PowerSwitch S6000

Dell PowerSwitch S6000 User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6000 User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S6000 System
9.14.0.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2018 - 07
Rev. A00
Contents
1 About this Guide...........................................................................................................................................37
Audience............................................................................................................................................................................37
Conventions...................................................................................................................................................................... 37
Related Documents..........................................................................................................................................................37
2 Conguration Fundamentals........................................................................................................................ 38
Accessing the Command Line........................................................................................................................................38
CLI Modes.........................................................................................................................................................................39
Navigating CLI Modes...............................................................................................................................................40
The do Command............................................................................................................................................................ 43
Undoing Commands........................................................................................................................................................ 43
Obtaining Help..................................................................................................................................................................44
Entering and Editing Commands....................................................................................................................................44
Command History............................................................................................................................................................45
Filtering show Command Outputs.................................................................................................................................45
Example of the grep Keyword.................................................................................................................................. 46
Multiple Users in Conguration Mode...........................................................................................................................46
Conguring alias command.............................................................................................................................................47
Viewing alias conguration........................................................................................................................................47
3 Getting Started............................................................................................................................................49
Console Access................................................................................................................................................................50
Serial Console.............................................................................................................................................................50
Default Conguration....................................................................................................................................................... 51
Conguring a Host Name................................................................................................................................................ 51
Accessing the System Remotely.................................................................................................................................... 51
Accessing the System Remotely.............................................................................................................................. 51
Congure the Management Port IP Address......................................................................................................... 52
Congure a Management Route..............................................................................................................................52
Conguring a Username and Password..................................................................................................................52
Conguring the Enable Password..................................................................................................................................53
Conguration File Management.....................................................................................................................................54
Copy Files to and from the System......................................................................................................................... 54
Mounting an NFS File System..................................................................................................................................55
Save the Running-Conguration..............................................................................................................................56
Congure the Overload Bit for a Startup Scenario................................................................................................57
Viewing Files............................................................................................................................................................... 57
Managing the File System.............................................................................................................................................. 58
View Command History.................................................................................................................................................. 58
Upgrading Dell EMC Networking OS............................................................................................................................ 59
Using HTTP for File Transfers........................................................................................................................................ 59
Verify Software Images Before Installation...................................................................................................................59
Contents
3
4 Management................................................................................................................................................ 61
Conguring Privilege Levels............................................................................................................................................ 61
Creating a Custom Privilege Level...........................................................................................................................62
Removing a Command from EXEC Mode.............................................................................................................. 62
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................62
Allowing Access to CONFIGURATION Mode Commands....................................................................................62
Allowing Access to Dierent Modes........................................................................................................................62
Applying a Privilege Level to a Username............................................................................................................... 64
Applying a Privilege Level to a Terminal Line.......................................................................................................... 64
Conguring Logging........................................................................................................................................................ 64
Audit and Security Logs............................................................................................................................................65
Conguring Logging Format ...................................................................................................................................67
Setting Up a Secure Connection to a Syslog Server.............................................................................................67
Log Messages in the Internal Buer..............................................................................................................................68
Conguration Task List for System Log Management.......................................................................................... 68
Disabling System Logging............................................................................................................................................... 68
Sending System Messages to a Syslog Server............................................................................................................69
Conguring a UNIX System as a Syslog Server.....................................................................................................69
Track Login Activity......................................................................................................................................................... 69
Restrictions for Tracking Login Activity.................................................................................................................. 69
Conguring Login Activity Tracking.........................................................................................................................69
Display Login Statistics..............................................................................................................................................70
Limit Concurrent Login Sessions.....................................................................................................................................71
Restrictions for Limiting the Number of Concurrent Sessions............................................................................. 71
Conguring Concurrent Session Limit.....................................................................................................................72
Enabling the System to Clear Existing Sessions.................................................................................................... 72
Enabling Secured CLI Mode............................................................................................................................................73
Changing System Logging Settings...............................................................................................................................73
Display the Logging Buer and the Logging Conguration........................................................................................ 74
Conguring a UNIX Logging Facility Level.................................................................................................................... 74
Synchronizing Log Messages......................................................................................................................................... 76
Enabling Timestamp on Syslog Messages.................................................................................................................... 76
File Transfer Services.......................................................................................................................................................77
Conguration Task List for File Transfer Services.................................................................................................. 77
Enabling the FTP Server........................................................................................................................................... 77
Conguring FTP Server Parameters........................................................................................................................77
Conguring FTP Client Parameters......................................................................................................................... 78
Terminal Lines................................................................................................................................................................... 78
Denying and Permitting Access to a Terminal Line................................................................................................79
Conguring Login Authentication for Terminal Lines.............................................................................................80
Setting Timeout for EXEC Privilege Mode....................................................................................................................81
Using Telnet to get to Another Network Device...........................................................................................................81
Lock CONFIGURATION Mode....................................................................................................................................... 82
Viewing the Conguration Lock Status...................................................................................................................82
Recovering from a Forgotten Password on the S6000.............................................................................................. 82
4
Contents
Recovering from a Forgotten Enable Password...........................................................................................................83
Recovering from a Failed Start on the S6000............................................................................................................. 83
Restoring the Factory Default Settings.........................................................................................................................84
Important Points to Remember................................................................................................................................84
Restoring Factory Default Environment Variables................................................................................................. 85
Viewing the Reason for Last System Reboot.............................................................................................................. 86
5 802.1X..........................................................................................................................................................87
Port-Authentication Process..........................................................................................................................................89
EAP over RADIUS......................................................................................................................................................89
Conguring 802.1X...........................................................................................................................................................90
Related Conguration Tasks..................................................................................................................................... 90
Important Points to Remember......................................................................................................................................90
Enabling 802.1X................................................................................................................................................................. 91
Conguring dot1x Prole ................................................................................................................................................92
Conguring MAC addresses for a do1x Prole.............................................................................................................93
Conguring the Static MAB and MAB Prole .............................................................................................................93
Conguring Critical VLAN ..............................................................................................................................................94
Conguring Request Identity Re-Transmissions...........................................................................................................95
Conguring a Quiet Period after a Failed Authentication..................................................................................... 95
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 96
Re-Authenticating a Port................................................................................................................................................ 97
Conguring Timeouts......................................................................................................................................................98
Conguring Dynamic VLAN Assignment with Port Authentication.......................................................................... 99
Guest and Authentication-Fail VLANs.........................................................................................................................100
Conguring a Guest VLAN......................................................................................................................................100
Conguring an Authentication-Fail VLAN............................................................................................................. 100
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 102
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 102
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 103
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................103
Conguring ACL VLAN Groups.............................................................................................................................. 103
Conguring FP Blocks for VLAN Parameters.......................................................................................................104
Viewing CAM Usage...................................................................................................................................................... 105
Allocating FP Blocks for VLAN Processes.................................................................................................................. 106
7 Access Control Lists (ACLs)....................................................................................................................... 108
IP Access Control Lists (ACLs).....................................................................................................................................109
CAM Usage................................................................................................................................................................110
Implementing ACLs on Dell EMC Networking OS................................................................................................ 110
Important Points to Remember.....................................................................................................................................112
Conguration Task List for Route Maps.................................................................................................................112
Conguring Match Routes.......................................................................................................................................114
Conguring Set Conditions......................................................................................................................................116
Congure a Route Map for Route Redistribution..................................................................................................117
Contents
5
Congure a Route Map for Route Tagging............................................................................................................ 117
Continue Clause........................................................................................................................................................ 118
IP Fragment Handling..................................................................................................................................................... 118
IP Fragments ACL Examples................................................................................................................................... 118
Layer 4 ACL Rules Examples................................................................................................................................... 119
Congure a Standard IP ACL.........................................................................................................................................119
Conguring a Standard IP ACL Filter..................................................................................................................... 120
Congure an Extended IP ACL......................................................................................................................................121
Conguring Filters with a Sequence Number........................................................................................................121
Conguring Filters Without a Sequence Number.................................................................................................124
Congure Layer 2 and Layer 3 ACLs............................................................................................................................125
Assign an IP ACL to an Interface..................................................................................................................................125
Applying an IP ACL.........................................................................................................................................................126
Counting ACL Hits....................................................................................................................................................126
Congure Ingress ACLs..................................................................................................................................................127
Congure Egress ACLs.................................................................................................................................................. 127
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 128
IP Prex Lists.................................................................................................................................................................. 129
Implementation Information.................................................................................................................................... 129
Conguration Task List for Prex Lists.................................................................................................................. 129
ACL Remarks.................................................................................................................................................................. 133
Conguring a Remark.............................................................................................................................................. 133
Deleting a Remark.................................................................................................................................................... 134
ACL Resequencing......................................................................................................................................................... 134
Resequencing an ACL or Prex List.......................................................................................................................135
Route Maps.....................................................................................................................................................................136
Implementation Information.................................................................................................................................... 136
Conguring UDF ACL.................................................................................................................................................... 136
Conguring IP Mirror Access Group............................................................................................................................ 139
Sample Conguration...............................................................................................................................................139
Example of viewing IP mirror–access–group applied to an Interface................................................................140
8 Bidirectional Forwarding Detection (BFD)................................................................................................... 141
How BFD Works.............................................................................................................................................................. 141
BFD Packet Format..................................................................................................................................................142
BFD Sessions............................................................................................................................................................ 143
BFD Three-Way Handshake.................................................................................................................................... 144
Session State Changes............................................................................................................................................146
Important Points to Remember.................................................................................................................................... 146
Congure BFD................................................................................................................................................................ 146
Congure BFD for Physical Ports...........................................................................................................................147
Congure BFD for Static Routes............................................................................................................................148
Congure BFD for IPv6 Static Routes...................................................................................................................152
Congure BFD for OSPF.........................................................................................................................................154
Congure BFD for OSPFv3.....................................................................................................................................158
Congure BFD for IS-IS............................................................................................................................................161
6
Contents
Congure BFD for BGP........................................................................................................................................... 163
Congure BFD for VRRP..........................................................................................................................................171
Conguring Protocol Liveness................................................................................................................................ 173
9 Border Gateway Protocol (BGP).................................................................................................................174
Border Gateway Protocol version 4 (BGPv4)............................................................................................................. 174
Autonomous Systems (AS)............................................................................................................................................174
AS4 Number Representation.................................................................................................................................. 176
Four-Byte AS Numbers............................................................................................................................................178
Multiprotocol BGP.......................................................................................................................................................... 178
MBGP for IPv4 MulticastBGP Address Family modelIPv4 and IPv6 address family....................................... 179
Sessions and Peers.........................................................................................................................................................179
Establish a Session................................................................................................................................................... 179
Implementing BGP global and address family.............................................................................................................180
BGP global conguration default values.................................................................................................................181
BGP Attributes for selecting Best Path........................................................................................................................181
Best Path Selection Criteria....................................................................................................................................182
Weight........................................................................................................................................................................183
Local Preference.......................................................................................................................................................184
Multi-Exit Discriminators (MEDs)...........................................................................................................................184
Origin..........................................................................................................................................................................185
AS Path......................................................................................................................................................................186
Next Hop................................................................................................................................................................... 186
Implement BGP with Dell EMC Networking OS......................................................................................................... 187
Additional Path (Add-Path) Support...................................................................................................................... 187
Advertise IGP Cost as MED for Redistributed Routes.........................................................................................187
Ignore Router-ID in Best-Path Calculation............................................................................................................ 188
AS Number Migration.............................................................................................................................................. 188
BGP4 Management Information Base (MIB)........................................................................................................189
Important Points to Remember.............................................................................................................................. 189
Conguration Information............................................................................................................................................. 190
Conguring a basic BGP network................................................................................................................................ 190
Enabling BGP............................................................................................................................................................ 190
Conguring a BGP peer...........................................................................................................................................193
Conguring AS4 Number Representations........................................................................................................... 194
Conguring a BGP VRF address family.................................................................................................................195
Route-refresh and Soft-reconguration................................................................................................................ 197
Aggregating Routes.................................................................................................................................................200
Filtering BGP Routes...............................................................................................................................................200
Filtering BGP Routes Using Route Maps..............................................................................................................202
Filtering BGP Routes Using AS-PATH Information..............................................................................................202
Conguring Peer Groups........................................................................................................................................ 203
Conguring BGP Fast Fall-Over..............................................................................................................................211
Conguring Passive Peering................................................................................................................................... 212
Maintaining Existing AS Numbers During an AS Migration................................................................................. 213
Allowing an AS Number to Appear in its Own AS Path....................................................................................... 214
Contents
7
Enabling Graceful Restart........................................................................................................................................215
Filtering on an AS-Path Attribute........................................................................................................................... 216
Regular Expressions as Filters.................................................................................................................................217
Redistributing Routes...............................................................................................................................................218
Enabling Additional Paths........................................................................................................................................ 219
Conguring IP Community Lists............................................................................................................................. 219
Conguring an IP Extended Community List....................................................................................................... 220
Filtering Routes with Community Lists.................................................................................................................. 221
Manipulating the COMMUNITY Attribute............................................................................................................ 222
Changing MED Attributes.......................................................................................................................................223
Changing the LOCAL_PREFERENCE Attribute..................................................................................................224
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes.............224
Changing the WEIGHT Attribute...........................................................................................................................225
Enabling Multipath...................................................................................................................................................225
Route Reectors......................................................................................................................................................226
Conguring BGP Confederations...........................................................................................................................227
Enabling Route Flap Dampening............................................................................................................................ 227
Changing BGP Timers.............................................................................................................................................230
Setting the extended timer.................................................................................................................................... 230
Enabling or disabling BGP neighbors......................................................................................................................231
Route Map Continue............................................................................................................................................... 232
Enabling MBGP Congurations....................................................................................................................................233
MBGP support for IPv6................................................................................................................................................233
Conguring IPv6 MBGP between peers.....................................................................................................................233
Example-Conguring IPv4 and IPv6 neighbors......................................................................................................... 234
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor............................................... 236
BGP Regular Expression Optimization........................................................................................................................238
Debugging BGP..............................................................................................................................................................238
Storing Last and Bad PDUs....................................................................................................................................239
Capturing PDUs....................................................................................................................................................... 240
PDU Counters........................................................................................................................................................... 241
10 Content Addressable Memory (CAM).......................................................................................................242
CAM Allocation...............................................................................................................................................................242
Test CAM Usage............................................................................................................................................................ 244
View CAM Proles.........................................................................................................................................................244
View CAM-ACL Settings.............................................................................................................................................. 245
View CAM Usage...........................................................................................................................................................246
Conguring CAM Threshold and Silence Period........................................................................................................ 247
Setting CAM Threshold and Silence Period..........................................................................................................247
CAM Optimization......................................................................................................................................................... 248
Troubleshoot CAM Proling..........................................................................................................................................248
QoS CAM Region Limitation...................................................................................................................................248
Syslog Error When the Table is Full....................................................................................................................... 249
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................249
Syslog Warning for Discrepancies Between Congured Extended Prexes....................................................249
8
Contents
Unied Forwarding Table (UFT) Modes......................................................................................................................249
Conguring UFT Modes..........................................................................................................................................249
11 Control Plane Policing (CoPP)...................................................................................................................251
Congure Control Plane Policing................................................................................................................................. 252
Conguring CoPP for Protocols............................................................................................................................ 253
Conguring CoPP for CPU Queues...................................................................................................................... 255
Protocol to CPU Queue Mapping..........................................................................................................................256
Conguring Protocol to CPU Queue Mapping.....................................................................................................256
Displaying CoPP Conguration ............................................................................................................................. 257
12 Data Center Bridging (DCB).....................................................................................................................259
Ethernet Enhancements in Data Center Bridging..................................................................................................... 259
Priority-Based Flow Control................................................................................................................................... 260
Enhanced Transmission Selection.......................................................................................................................... 261
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................262
Data Center Bridging in a Trac Flow...................................................................................................................263
Enabling Data Center Bridging.....................................................................................................................................263
DCB Maps and its Attributes..................................................................................................................................264
Data Center Bridging: Default Conguration..............................................................................................................265
Conguring Priority-Based Flow Control....................................................................................................................265
Conguring Lossless Queues....................................................................................................................................... 266
Conguring PFC in a DCB Map................................................................................................................................... 268
PFC Conguration Notes........................................................................................................................................268
PFC Prerequisites and Restrictions.......................................................................................................................269
Conguring PFC without a DCB Map.........................................................................................................................269
Conguring Lossless QueuesExample:..................................................................................................................269
Priority-Based Flow Control Using Dynamic Buer Method...............................................................................271
Behavior of Tagged Packets......................................................................................................................................... 272
Conguration Example for DSCP and PFC Priorities................................................................................................272
SNMP Support for PFC and Buer Statistics Tracking............................................................................................273
Performing PFC Using DSCP Bits Instead of 802.1p Bits......................................................................................... 274
PFC and ETS Conguration Examples........................................................................................................................ 274
Using PFC to Manage Converged Ethernet Trac................................................................................................... 274
Operations on Untagged Packets................................................................................................................................275
Generation of PFC for a Priority for Untagged Packets...........................................................................................275
Congure Enhanced Transmission Selection..............................................................................................................275
ETS Prerequisites and Restrictions........................................................................................................................275
Creating an ETS Priority Group..............................................................................................................................276
ETS Operation with DCBx.......................................................................................................................................277
Conguring Bandwidth Allocation for DCBx CIN.................................................................................................277
Conguring ETS in a DCB Map..............................................................................................................................278
Hierarchical Scheduling in ETS Output Policies......................................................................................................... 279
Using ETS to Manage Converged Ethernet Trac...................................................................................................280
Applying DCB Policies in a Switch Stack.................................................................................................................... 280
Congure a DCBx Operation........................................................................................................................................280
Contents
9
DCBx Operation.......................................................................................................................................................280
DCBx Port Roles.......................................................................................................................................................281
DCB Conguration Exchange.................................................................................................................................282
Conguration Source Election................................................................................................................................282
Propagation of DCB Information............................................................................................................................283
Auto-Detection and Manual Conguration of the DCBx Version...................................................................... 283
DCBx Example..........................................................................................................................................................284
DCBx Prerequisites and Restrictions.....................................................................................................................284
Conguring DCBx....................................................................................................................................................284
Verifying the DCB Conguration................................................................................................................................. 288
QoS dot1p Trac Classication and Queue Assignment..........................................................................................296
Conguring the Dynamic Buer Method....................................................................................................................297
Sample DCB Conguration...........................................................................................................................................298
PFC and ETS Conguration Command Examples.............................................................................................. 300
13 Dynamic Host Conguration Protocol (DHCP)..........................................................................................301
DHCP Packet Format and Options.............................................................................................................................. 301
Assign an IP Address using DHCP...............................................................................................................................303
Implementation Information..........................................................................................................................................304
Congure the System to be a DHCP Server............................................................................................................. 304
Conguring the Server for Automatic Address Allocation..................................................................................305
Specifying a Default Gateway................................................................................................................................306
Congure a Method of Hostname Resolution..................................................................................................... 306
Using DNS for Address Resolution........................................................................................................................306
Using NetBIOS WINS for Address Resolution......................................................................................................307
Creating Manual Binding Entries............................................................................................................................307
Debugging the DHCP Server................................................................................................................................. 307
Using DHCP Clear Commands.............................................................................................................................. 308
Congure the System to be a DHCP Client...............................................................................................................308
Conguring the DHCP Client System...................................................................................................................308
DHCP Client on a Management Interface.............................................................................................................310
DHCP Client Operation with Other Features........................................................................................................310
DHCP Relay When DHCP Server and Client are in Dierent VRFs..........................................................................311
Conguring Route Leaking between VRFs on DHCP Relay Agent.....................................................................311
Congure the System for User Port Stacking (Option 230).................................................................................... 313
Congure Secure DHCP................................................................................................................................................313
Option 82...................................................................................................................................................................313
DHCP Snooping........................................................................................................................................................314
Conguring the DHCP secondary-subnet.............................................................................................................318
Drop DHCP Packets on Snooped VLANs Only.....................................................................................................319
Dynamic ARP Inspection......................................................................................................................................... 319
Conguring Dynamic ARP Inspection................................................................................................................... 320
Source Address Validation............................................................................................................................................. 321
Enabling IP Source Address Validation...................................................................................................................321
DHCP MAC Source Address Validation................................................................................................................ 322
Enabling IP+MAC Source Address Validation.......................................................................................................322
10
Contents
Viewing the Number of SAV Dropped Packets....................................................................................................323
Clearing the Number of SAV Dropped Packets................................................................................................... 323
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 324
ECMP for Flow-Based Anity..................................................................................................................................... 324
Conguring the Hash Algorithm............................................................................................................................ 324
Enabling Deterministic ECMP Next Hop...............................................................................................................324
Conguring the Hash Algorithm Seed.................................................................................................................. 325
Link Bundle Monitoring................................................................................................................................................. 325
Managing ECMP Group Paths...............................................................................................................................326
Creating an ECMP Group Bundle..........................................................................................................................326
Modifying the ECMP Group Threshold.................................................................................................................326
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table...................................... 327
Support for ECMP in host table............................................................................................................................ 328
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 328
RTAG7............................................................................................................................................................................. 328
Flow-based Hashing for ECMP................................................................................................................................... 329
15 FIP Snooping............................................................................................................................................332
Fibre Channel over Ethernet........................................................................................................................................ 332
Ensure Robustness in a Converged Ethernet Network............................................................................................ 332
FIP Snooping on Ethernet Bridges.............................................................................................................................. 334
FIP Snooping in a Switch Stack...................................................................................................................................336
Using FIP Snooping....................................................................................................................................................... 336
FIP Snooping Prerequisites.....................................................................................................................................336
Important Points to Remember............................................................................................................................. 336
Enabling the FCoE Transit Feature........................................................................................................................ 337
Enable FIP Snooping on VLANs.............................................................................................................................338
Congure the FC-MAP Value................................................................................................................................ 338
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................338
Congure a Port for a Bridge-to-FCF Link...........................................................................................................338
Impact on Other Software Features..................................................................................................................... 338
FIP Snooping Restrictions...................................................................................................................................... 339
Conguring FIP Snooping.......................................................................................................................................339
Displaying FIP Snooping Information...........................................................................................................................340
FCoE Transit Conguration Example...........................................................................................................................345
16 Flex Hash and Optimized Boot-Up............................................................................................................347
Flex Hash Capability Overview.....................................................................................................................................347
Conguring the Flex Hash Mechanism....................................................................................................................... 347
Conguring Fast Boot and LACP Fast Switchover...................................................................................................348
Optimizing the Boot Time.............................................................................................................................................348
Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................348
Guidelines for Conguring Optimized Booting Mechanism................................................................................349
Interoperation of Applications with Fast Boot and System States..........................................................................350
LACP and IPv4 Routing..........................................................................................................................................350
Contents
11
LACP and IPv6 Routing..........................................................................................................................................350
BGP Graceful Restart.............................................................................................................................................. 351
Cold Boot Caused by Power Cycling the System................................................................................................ 351
Unexpected Reload of the System.........................................................................................................................351
Software Upgrade.................................................................................................................................................... 351
LACP Fast Switchover.............................................................................................................................................351
Changes to BGP Multipath.................................................................................................................................... 352
Delayed Installation of ECMP Routes Into BGP...................................................................................................352
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 352
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces......................................................................................353
17 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 354
Protocol Overview.........................................................................................................................................................354
Ring Status...............................................................................................................................................................355
Multiple FRRP Rings............................................................................................................................................... 355
Important FRRP Points...........................................................................................................................................356
Important FRRP Concepts..................................................................................................................................... 357
Implementing FRRP.......................................................................................................................................................358
FRRP Conguration...................................................................................................................................................... 358
Creating the FRRP Group...................................................................................................................................... 358
Conguring the Control VLAN...............................................................................................................................359
Conguring and Adding the Member VLANs...................................................................................................... 360
Setting the FRRP Timers........................................................................................................................................ 361
Clearing the FRRP Counters...................................................................................................................................361
Viewing the FRRP Conguration............................................................................................................................361
Viewing the FRRP Information............................................................................................................................... 361
Troubleshooting FRRP.................................................................................................................................................. 362
Conguration Checks..............................................................................................................................................362
Sample Conguration and Topology............................................................................................................................362
FRRP Support on VLT...................................................................................................................................................363
Example Scenario.................................................................................................................................................... 364
Important Points to Remember............................................................................................................................. 365
18 GARP VLAN Registration Protocol (GVRP)..............................................................................................366
Important Points to Remember................................................................................................................................... 366
Congure GVRP.............................................................................................................................................................367
Related Conguration Tasks................................................................................................................................... 367
Enabling GVRP Globally................................................................................................................................................ 368
Enabling GVRP on a Layer 2 Interface........................................................................................................................368
Congure GVRP Registration...................................................................................................................................... 368
Congure a GARP Timer.............................................................................................................................................. 369
19 Internet Group Management Protocol (IGMP)..........................................................................................370
IGMP Implementation Information...............................................................................................................................370
IGMP Protocol Overview.............................................................................................................................................. 370
IGMP Version 2........................................................................................................................................................ 370
12
Contents
IGMP Version 3........................................................................................................................................................ 372
Congure IGMP............................................................................................................................................................. 375
Related Conguration Tasks................................................................................................................................... 375
Viewing IGMP Enabled Interfaces............................................................................................................................... 376
Selecting an IGMP Version........................................................................................................................................... 376
Viewing IGMP Groups................................................................................................................................................... 377
Viewing IGMP Snooping Groups..................................................................................................................................377
Adjusting Timers.............................................................................................................................................................377
Adjusting Query and Response Timers..................................................................................................................377
Enabling IGMP Immediate-Leave.................................................................................................................................378
IGMP Snooping.............................................................................................................................................................. 379
IGMP Snooping Implementation Information....................................................................................................... 379
Conguring IGMP Snooping...................................................................................................................................379
Removing a Group-Port Association.....................................................................................................................380
Disabling Multicast Flooding...................................................................................................................................380
Specifying a Port as Connected to a Multicast Router...................................................................................... 380
Conguring the Switch as Querier......................................................................................................................... 381
Fast Convergence after MSTP Topology Changes....................................................................................................381
Egress Interface Selection (EIS) for HTTP and IGMP Applications.........................................................................381
Protocol Separation.................................................................................................................................................382
Enabling and Disabling Management Egress Interface Selection...................................................................... 383
Handling of Management Route Conguration................................................................................................... 384
Handling of Switch-Initiated Trac....................................................................................................................... 384
Handling of Switch-Destined Trac......................................................................................................................385
Handling of Transit Trac (Trac Separation).................................................................................................... 386
Mapping of Management Applications and Trac Type.....................................................................................386
Behavior of Various Applications for Switch-Initiated Trac ............................................................................ 387
Behavior of Various Applications for Switch-Destined Trac ...........................................................................388
Interworking of EIS With Various Applications.....................................................................................................388
Designating a Multicast Router Interface...................................................................................................................389
20 Interfaces................................................................................................................................................ 390
Basic Interface Conguration.......................................................................................................................................390
Advanced Interface Conguration...............................................................................................................................390
Interface Types............................................................................................................................................................... 391
View Basic Interface Information..................................................................................................................................391
Resetting an Interface to its Factory Default State...................................................................................................393
Enabling a Physical Interface........................................................................................................................................394
Physical Interfaces.........................................................................................................................................................394
Conguration Task List for Physical Interfaces....................................................................................................394
40G to 1G Breakout Cable Adaptor....................................................................................................................... 394
Overview of Layer Modes...................................................................................................................................... 395
Conguring Layer 2 (Data Link) Mode..................................................................................................................396
Conguring Layer 2 (Interface) Mode.................................................................................................................. 396
Conguring Layer 3 (Network) Mode...................................................................................................................396
Conguring Layer 3 (Interface) Mode...................................................................................................................397
Contents
13
Automatic recovery of an Err-disabled interface.......................................................................................................398
Conguring an automatic recovery for an Err-disabled interface......................................................................398
Egress Interface Selection (EIS)..................................................................................................................................399
Important Points to Remember............................................................................................................................. 399
Conguring EIS........................................................................................................................................................ 399
Management Interfaces................................................................................................................................................400
Conguring Management Interfaces.................................................................................................................... 400
Conguring a Management Interface on an Ethernet Port................................................................................ 401
VLAN Interfaces............................................................................................................................................................ 402
Loopback Interfaces......................................................................................................................................................403
Null Interfaces................................................................................................................................................................ 403
Port Channel Interfaces................................................................................................................................................403
Port Channel Denition and Standards.................................................................................................................404
Port Channel Benets.............................................................................................................................................404
Port Channel Implementation.................................................................................................................................404
Interfaces in Port Channels....................................................................................................................................405
Conguration Tasks for Port Channel Interfaces.................................................................................................405
Creating a Port Channel......................................................................................................................................... 405
Adding a Physical Interface to a Port Channel.....................................................................................................406
Reassigning an Interface to a New Port Channel................................................................................................ 407
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 408
Adding or Removing a Port Channel from a VLAN............................................................................................. 408
Assigning an IP Address to a Port Channel.......................................................................................................... 409
Deleting or Disabling a Port Channel......................................................................................................................410
Load Balancing Through Port Channels................................................................................................................ 410
Changing the Hash Algorithm.................................................................................................................................410
Bulk Conguration...........................................................................................................................................................411
Interface Range......................................................................................................................................................... 411
Bulk Conguration Examples.................................................................................................................................. 412
Dening Interface Range Macros................................................................................................................................. 413
Dene the Interface Range..................................................................................................................................... 413
Choosing an Interface-Range Macro.....................................................................................................................414
Monitoring and Maintaining Interfaces........................................................................................................................ 414
Maintenance Using TDR..........................................................................................................................................415
Non Dell-Qualied Transceivers....................................................................................................................................415
Splitting 40G Ports without Reload............................................................................................................................. 416
Splitting QSFP Ports to SFP+ Ports............................................................................................................................418
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port...................................................................................419
Important Points to Remember.............................................................................................................................. 419
Example Scenarios...................................................................................................................................................420
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................423
Link Dampening..............................................................................................................................................................424
Important Points to Remember..............................................................................................................................424
Conguration Example of Link Dampening...........................................................................................................424
Enabling Link Dampening........................................................................................................................................ 427
14
Contents
Link Bundle Monitoring................................................................................................................................................. 428
Using Ethernet Pause Frames for Flow Control........................................................................................................ 429
Enabling Pause Frames........................................................................................................................................... 429
Congure the MTU Size on an Interface....................................................................................................................430
Port-Pipes........................................................................................................................................................................431
Auto-Negotiation on Ethernet Interfaces....................................................................................................................431
Setting the Speed of Ethernet Interfaces.............................................................................................................431
Set Auto-Negotiation Options................................................................................................................................433
View Advanced Interface Information.........................................................................................................................433
Conguring the Interface Sampling Size.............................................................................................................. 434
Conguring the Trac Sampling Size Globally...........................................................................................................435
Dynamic Counters......................................................................................................................................................... 436
Clearing Interface Counters....................................................................................................................................437
Compressing Conguration Files..................................................................................................................................437
21 IPv4 Routing............................................................................................................................................. 441
IP Addresses...................................................................................................................................................................442
Implementation Information....................................................................................................................................442
Conguration Tasks for IP Addresses..........................................................................................................................442
Assigning IP Addresses to an Interface.......................................................................................................................442
Conguring Static Routes.............................................................................................................................................443
Congure Static Routes for the Management Interface.......................................................................................... 444
Using the Congured Source IP Address in ICMP Messages..................................................................................445
Conguring the ICMP Source Interface............................................................................................................... 445
Conguring the Duration to Establish a TCP Connection........................................................................................ 445
Enabling Directed Broadcast........................................................................................................................................ 446
Resolution of Host Names............................................................................................................................................446
Enabling Dynamic Resolution of Host Names............................................................................................................446
Specifying the Local System Domain and a List of Domains....................................................................................447
Conguring DNS with Traceroute................................................................................................................................447
ARP..................................................................................................................................................................................448
Conguration Tasks for ARP........................................................................................................................................ 448
Conguring Static ARP Entries....................................................................................................................................448
Enabling Proxy ARP.......................................................................................................................................................449
Clearing ARP Cache......................................................................................................................................................449
ARP Learning via Gratuitous ARP................................................................................................................................449
Enabling ARP Learning via Gratuitous ARP................................................................................................................450
ARP Learning via ARP Request...................................................................................................................................450
Conguring ARP Retries................................................................................................................................................451
ICMP................................................................................................................................................................................ 451
Conguration Tasks for ICMP.......................................................................................................................................451
Enabling ICMP Unreachable Messages....................................................................................................................... 451
UDP Helper.....................................................................................................................................................................452
Congure UDP Helper.............................................................................................................................................452
Important Points to Remember............................................................................................................................. 452
Enabling UDP Helper.....................................................................................................................................................452
Contents
15
Conguring a Broadcast Address................................................................................................................................ 453
Congurations Using UDP Helper............................................................................................................................... 453
UDP Helper with Broadcast-All Addresses.................................................................................................................453
UDP Helper with Subnet Broadcast Addresses.........................................................................................................454
UDP Helper with Congured Broadcast Addresses..................................................................................................454
UDP Helper with No Congured Broadcast Addresses............................................................................................455
Troubleshooting UDP Helper........................................................................................................................................455
22 IPv6 Routing............................................................................................................................................456
Protocol Overview.........................................................................................................................................................456
Extended Address Space........................................................................................................................................457
Stateless Autoconguration....................................................................................................................................457
IPv6 Headers............................................................................................................................................................457
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support................................................................... 458
IPv6 Header Fields...................................................................................................................................................459
Extension Header Fields.......................................................................................................................................... 461
Addressing................................................................................................................................................................ 462
Implementing IPv6 with Dell EMC Networking OS................................................................................................... 463
ICMPv6...........................................................................................................................................................................464
Path MTU discovery..................................................................................................................................................... 465
IPv6 Neighbor Discovery..............................................................................................................................................465
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................466
Conguring the IPv6 Recursive DNS Server....................................................................................................... 466
Debugging IPv6 RDNSS Information Sent to the Host ..................................................................................... 467
Displaying IPv6 RDNSS Information......................................................................................................................467
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 468
Conguration Tasks for IPv6........................................................................................................................................ 468
Adjusting Your CAM-Prole....................................................................................................................................468
Assigning an IPv6 Address to an Interface...........................................................................................................469
Assigning a Static IPv6 Route................................................................................................................................ 470
Conguring Telnet with IPv6.................................................................................................................................. 470
SNMP over IPv6.......................................................................................................................................................471
Displaying IPv6 Information.....................................................................................................................................471
Displaying an IPv6 Interface Information............................................................................................................... 471
Showing IPv6 Routes.............................................................................................................................................. 472
Showing the Running-Conguration for an Interface......................................................................................... 473
Clearing IPv6 Routes............................................................................................................................................... 474
Disabling ND Entry Timeout....................................................................................................................................474
Conguring IPv6 RA Guard...........................................................................................................................................474
Conguring IPv6 RA Guard on an Interface......................................................................................................... 476
Monitoring IPv6 RA Guard......................................................................................................................................477
23 iSCSI Optimization...................................................................................................................................478
iSCSI Optimization Overview....................................................................................................................................... 478
Monitoring iSCSI Trac Flows...............................................................................................................................480
Application of Quality of Service to iSCSI Trac Flows..................................................................................... 480
16
Contents
Information Monitored in iSCSI Trac Flows.......................................................................................................480
Detection and Auto-Conguration for Dell EqualLogic Arrays............................................................................481
Conguring Detection and Ports for Dell Compellent Arrays..............................................................................481
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................482
Enable and Disable iSCSI Optimization................................................................................................................. 482
Default iSCSI Optimization Values...............................................................................................................................483
iSCSI Optimization Prerequisites................................................................................................................................. 483
Conguring iSCSI Optimization....................................................................................................................................483
Displaying iSCSI Optimization Information................................................................................................................. 485
24 Intermediate System to Intermediate System...........................................................................................487
IS-IS Protocol Overview................................................................................................................................................487
IS-IS Addressing............................................................................................................................................................. 487
Multi-Topology IS-IS...................................................................................................................................................... 488
Transition Mode....................................................................................................................................................... 488
Interface Support.....................................................................................................................................................489
Adjacencies...............................................................................................................................................................489
Graceful Restart.............................................................................................................................................................489
Timers....................................................................................................................................................................... 489
Implementation Information..........................................................................................................................................489
Conguration Information.............................................................................................................................................490
Conguration Tasks for IS-IS.................................................................................................................................. 491
Conguring the Distance of a Route.....................................................................................................................498
Changing the IS-Type.............................................................................................................................................. 499
Redistributing IPv4 Routes..................................................................................................................................... 501
Redistributing IPv6 Routes.....................................................................................................................................502
Conguring Authentication Passwords.................................................................................................................503
Setting the Overload Bit.........................................................................................................................................503
Debugging IS-IS.......................................................................................................................................................504
IS-IS Metric Styles........................................................................................................................................................ 505
Congure Metric Values............................................................................................................................................... 505
Maximum Values in the Routing Table.................................................................................................................. 505
Change the IS-IS Metric Style in One Level Only................................................................................................505
Leaks from One Level to Another..........................................................................................................................507
Sample Congurations..................................................................................................................................................508
25 In-Service Software Upgrade................................................................................................................... 510
ISSU Introduction........................................................................................................................................................... 510
Warmboot Limitations..............................................................................................................................................510
Fastboot 2.0 (Zero Loss Upgrade)............................................................................................................................... 510
L2 ISSU.............................................................................................................................................................................511
L3 ISSU.............................................................................................................................................................................511
CoPP................................................................................................................................................................................512
Mirroring ow control packets......................................................................................................................................512
PFC.................................................................................................................................................................................. 512
QoS.................................................................................................................................................................................. 512
Contents
17
Tunnel Conguration...................................................................................................................................................... 512
26 Link Aggregation Control Protocol (LACP)............................................................................................... 514
Introduction to Dynamic LAGs and LACP................................................................................................................... 514
Important Points to Remember.............................................................................................................................. 514
LACP Modes.............................................................................................................................................................515
Conguring LACP Commands................................................................................................................................515
LACP Conguration Tasks.............................................................................................................................................516
Creating a LAG......................................................................................................................................................... 516
Conguring the LAG Interfaces as Dynamic.........................................................................................................516
Setting the LACP Long Timeout.............................................................................................................................517
Monitoring and Debugging LACP...........................................................................................................................517
Shared LAG State Tracking........................................................................................................................................... 518
Conguring Shared LAG State Tracking................................................................................................................518
Important Points about Shared LAG State Tracking........................................................................................... 520
LACP Basic Conguration Example............................................................................................................................ 520
Congure a LAG on ALPHA................................................................................................................................... 520
27 Layer 2.....................................................................................................................................................529
Manage the MAC Address Table................................................................................................................................. 529
Clearing the MAC Address Table........................................................................................................................... 529
Setting the Aging Time for Dynamic Entries........................................................................................................529
Conguring a Static MAC Address........................................................................................................................530
Displaying the MAC Address Table........................................................................................................................530
MAC Learning Limit.......................................................................................................................................................530
Setting the MAC Learning Limit............................................................................................................................. 531
mac learning-limit Dynamic..................................................................................................................................... 531
mac learning-limit mac-address-sticky.................................................................................................................. 531
mac learning-limit station-move............................................................................................................................ 532
mac learning-limit no-station-move...................................................................................................................... 532
Learning Limit Violation Actions.............................................................................................................................532
Setting Station Move Violation Actions................................................................................................................ 533
Recovering from Learning Limit and Station Move Violations........................................................................... 533
Disabling MAC Address Learning on the System.................................................................................................534
NIC Teaming................................................................................................................................................................... 534
Congure Redundant Pairs.......................................................................................................................................... 535
Important Points about Conguring Redundant Pairs........................................................................................ 537
Far-End Failure Detection.............................................................................................................................................538
FEFD State Changes...............................................................................................................................................539
Conguring FEFD.................................................................................................................................................... 540
Enabling FEFD on an Interface.............................................................................................................................. 540
Debugging FEFD.......................................................................................................................................................541
28 Link Layer Discovery Protocol (LLDP)..................................................................................................... 543
802.1AB (LLDP) Overview............................................................................................................................................543
Protocol Data Units................................................................................................................................................. 543
18
Contents
Optional TLVs.................................................................................................................................................................544
Management TLVs.................................................................................................................................................. 544
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 546
TIA Organizationally Specic TLVs........................................................................................................................ 546
Congure LLDP............................................................................................................................................................. 550
Related Conguration Tasks...................................................................................................................................550
Important Points to Remember............................................................................................................................. 550
LLDP Compatibility...................................................................................................................................................551
CONFIGURATION versus INTERFACE Congurations.............................................................................................551
Enabling LLDP.................................................................................................................................................................551
Disabling and Undoing LLDP..................................................................................................................................552
Enabling LLDP on Management Ports........................................................................................................................552
Disabling and Undoing LLDP on Management Ports..........................................................................................552
Advertising TLVs............................................................................................................................................................ 552
Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................554
Reserved Unrecognized LLDP TLVs..................................................................................................................... 554
Organizational Specic Unrecognized LLDP TLVs..............................................................................................554
Viewing Unrecognized LLDP TLVs........................................................................................................................554
Viewing the LLDP Conguration................................................................................................................................. 555
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................555
Examples of Viewing Information Advertised by Neighbors.............................................................................. 555
Conguring LLDPDU Intervals..................................................................................................................................... 557
Conguring LLDP Notication Interval....................................................................................................................... 558
Conguring Transmit and Receive Mode................................................................................................................... 558
Conguring the Time to Live Value............................................................................................................................. 559
Debugging LLDP............................................................................................................................................................559
Relevant Management Objects.................................................................................................................................... 561
29 Microsoft Network Load Balancing..........................................................................................................566
NLB Unicast Mode Scenario........................................................................................................................................566
NLB Multicast Mode Scenario.....................................................................................................................................566
Limitations of the NLB Feature....................................................................................................................................567
Microsoft Clustering......................................................................................................................................................567
Enable and Disable VLAN Flooding .............................................................................................................................567
Conguring a Switch for NLB ..................................................................................................................................... 567
Enabling a Switch for Multicast NLB.................................................................................................................... 568
30 Multicast Source Discovery Protocol (MSDP).........................................................................................569
Protocol Overview.........................................................................................................................................................569
Anycast RP.....................................................................................................................................................................570
Implementation Information.......................................................................................................................................... 571
Congure Multicast Source Discovery Protocol.........................................................................................................571
Related Conguration Tasks....................................................................................................................................571
Enable MSDP................................................................................................................................................................. 575
Manage the Source-Active Cache.............................................................................................................................. 576
Viewing the Source-Active Cache.........................................................................................................................576
Contents
19
Limiting the Source-Active Cache.........................................................................................................................576
Clearing the Source-Active Cache.........................................................................................................................577
Enabling the Rejected Source-Active Cache........................................................................................................577
Accept Source-Active Messages that Fail the RFP Check......................................................................................577
Specifying Source-Active Messages...........................................................................................................................580
Limiting the Source-Active Messages from a Peer....................................................................................................581
Preventing MSDP from Caching a Local Source........................................................................................................581
Preventing MSDP from Caching a Remote Source.................................................................................................. 582
Preventing MSDP from Advertising a Local Source..................................................................................................582
Logging Changes in Peership States...........................................................................................................................583
Terminating a Peership..................................................................................................................................................583
Clearing Peer Statistics.................................................................................................................................................584
Debugging MSDP.......................................................................................................................................................... 584
MSDP with Anycast RP................................................................................................................................................585
Conguring Anycast RP................................................................................................................................................586
Reducing Source-Active Message Flooding.........................................................................................................587
Specifying the RP Address Used in SA Messages.............................................................................................. 587
MSDP Sample Congurations..................................................................................................................................... 589
31 Multiple Spanning Tree Protocol (MSTP)................................................................................................. 592
Protocol Overview.........................................................................................................................................................592
Spanning Tree Variations...............................................................................................................................................593
Implementation Information....................................................................................................................................593
Congure Multiple Spanning Tree Protocol................................................................................................................593
Related Conguration Tasks...................................................................................................................................594
Enable Multiple Spanning Tree Globally...................................................................................................................... 594
Adding and Removing Interfaces.................................................................................................................................594
Creating Multiple Spanning Tree Instances................................................................................................................ 595
Inuencing MSTP Root Selection................................................................................................................................596
Interoperate with Non-Dell Bridges.............................................................................................................................596
Changing the Region Name or Revision..................................................................................................................... 597
Modifying Global Parameters....................................................................................................................................... 597
Modifying the Interface Parameters........................................................................................................................... 598
Conguring an EdgePort.............................................................................................................................................. 599
Flush MAC Addresses after a Topology Change....................................................................................................... 600
MSTP Sample Congurations......................................................................................................................................600
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration........................................................................................601
Debugging and Verifying MSTP Congurations........................................................................................................ 604
32 Multicast Features...................................................................................................................................606
Enabling IP Multicast.....................................................................................................................................................606
Implementation Information......................................................................................................................................... 606
Multicast Policies........................................................................................................................................................... 607
IPv4 Multicast Policies............................................................................................................................................ 607
Understanding Multicast Traceroute (mtrace)........................................................................................................... 614
20
Contents
/