data Center Bridging......................................................................................................... 261
DCB Maps and its Attributes.......................................................................................................262
Data Center Bridging: Default Configuration.................................................................................. 265
Configuring Priority-Based Flow Control........................................................................................265
Configuring Lossless Queues.....................................................................................................266
Configuring PFC and ETS in a DCB Map......................................................................................... 268
PFC Configuration Notes........................................................................................................... 268
PFC Prerequisites and Restrictions.............................................................................................269
ETS Configuration Notes............................................................................................................269
ETS Prerequisites and Restrictions............................................................................................. 270
Applying a DCB Map on a Port......................................................................................................... 271
Configuring PFC without a DCB Map...............................................................................................271
Configuring Lossless QueuesExample:......................................................................................272
Priority-Based Flow Control Using Dynamic Buffer Method..........................................................274
Pause and Resume of Traffic......................................................................................................274
Buffer Sizes for Lossless or PFC Packets....................................................................................274
Behavior of Tagged Packets............................................................................................................. 275
Operations on Untagged Packets.................................................................................................... 275
Configuration Example for DSCP and PFC Priorities.......................................................................276
SNMP Support for PFC and Buffer Statistics Tracking.....................................................................277
9
Generation of PFC for a Priority for Untagged Packets...................................................................277
Performing PFC Using DSCP Bits Instead of 802.1p Bits................................................................ 278
PFC and ETS Configuration Examples............................................................................................. 279
Using PFC to Manage Converged Ethernet Traffic......................................................................... 279
Configure Enhanced Transmission Selection..................................................................................279
ETS Prerequisites and Restrictions............................................................................................. 279
Creating an ETS Priority Group...................................................................................................279
ETS Operation with DCBx...........................................................................................................281
Configuring Bandwidth Allocation for DCBx CIN......................................................................281
Hierarchical Scheduling in ETS Output Policies..............................................................................282
Applying the DCB Policies on Linecard........................................................................................... 283
Applying DCB Policies on SFM Ports............................................................................................... 283
Using PFC and ETS to Manage Converged Ethernet Traffic...........................................................284
Configure a DCBx Operation...........................................................................................................284
DCBx Operation..........................................................................................................................284
DCBx Port Roles..........................................................................................................................284
DCB Configuration Exchange.................................................................................................... 286
Configuration Source Election................................................................................................... 287
Propagation of DCB Information............................................................................................... 287
Auto-Detection and Manual Configuration of the DCBx Version............................................288
DCBx Example............................................................................................................................ 288
DCBx Prerequisites and Restrictions..........................................................................................289
Configuring DCBx.......................................................................................................................289
Verifying the DCB Configuration..................................................................................................... 293
QoS dot1p Traffic Classification and Queue Assignment...............................................................304
Configuring the Dynamic Buffer Method........................................................................................ 305
Using PFC and ETS to Manage Data Center Traffic........................................................................ 307
PFC and ETS Configuration Command Examples.................................................................... 309
13 Debugging and Diagnostics......................................................................... 310
Offline Diagnostics............................................................................................................................310
Important Points to Remember..................................................................................................310
Running Offline Diagnostics....................................................................................................... 310
Examples of Running Offline Diagnostics.................................................................................. 312
TRACE Logs.......................................................................................................................................320
Auto Save on Reload, Crash, or Rollover...................................................................................320
Last Restart Reason.......................................................................................................................... 320
Line Card Restart Causes and Reasons......................................................................................320
show hardware Commands.............................................................................................................320
Environmental Monitoring................................................................................................................322
Display Power Supply Status.......................................................................................................322
Display Fan Status....................................................................................................................... 323
10
Display Transceiver Type............................................................................................................ 324
Recognize an Over-Temperature Condition.............................................................................326
Troubleshoot an Over-Temperature Condition........................................................................ 327
Troubleshooting Packet Loss...........................................................................................................328
Displaying Drop Counters.......................................................................................................... 329
Displaying Dataplane Statistics................................................................................................... 331
Displaying Line-Card Counters.................................................................................................. 333
Accessing Application Core Dumps.................................................................................................334
Mini Core Dumps.............................................................................................................................. 335
Full Kernel Core Dumps....................................................................................................................335
Enabling TCP Dumps........................................................................................................................336
14 Dynamic Host Configuration Protocol (DHCP)........................................ 337
DHCP Packet Format and Options...................................................................................................337
Assign an IP Address using DHCP....................................................................................................339
Implementation Information............................................................................................................340
Configure the System to be a DHCP Server.................................................................................... 341
Configuring the Server for Automatic Address Allocation........................................................ 341
Specifying a Default Gateway.....................................................................................................343
Configure a Method of Hostname Resolution.......................................................................... 343
Using DNS for Address Resolution.............................................................................................343
Using NetBIOS WINS for Address Resolution............................................................................ 343
Creating Manual Binding Entries................................................................................................344
Debugging the DHCP Server......................................................................................................344
Using DHCP Clear Commands.................................................................................................. 344
Configure the System to be a Relay Agent......................................................................................345
Configure the System to be a DHCP Client.....................................................................................347
DHCP Client on a Management Interface................................................................................. 347
DHCP Client Operation with Other Features............................................................................ 348
Configure Secure DHCP...................................................................................................................348
Option 82.................................................................................................................................... 349
DHCP Snooping..........................................................................................................................349
Drop DHCP Packets on Snooped VLANs Only..........................................................................353
Dynamic ARP Inspection............................................................................................................ 353
Configuring Dynamic ARP Inspection........................................................................................355
Source Address Validation................................................................................................................356
Enabling IP Source Address Validation.......................................................................................356
DHCP MAC Source Address Validation......................................................................................356
Enabling IP+MAC Source Address Validation............................................................................ 357
Viewing the Number of SAV Dropped Packets..........................................................................357
Clearing the Number of SAV Dropped Packets.........................................................................358
11
15 Equal Cost Multi-Path (ECMP)..................................................................... 359
ECMP for Flow-Based Affinity.......................................................................................................... 359
Enabling Deterministic ECMP Next Hop....................................................................................359
Configuring the Hash Algorithm Seed....................................................................................... 359
Link Bundle Monitoring.................................................................................................................... 360
Managing ECMP Group Paths.....................................................................................................361
Creating an ECMP Group Bundle............................................................................................... 361
Modifying the ECMP Group Threshold......................................................................................362
ECMP Support in L3 Host and LPM Tables...................................................................................... 362
16 FCoE Transit.................................................................................................... 364
Fibre Channel over Ethernet............................................................................................................ 364
Ensure Robustness in a Converged Ethernet Network...................................................................364
FIP Snooping on Ethernet Bridges................................................................................................... 366
Using FIP Snooping...........................................................................................................................368
FIP Snooping Prerequisites.........................................................................................................368
Important Points to Remember................................................................................................. 369
Enabling the FCoE Transit Feature............................................................................................. 370
Enable FIP Snooping on VLANs..................................................................................................370
Configure the FC-MAP Value..................................................................................................... 370
Configure a Port for a Bridge-to-Bridge Link............................................................................370
Configure a Port for a Bridge-to-FCF Link.................................................................................371
Impact on Other Software Features........................................................................................... 371
FIP Snooping Restrictions............................................................................................................371
Configuring FIP Snooping...........................................................................................................372
FCoE Transit Configuration Example............................................................................................... 373
Displaying FIP Snooping Information...............................................................................................374
17 Enabling FIPS Cryptography.........................................................................381
Configuration Tasks.......................................................................................................................... 381
Preparing the System........................................................................................................................ 381
Enabling FIPS Mode.......................................................................................................................... 382
Generating Host-Keys...................................................................................................................... 382
Monitoring FIPS Mode Status........................................................................................................... 383
Disabling FIPS Mode......................................................................................................................... 383
18 Flex Hash..........................................................................................................385
Flex Hash Capability Overview......................................................................................................... 385
Configuring the Flex Hash Mechanism............................................................................................385
RDMA Over Converged Ethernet (RoCE) Overview........................................................................386
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces............................................................. 387
12
19 Force10 Resilient Ring Protocol (FRRP).....................................................389
Protocol Overview............................................................................................................................389
Ring Status.................................................................................................................................. 390
Multiple FRRP Rings.....................................................................................................................391
Important FRRP Points................................................................................................................ 391
Important FRRP Concepts..........................................................................................................392
Implementing FRRP.......................................................................................................................... 393
FRRP Configuration.......................................................................................................................... 393
Creating the FRRP Group........................................................................................................... 394
Configuring the Control VLAN...................................................................................................394
Configuring and Adding the Member VLANs.............................................................................395
Setting the FRRP Timers............................................................................................................. 396
Clearing the FRRP Counters....................................................................................................... 397
Viewing the FRRP Configuration................................................................................................ 397
Viewing the FRRP Information....................................................................................................397
Troubleshooting FRRP......................................................................................................................398
Configuration Checks.................................................................................................................398
Sample Configuration and Topology.............................................................................................. 398
20 GARP VLAN Registration Protocol (GVRP)............................................... 400
Important Points to Remember.......................................................................................................400
Configure GVRP................................................................................................................................401
Related Configuration Tasks.......................................................................................................401
Enabling GVRP Globally................................................................................................................... 402
Enabling GVRP on a Layer 2 Interface.............................................................................................402
Configure GVRP Registration...........................................................................................................402
Configure a GARP Timer.................................................................................................................. 403
21 Internet Group Management Protocol (IGMP).........................................405
IGMP Implementation Information..................................................................................................405
IGMP Protocol Overview..................................................................................................................405
IGMP Version 2........................................................................................................................... 405
IGMP Version 3............................................................................................................................407
Configure IGMP................................................................................................................................ 410
Related Configuration Tasks.......................................................................................................410
Viewing IGMP Enabled Interfaces.....................................................................................................411
Selecting an IGMP Version................................................................................................................411
Viewing IGMP Groups.......................................................................................................................412
Adjusting Timers................................................................................................................................412
Adjusting Query and Response Timers...................................................................................... 412
Adjusting the IGMP Querier Timeout Value...............................................................................413
13
Configuring a Static IGMP Group.....................................................................................................413
Enabling IGMP Immediate-Leave.....................................................................................................414
IGMP Snooping................................................................................................................................. 414
IGMP Snooping Implementation Information........................................................................... 414
Configuring IGMP Snooping.......................................................................................................415
Removing a Group-Port Association..........................................................................................415
Disabling Multicast Flooding.......................................................................................................416
Specifying a Port as Connected to a Multicast Router..............................................................416
Configuring the Switch as Querier.............................................................................................416
Fast Convergence after MSTP Topology Changes..........................................................................417
Designating a Multicast Router Interface......................................................................................... 417
22 Interfaces.........................................................................................................418
Basic Interface Configuration...........................................................................................................418
Advanced Interface Configuration................................................................................................... 418
Port Numbering Convention............................................................................................................418
Interface Types..................................................................................................................................419
View Basic Interface Information.....................................................................................................420
Enabling a Physical Interface............................................................................................................421
Physical Interfaces............................................................................................................................ 422
Port Pipes.................................................................................................................................... 422
Network Processing Units (NPUs)..............................................................................................423
Configuration Task List for Physical Interfaces..........................................................................423
Overview of Layer Modes........................................................................................................... 423
Configuring Layer 2 (Data Link) Mode....................................................................................... 424
Configuring Layer 2 (Interface) Mode........................................................................................424
Configuring Layer 3 (Network) Mode........................................................................................ 424
Configuring Layer 3 (Interface) Mode........................................................................................ 425
Egress Interface Selection (EIS)........................................................................................................426
Important Points to Remember................................................................................................. 426
Configuring EIS........................................................................................................................... 426
Management Interfaces....................................................................................................................427
Configuring a Dedicated Management Interface ..................................................................... 427
Configuring a Management Interface on an Ethernet Port...................................................... 428
VLAN Interfaces................................................................................................................................ 429
Loopback Interfaces.........................................................................................................................430
Null Interfaces................................................................................................................................... 431
Port Channel Interfaces.................................................................................................................... 431
Port Channel Definition and Standards......................................................................................431
Port Channel Benefits.................................................................................................................432
Port Channel Implementation....................................................................................................432
10/40 Gbps Interfaces in Port Channels....................................................................................432
14
Configuration Tasks for Port Channel Interfaces...................................................................... 433
Creating a Port Channel............................................................................................................. 433
Adding a Physical Interface to a Port Channel.......................................................................... 434
Reassigning an Interface to a New Port Channel......................................................................436
Configuring the Minimum Oper Up Links in a Port Channel....................................................436
Adding or Removing a Port Channel from a VLAN....................................................................437
Assigning an IP Address to a Port Channel................................................................................ 437
Deleting or Disabling a Port Channel.........................................................................................438
Load Balancing Through Port Channels....................................................................................438
Load-Balancing Methods........................................................................................................... 438
Changing the Hash Algorithm....................................................................................................439
Bulk Configuration........................................................................................................................... 440
Interface Range...........................................................................................................................440
Bulk Configuration Examples.....................................................................................................440
Defining Interface Range Macros.................................................................................................... 442
Define the Interface Range.........................................................................................................443
Choosing an Interface-Range Macro........................................................................................ 443
Monitoring and Maintaining Interfaces............................................................................................443
Displaying Traffic Statistics on HiGig Ports......................................................................................444
Link Bundle Monitoring.................................................................................................................... 445
Monitoring HiGig Link Bundles........................................................................................................ 445
Guidelines for Monitoring HiGig Link-Bundles ........................................................................ 446
Enabling HiGig Link-Bundle Monitoring.................................................................................... 447
Fanning out 40G Ports Dynamically................................................................................................448
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 448
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port......................................................448
Link Dampening................................................................................................................................453
Important Points to Remember................................................................................................. 454
Enabling Link Dampening...........................................................................................................454
Using Ethernet Pause Frames for Flow Control.............................................................................. 456
Enabling Pause Frames...............................................................................................................456
Configure the MTU Size on an Interface......................................................................................... 457
Auto-Negotiation on Ethernet Interfaces........................................................................................458
Set Auto-Negotiation Options................................................................................................... 458
View Advanced Interface Information............................................................................................. 459
Configuring the Interface Sampling Size...................................................................................460
Dynamic Counters............................................................................................................................ 461
Clearing Interface Counters....................................................................................................... 461
23 Internet Protocol Security (IPSec).............................................................. 463
Configuring IPSec ............................................................................................................................464
15
24 IPv4 Routing................................................................................................... 465
IP Addresses......................................................................................................................................465
Implementation Information......................................................................................................465
Configuration Tasks for IP Addresses.............................................................................................. 466
Assigning IP Addresses to an Interface............................................................................................466
Configuring Static Routes.................................................................................................................467
Configure Static Routes for the Management Interface.................................................................468
Enabling Directed Broadcast............................................................................................................469
Resolution of Host Names............................................................................................................... 469
Enabling Dynamic Resolution of Host Names................................................................................ 469
Specifying the Local System Domain and a List of Domains..........................................................470
Configuring DNS with Traceroute................................................................................................... 470
ARP.....................................................................................................................................................471
Configuration Tasks for ARP.............................................................................................................472
Configuring Static ARP Entries......................................................................................................... 472
Enabling Proxy ARP...........................................................................................................................473
Clearing ARP Cache..........................................................................................................................473
ARP Learning via Gratuitous ARP......................................................................................................473
Enabling ARP Learning via Gratuitous ARP...................................................................................... 474
ARP Learning via ARP Request......................................................................................................... 474
Configuring ARP Retries................................................................................................................... 475
ICMP.................................................................................................................................................. 476
Configuration Tasks for ICMP.......................................................................................................... 476
Enabling ICMP Unreachable Messages............................................................................................476
UDP Helper....................................................................................................................................... 476
Configure UDP Helper................................................................................................................476
Important Points to Remember..................................................................................................477
Enabling UDP Helper........................................................................................................................ 477
Configuring a Broadcast Address.....................................................................................................477
Configurations Using UDP Helper................................................................................................... 478
UDP Helper with Broadcast-All Addresses...................................................................................... 478
UDP Helper with Subnet Broadcast Addresses............................................................................... 479
UDP Helper with Configured Broadcast Addresses........................................................................480
UDP Helper with No Configured Broadcast Addresses..................................................................480
Troubleshooting UDP Helper........................................................................................................... 481
25 IPv6 Routing................................................................................................... 482
Protocol Overview............................................................................................................................482
Extended Address Space............................................................................................................ 482
Stateless Autoconfiguration....................................................................................................... 482
IPv6 Headers............................................................................................................................... 483
16
IPv6 Header Fields...................................................................................................................... 484
Extension Header Fields............................................................................................................. 486
IPv6 Addressing...........................................................................................................................487
IPv6 Implementation on the Dell Networking OS.......................................................................... 488
Configuring the LPM Table for IPv6 Extended Prefixes..................................................................490
ICMPv6..............................................................................................................................................490
Path MTU Discovery..........................................................................................................................491
IPv6 Neighbor Discovery.................................................................................................................. 491
IPv6 Neighbor Discovery of MTU Packets.................................................................................492
Configuring the IPv6 Recursive DNS Server.............................................................................. 492
Secure Shell (SSH) Over an IPv6 Transport......................................................................................495
Configuration Tasks for IPv6............................................................................................................495
Adjusting Your CAM Profile........................................................................................................ 495
Assigning an IPv6 Address to an Interface.................................................................................496
Assigning a Static IPv6 Route..................................................................................................... 496
Configuring Telnet with IPv6......................................................................................................497
SNMP over IPv6...........................................................................................................................497
Displaying IPv6 Information....................................................................................................... 498
Displaying an IPv6 Configuration...............................................................................................498
Displaying IPv6 Routes............................................................................................................... 499
Displaying the Running Configuration for an Interface............................................................500
Clearing IPv6 Routes...................................................................................................................501
26 iSCSI Optimization.........................................................................................502
iSCSI Optimization Overview........................................................................................................... 502
Default iSCSI Optimization Values...................................................................................................504
iSCSI Optimization Prerequisites..................................................................................................... 504
Configuring iSCSI Optimization.......................................................................................................504
Displaying iSCSI Optimization Information..................................................................................... 507
Enable and Disable iSCSI Optimization........................................................................................... 508
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer..............................................509
Monitoring iSCSI Traffic Flows.........................................................................................................509
Information Monitored in iSCSI Traffic Flows................................................................................. 509
Detection and Auto-Configuration for Dell EqualLogic Arrays...................................................... 510
Configuring Detection and Ports for Dell Compellent Arrays.........................................................511
Application of Quality of Service to iSCSI Traffic Flows...................................................................511
27 Intermediate System to Intermediate System...........................................513
IS-IS Protocol Overview....................................................................................................................513
IS-IS Addressing.................................................................................................................................513
Multi-Topology IS-IS.........................................................................................................................514
Transition Mode...........................................................................................................................515
17
Interface Support.........................................................................................................................515
Adjacencies..................................................................................................................................515
Graceful Restart.................................................................................................................................515
Timers.......................................................................................................................................... 516
Implementation Information............................................................................................................ 516
Configuration Information................................................................................................................ 517
Configuration Tasks for IS-IS...................................................................................................... 517
Configuring the Distance of a Route......................................................................................... 526
Changing the IS-Type................................................................................................................. 527
Redistributing IPv4 Routes..........................................................................................................530
Redistributing IPv6 Routes..........................................................................................................530
Configuring Authentication Passwords......................................................................................531
Setting the Overload Bit..............................................................................................................532
Debugging IS-IS.......................................................................................................................... 533
IS-IS Metric Styles............................................................................................................................. 534
Configure Metric Values................................................................................................................... 534
Maximum Values in the Routing Table.......................................................................................535
Change the IS-IS Metric Style in One Level Only...................................................................... 535
Leaks from One Level to Another...............................................................................................537
Sample Configurations..................................................................................................................... 537
28 Link Aggregation Control Protocol (LACP)...............................................540
Introduction to Dynamic LAGs and LACP....................................................................................... 540
Important Points to Remember................................................................................................. 540
LACP Modes................................................................................................................................ 541
Configuring LACP Commands................................................................................................... 541
LACP Configuration Tasks................................................................................................................542
Creating a LAG............................................................................................................................ 542
Configuring the LAG Interfaces as Dynamic..............................................................................543
Setting the LACP Long Timeout.................................................................................................543
Monitoring and Debugging LACP.............................................................................................. 544
Shared LAG State Tracking...............................................................................................................544
Configuring Shared LAG State Tracking.....................................................................................545
Important Points about Shared LAG State Tracking..................................................................546
LACP Basic Configuration Example................................................................................................. 547
Configure a LAG on ALPHA........................................................................................................ 547
29 Layer 2.............................................................................................................. 555
Manage the MAC Address Table...................................................................................................... 555
Clearing the MAC Address Table................................................................................................555
Setting the Aging Time for Dynamic Entries..............................................................................555
Configuring a Static MAC Address............................................................................................. 556
18
Displaying the MAC Address Table.............................................................................................556
MAC Learning Limit...........................................................................................................................556
Setting the MAC Learning Limit.................................................................................................. 557
mac learning-limit Dynamic....................................................................................................... 557
mac learning-limit mac-address-sticky.....................................................................................558
mac learning-limit station-move............................................................................................... 558
mac learning-limit no-station-move.........................................................................................558
Learning Limit Violation Actions.................................................................................................559
Setting Station Move Violation Actions......................................................................................559
Recovering from Learning Limit and Station Move Violations..................................................560
NIC Teaming.....................................................................................................................................560
Configure Redundant Pairs.............................................................................................................. 562
Important Points about Configuring Redundant Pairs..............................................................563
Far-End Failure Detection................................................................................................................ 565
FEFD State Changes....................................................................................................................566
Configuring FEFD........................................................................................................................ 567
Enabling FEFD on an Interface...................................................................................................568
Debugging FEFD......................................................................................................................... 569
30 Link Layer Discovery Protocol (LLDP)........................................................570
802.1AB (LLDP) Overview................................................................................................................. 570
Protocol Data Units.....................................................................................................................570
Optional TLVs.................................................................................................................................... 571
Management TLVs.......................................................................................................................572
TIA-1057 (LLDP-MED) Overview...................................................................................................... 574
TIA Organizationally Specific TLVs............................................................................................. 574
Configure LLDP.................................................................................................................................579
Related Configuration Tasks.......................................................................................................579
Important Points to Remember..................................................................................................579
LLDP Compatibility......................................................................................................................579
CONFIGURATION versus INTERFACE Configurations....................................................................579
Enabling LLDP...................................................................................................................................580
Disabling and Undoing LLDP......................................................................................................580
Enabling LLDP on Management Ports.............................................................................................580
Disabling and Undoing LLDP on Management Ports................................................................ 581
Advertising TLVs................................................................................................................................ 581
Viewing the LLDP Configuration......................................................................................................582
Viewing Information Advertised by Adjacent LLDP Agents.............................................................583
Configuring LLDPDU Intervals......................................................................................................... 584
Configuring Transmit and Receive Mode........................................................................................ 585
Configuring a Time to Live...............................................................................................................586
Debugging LLDP...............................................................................................................................586
19
Relevant Management Objects........................................................................................................ 587
31 Microsoft Network Load Balancing............................................................594
NLB Unicast and Multicast Modes................................................................................................... 594
NLB Unicast Mode Example....................................................................................................... 594
NLB Multicast Mode Example.....................................................................................................595
NLB Benefits......................................................................................................................................595
NLB Restrictions................................................................................................................................595
NLB VLAN Flooding.......................................................................................................................... 596
Configuring NLB on a Switch...........................................................................................................596
..................................................................................................................................................... 596
32 Multicast Source Discovery Protocol (MSDP)...........................................598
Protocol Overview............................................................................................................................598
Anycast RP........................................................................................................................................ 600
Implementation Information........................................................................................................... 600
Configure Multicast Source Discovery Protocol.............................................................................600
Related Configuration Tasks.......................................................................................................601
Enable MSDP.....................................................................................................................................605
Manage the Source-Active Cache...................................................................................................606
Viewing the Source-Active Cache.............................................................................................606
Limiting the Source-Active Cache............................................................................................. 607
Clearing the Source-Active Cache.............................................................................................607
Enabling the Rejected Source-Active Cache.............................................................................607
Accept Source-Active Messages that Fail the RFP Check.............................................................. 607
Specifying Source-Active Messages................................................................................................. 611
Limiting the Source-Active Messages from a Peer..........................................................................612
Preventing MSDP from Caching a Local Source............................................................................. 612
Preventing MSDP from Caching a Remote Source......................................................................... 613
Preventing MSDP from Advertising a Local Source.........................................................................614
Logging Changes in Peership States................................................................................................ 615
Terminating a Peership..................................................................................................................... 615
Clearing Peer Statistics..................................................................................................................... 616
Debugging MSDP..............................................................................................................................616
MSDP with Anycast RP...................................................................................................................... 617
Configuring Anycast RP.................................................................................................................... 618
Reducing Source-Active Message Flooding.............................................................................. 619
Specifying the RP Address Used in SA Messages.......................................................................619
MSDP Sample Configurations.......................................................................................................... 622
33 Multiple Spanning Tree Protocol (MSTP).................................................. 625
Protocol Overview............................................................................................................................625
20
/