OS9

Dell OS9 Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell OS9 Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Configuration Guide for the
S3048ON System
9.14.2.2
July 2019
Rev. A00
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2018 - 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
Chapter 1: About this Guide.........................................................................................................30
Audience.............................................................................................................................................................................. 30
Conventions........................................................................................................................................................................30
Related Documents...........................................................................................................................................................30
Chapter 2: Configuration Fundamentals.......................................................................................31
Accessing the Command Line......................................................................................................................................... 31
CLI Modes............................................................................................................................................................................31
Navigating CLI Modes................................................................................................................................................ 33
The do Command.............................................................................................................................................................. 35
Undoing Commands..........................................................................................................................................................36
Obtaining Help....................................................................................................................................................................36
Entering and Editing Commands....................................................................................................................................37
Command History..............................................................................................................................................................38
Filtering show Command Outputs.................................................................................................................................38
Multiple Users in Configuration Mode..........................................................................................................................39
Chapter 3: Getting Started..........................................................................................................40
Console Access..................................................................................................................................................................40
Serial Console...............................................................................................................................................................40
Accessing the CLI Interface and Running Scripts Using SSH.................................................................................41
Default Configuration....................................................................................................................................................... 42
Configuring a Host Name................................................................................................................................................ 42
Accessing the System Remotely................................................................................................................................... 42
Configure the Management Port IP Address....................................................................................................... 43
Configure a Management Route..............................................................................................................................43
Configuring a Username and Password................................................................................................................. 43
Configuring the Enable Password................................................................................................................................. 44
Configuration File Management.....................................................................................................................................45
Copy Files to and from the System........................................................................................................................ 45
Mounting an NFS File System..................................................................................................................................45
Save the Running-Configuration..............................................................................................................................47
Configure the Overload Bit for a Startup Scenario.............................................................................................47
Viewing Files................................................................................................................................................................. 47
Compressing Configuration Files............................................................................................................................. 48
Managing the File System...............................................................................................................................................50
Enabling Software Features on Devices Using a Command Option......................................................................51
View Command History.................................................................................................................................................... 51
Upgrading Dell EMC Networking OS............................................................................................................................53
Verify Software Images Before Installation................................................................................................................ 53
Using HTTP for File Transfers....................................................................................................................................... 54
Chapter 4: Management.............................................................................................................. 55
Configuring Privilege Levels........................................................................................................................................... 55
Contents
Contents 3
Removing a Command from EXEC Mode............................................................................................................. 56
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 56
Allowing Access to CONFIGURATION Mode Commands................................................................................. 56
Allowing Access to Different Modes...................................................................................................................... 56
Applying a Privilege Level to a Username............................................................................................................. 58
Applying a Privilege Level to a Terminal Line....................................................................................................... 58
Configuring Logging......................................................................................................................................................... 58
Audit and Security Logs.............................................................................................................................................58
Configuring Logging Format .............................................................................................................................60
Display the Logging Buffer and the Logging Configuration..............................................................................60
Setting Up a Secure Connection to a Syslog Server................................................................................. 61
Sending System Messages to a Syslog Server.................................................................................................... 62
Track Login Activity..........................................................................................................................................................62
Restrictions for Tracking Login Activity................................................................................................................ 62
Configuring Login Activity Tracking........................................................................................................................62
Display Login Statistics.............................................................................................................................................. 63
Limit Concurrent Login Sessions...................................................................................................................................64
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 64
Configuring Concurrent Session Limit................................................................................................................... 65
Enabling the System to Clear Existing Sessions..................................................................................................65
Enabling Secured CLI Mode........................................................................................................................................... 66
Log Messages in the Internal Buffer............................................................................................................................ 66
Disabling System Logging............................................................................................................................................... 66
Sending System Messages to a Syslog Server.......................................................................................................... 67
Configuring a UNIX System as a Syslog Server...................................................................................................67
Changing System Logging Settings..............................................................................................................................67
Display the Logging Buffer and the Logging Configuration....................................................................................68
Configuring a UNIX Logging Facility Level..................................................................................................................68
Synchronizing Log Messages......................................................................................................................................... 69
Enabling Timestamp on Syslog Messages...................................................................................................................70
File Transfer Services.......................................................................................................................................................72
Enabling the FTP Server............................................................................................................................................ 73
Configuring FTP Server Parameters.......................................................................................................................73
Configuring FTP Client Parameters........................................................................................................................ 73
Terminal Lines.....................................................................................................................................................................74
Denying and Permitting Access to a Terminal Line............................................................................................. 74
Configuring Login Authentication for Terminal Lines......................................................................................... 75
Setting Timeout for EXEC Privilege Mode..................................................................................................................76
Using Telnet to get to Another Network Device....................................................................................................... 76
Lock CONFIGURATION Mode........................................................................................................................................77
LPC Bus Quality Degradation......................................................................................................................................... 78
Reloading the system....................................................................................................................................................... 78
Viewing the Reason for Last System Reboot.............................................................................................................79
Chapter 5: 802.1X....................................................................................................................... 80
Port-Authentication Process...........................................................................................................................................81
EAP over RADIUS........................................................................................................................................................82
Configuring 802.1X............................................................................................................................................................83
Important Points to Remember..................................................................................................................................... 83
Configuring dot1x Profile ................................................................................................................................................83
4
Contents
Configuring MAC addresses for a do1x Profile.......................................................................................................... 83
Configuring the Static MAB and MAB Profile ...........................................................................................................84
Configuring Critical VLAN .............................................................................................................................................. 85
Enabling 802.1X................................................................................................................................................................. 86
Configuring Request Identity Re-Transmissions........................................................................................................87
Configuring a Quiet Period after a Failed Authentication..................................................................................88
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 88
Re-Authenticating a Port................................................................................................................................................ 89
Configuring Timeouts....................................................................................................................................................... 90
Configuring Dynamic VLAN Assignment with Port Authentication....................................................................... 91
Guest and Authentication-Fail VLANs......................................................................................................................... 92
Configuring a Guest VLAN........................................................................................................................................ 92
Configuring an Authentication-Fail VLAN............................................................................................................. 92
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 94
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..............................................................94
Guidelines for Configuring ACL VLAN Groups...........................................................................................................95
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.......................................... 95
Configuring ACL VLAN Groups................................................................................................................................95
Configuring FP Blocks for VLAN Parameters.......................................................................................................96
Viewing CAM Usage......................................................................................................................................................... 97
Allocating FP Blocks for VLAN Processes.................................................................................................................. 98
Chapter 7: Access Control Lists (ACLs).......................................................................................99
IP Access Control Lists (ACLs)....................................................................................................................................100
CAM Usage................................................................................................................................................................. 100
Implementing ACLs on Dell EMC Networking OS.............................................................................................. 101
Important Points to Remember....................................................................................................................................102
Configuration Task List for Route Maps.............................................................................................................. 103
Configuring Match Routes...................................................................................................................................... 105
Configuring Set Conditions..................................................................................................................................... 106
Configure a Route Map for Route Redistribution.............................................................................................. 106
Configure a Route Map for Route Tagging......................................................................................................... 107
Continue Clause......................................................................................................................................................... 107
IP Fragment Handling..................................................................................................................................................... 108
IP Fragments ACL Examples...................................................................................................................................108
Layer 4 ACL Rules Examples...................................................................................................................................108
Configure a Standard IP ACL....................................................................................................................................... 109
Configuring a Standard IP ACL Filter.................................................................................................................... 110
Configure an Extended IP ACL...................................................................................................................................... 111
Configuring Filters with a Sequence Number.......................................................................................................111
Configuring Filters Without a Sequence Number............................................................................................... 112
Configure Layer 2 and Layer 3 ACLs........................................................................................................................... 112
Assign an IP ACL to an Interface..................................................................................................................................113
Applying an IP ACL...........................................................................................................................................................113
Counting ACL Hits......................................................................................................................................................114
Configure Ingress ACLs.................................................................................................................................................. 114
Configure Egress ACLs................................................................................................................................................... 115
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................. 115
Contents
5
IP Prefix Lists.................................................................................................................................................................... 116
Configuration Task List for Prefix Lists................................................................................................................ 116
ACL Remarks..................................................................................................................................................................... 119
Configuring a Remark............................................................................................................................................... 120
Deleting a Remark......................................................................................................................................................120
ACL Resequencing........................................................................................................................................................... 121
Resequencing an ACL or Prefix List.......................................................................................................................121
Route Maps.......................................................................................................................................................................122
Logging of ACL Processes............................................................................................................................................ 123
Guidelines for Configuring ACL Logging.............................................................................................................. 123
Configuring ACL Logging......................................................................................................................................... 124
Flow-Based Monitoring.................................................................................................................................................. 124
Enabling Flow-Based Monitoring........................................................................................................................... 126
Chapter 8: Bidirectional Forwarding Detection (BFD)................................................................ 128
How BFD Works...............................................................................................................................................................128
BFD Packet Format...................................................................................................................................................129
BFD Sessions.............................................................................................................................................................. 130
BFD Three-Way Handshake.....................................................................................................................................131
Session State Changes.............................................................................................................................................132
Important Points to Remember....................................................................................................................................132
Configure BFD.................................................................................................................................................................. 132
Configure BFD for Physical Ports..........................................................................................................................133
Configure BFD for Static Routes........................................................................................................................... 134
Configure BFD for IPv6 Static Routes................................................................................................................. 138
Configure BFD for OSPF......................................................................................................................................... 140
Configure BFD for OSPFv3..................................................................................................................................... 142
Configure BFD for IS-IS........................................................................................................................................... 145
Configure BFD for BGP............................................................................................................................................ 147
Configure BFD for VRRP......................................................................................................................................... 154
Configuring Protocol Liveness................................................................................................................................156
Chapter 9: Border Gateway Protocol (BGP)............................................................................... 157
BGP IP version 4 (BGPv4) Overview......................................................................................................................... 157
BGP Autonomous Systems......................................................................................................................................157
AS4 Number Representation.................................................................................................................................. 159
Four-Byte AS Numbers............................................................................................................................................. 161
BGP router ID.............................................................................................................................................................. 161
Sessions and Peers.................................................................................................................................................... 161
Establish a Session..................................................................................................................................................... 161
BGP Attributes for selecting Best Path............................................................................................................... 162
Multiprotocol BGP..................................................................................................................................................... 167
BGP global and address family configuration..................................................................................................... 168
Implement BGP with Dell EMC Networking OS................................................................................................. 169
Configuration Information........................................................................................................................................ 172
Basic BGP configuration tasks..................................................................................................................................... 173
Prerequisite for configuring a BGP network....................................................................................................... 173
Restrictions..................................................................................................................................................................173
Enabling BGP...............................................................................................................................................................173
6
Contents
Enabling four-byte autonomous system numbers..............................................................................................175
Changing a BGP router ID........................................................................................................................................176
Configuring AS4 Number Representations..........................................................................................................176
Configuring a BGP peer............................................................................................................................................177
Example-Configuring BGP routing between peers............................................................................................ 178
BGP peer group..........................................................................................................................................................179
Advanced BGP configuration tasks.............................................................................................................................186
Route-refresh and Soft-reconfiguration..............................................................................................................186
Aggregating Routes...................................................................................................................................................188
Filtering BGP...............................................................................................................................................................190
Configuring BGP Fast Fall-Over.............................................................................................................................195
Configuring Passive Peering....................................................................................................................................197
Enabling Graceful Restart........................................................................................................................................ 197
Redistributing Routes............................................................................................................................................... 198
Enabling Additional Paths........................................................................................................................................ 199
Configuring IP Community Lists............................................................................................................................200
Configuring an IP Extended Community List...................................................................................................... 201
Configure BGP attributes....................................................................................................................................... 202
Enabling Multipath.................................................................................................................................................... 205
Route Reflectors....................................................................................................................................................... 206
Enabling Route Flap Dampening............................................................................................................................ 207
Changing BGP keepalive and hold timers........................................................................................................... 209
Setting the extended timer..................................................................................................................................... 210
Enabling or disabling BGP neighbors.....................................................................................................................210
Route Map Continue..................................................................................................................................................211
Configuring BGP Confederations...........................................................................................................................212
Configuring a BGP VRF address family................................................................................................................ 212
Maintaining Existing AS Numbers During an AS Migration..............................................................................214
Allowing an AS Number to Appear in its Own AS Path.................................................................................... 214
Enabling MBGP Configurations.............................................................................................................................. 215
MBGP support for IPv6............................................................................................................................................216
Configuring IPv6 MBGP between peers.............................................................................................................. 216
Example-Configuring IPv4 and IPv6 neighbors.................................................................................................. 216
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor................................... 219
BGP Regular Expression Optimization.................................................................................................................220
Debugging BGP......................................................................................................................................................... 220
Chapter 10: Content Addressable Memory (CAM)......................................................................223
CAM Allocation................................................................................................................................................................ 223
Test CAM Usage............................................................................................................................................................. 225
View CAM-ACL Settings...............................................................................................................................................225
View CAM Usage.............................................................................................................................................................227
Configuring CAM Threshold and Silence Period......................................................................................................227
CAM Optimization...........................................................................................................................................................228
Troubleshoot CAM Profiling......................................................................................................................................... 228
QoS CAM Region Limitation...................................................................................................................................228
Chapter 11: Control Plane Policing (CoPP)................................................................................ 230
Configure Control Plane Policing................................................................................................................................. 231
Contents
7
Configuring CoPP for Protocols............................................................................................................................232
Configuring CoPP for CPU Queues......................................................................................................................233
CoPP for OSPFv3 Packets.....................................................................................................................................234
Configuring CoPP for OSPFv3.............................................................................................................................. 237
Displaying CoPP Configuration .............................................................................................................................238
Chapter 12: Dynamic Host Configuration Protocol (DHCP)........................................................ 240
DHCP Packet Format and Options.............................................................................................................................240
Assign an IP Address using DHCP.............................................................................................................................. 242
Implementation Information..........................................................................................................................................242
Configure the System to be a DHCP Server............................................................................................................243
Configuring the Server for Automatic Address Allocation.............................................................................. 243
Specifying a Default Gateway................................................................................................................................244
Configure a Method of Hostname Resolution....................................................................................................245
Using DNS for Address Resolution....................................................................................................................... 245
Using NetBIOS WINS for Address Resolution................................................................................................... 245
Creating Manual Binding Entries........................................................................................................................... 245
Debugging the DHCP Server................................................................................................................................. 246
Using DHCP Clear Commands...............................................................................................................................246
Configure the System to be a Relay Agent.............................................................................................................. 246
Configure the System to be a DHCP Client............................................................................................................. 248
Configuring the DHCP Client System.................................................................................................................. 248
DHCP Client on a Management Interface...........................................................................................................249
DHCP Client Operation with Other Features.....................................................................................................250
DHCP Relay When DHCP Server and Client are in Different VRFs.................................................................... 251
Configuring Route Leaking between VRFs on DHCP Relay Agent................................................................251
Non-default VRF configuration for DHCPv6 helper address...............................................................................252
Configuring DHCP relay source interface.................................................................................................................252
Global DHCP relay source IPv4 or IPv6 configuration ....................................................................................252
Interface level DHCP relay source IPv4 or IPv6 configuration .....................................................................253
Configure the System for User Port Stacking (Option 230)............................................................................... 254
Configure Secure DHCP............................................................................................................................................... 254
Option 82 (DHCPv4 relay options).......................................................................................................................254
DHCPv6 relay agent options..................................................................................................................................255
DHCP Snooping.........................................................................................................................................................255
Drop DHCP Packets on Snooped VLANs Only.................................................................................................. 260
Dynamic ARP Inspection......................................................................................................................................... 260
Configuring Dynamic ARP Inspection.................................................................................................................. 260
Source Address Validation............................................................................................................................................ 262
Enabling IP Source Address Validation................................................................................................................ 262
DHCP MAC Source Address Validation............................................................................................................... 262
Enabling IP+MAC Source Address Validation.................................................................................................... 263
Viewing the Number of SAV Dropped Packets................................................................................................. 263
Clearing the Number of SAV Dropped Packets.................................................................................................264
Chapter 13: Equal Cost Multi-Path (ECMP)............................................................................... 265
ECMP for Flow-Based Affinity.................................................................................................................................... 265
Configuring the Hash Algorithm............................................................................................................................265
Enabling Deterministic ECMP Next Hop............................................................................................................. 265
8
Contents
Configuring the Hash Algorithm Seed................................................................................................................. 266
Link Bundle Monitoring..................................................................................................................................................266
Managing ECMP Group Paths............................................................................................................................... 267
Creating an ECMP Group Bundle..........................................................................................................................267
Modifying the ECMP Group Threshold................................................................................................................267
Chapter 14: FIPS Cryptography................................................................................................. 269
Configuration Tasks....................................................................................................................................................... 269
Preparing the System.................................................................................................................................................... 269
Enabling FIPS Mode....................................................................................................................................................... 269
Generating Host-Keys....................................................................................................................................................270
Monitoring FIPS Mode Status......................................................................................................................................270
Disabling FIPS Mode.......................................................................................................................................................270
Chapter 15: Force10 Resilient Ring Protocol (FRRP)..................................................................272
Protocol Overview.......................................................................................................................................................... 272
Ring Status................................................................................................................................................................. 273
Multiple FRRP Rings.................................................................................................................................................273
Important FRRP Points............................................................................................................................................274
Important FRRP Concepts......................................................................................................................................275
Implementing FRRP........................................................................................................................................................ 275
FRRP Configuration........................................................................................................................................................276
Creating the FRRP Group....................................................................................................................................... 276
Configuring the Control VLAN............................................................................................................................... 276
Configuring and Adding the Member VLANs......................................................................................................277
Setting the FRRP Timers........................................................................................................................................ 278
Clearing the FRRP Counters.................................................................................................................................. 278
Viewing the FRRP Configuration...........................................................................................................................278
Viewing the FRRP Information...............................................................................................................................278
Troubleshooting FRRP...................................................................................................................................................279
Sample Configuration and Topology...........................................................................................................................279
FRRP Support on VLT................................................................................................................................................... 280
Chapter 16: GARP VLAN Registration Protocol (GVRP)............................................................. 283
Configure GVRP..............................................................................................................................................................284
Enabling GVRP Globally.................................................................................................................................................284
Enabling GVRP on a Layer 2 Interface...................................................................................................................... 285
Configure GVRP Registration...................................................................................................................................... 285
Configure a GARP Timer...............................................................................................................................................286
RPM Redundancy........................................................................................................................................................... 286
Chapter 17: High Availability (HA)..............................................................................................287
Component Redundancy............................................................................................................................................... 287
Automatic and Manual Stack Unit Failover.........................................................................................................287
Synchronization between Management and Standby Units...........................................................................288
Forcing a Stack Unit Failover.................................................................................................................................288
Specifying an Auto-Failover Limit......................................................................................................................... 288
Disabling Auto-Reboot.............................................................................................................................................289
Pre-Configuring a Stack Unit Slot.............................................................................................................................. 289
Contents
9
Removing a Provisioned Logical Stack Unit............................................................................................................. 289
Hitless Behavior...............................................................................................................................................................289
Graceful Restart..............................................................................................................................................................289
Software Resiliency........................................................................................................................................................290
Software Component Health Monitoring............................................................................................................290
System Health Monitoring...................................................................................................................................... 290
Failure and Event Logging...................................................................................................................................... 290
Hot-Lock Behavior.......................................................................................................................................................... 291
Chapter 18: Internet Group Management Protocol (IGMP)........................................................ 292
IGMP Protocol Overview.............................................................................................................................................. 292
IGMP Version 2..........................................................................................................................................................292
IGMP Version 3..........................................................................................................................................................294
Configure IGMP...............................................................................................................................................................296
Viewing IGMP Enabled Interfaces...............................................................................................................................297
Selecting an IGMP Version........................................................................................................................................... 297
Viewing IGMP Groups....................................................................................................................................................298
Adjusting Timers..............................................................................................................................................................298
Adjusting Query and Response Timers................................................................................................................ 298
Preventing a Host from Joining a Group.................................................................................................................. 299
Enabling IGMP Immediate-Leave.................................................................................................................................301
IGMP Snooping................................................................................................................................................................302
Configuring IGMP Snooping................................................................................................................................... 302
Removing a Group-Port Association.................................................................................................................... 302
Disabling Multicast Flooding................................................................................................................................... 303
Specifying a Port as Connected to a Multicast Router................................................................................... 303
Configuring the Switch as Querier........................................................................................................................303
Fast Convergence after MSTP Topology Changes................................................................................................304
Egress Interface Selection (EIS) for HTTP and IGMP Applications...................................................................304
Designating a Multicast Router Interface...................................................................................................................311
Chapter 19: Interfaces............................................................................................................... 312
Interface Types................................................................................................................................................................ 313
View Basic Interface Information.................................................................................................................................313
Resetting an Interface to its Factory Default State............................................................................................... 315
Enabling a Physical Interface........................................................................................................................................315
Enabling Energy Efficient Ethernet............................................................................................................................. 316
View EEE Information..................................................................................................................................................... 316
Clear EEE Counters........................................................................................................................................................320
Physical Interfaces.......................................................................................................................................................... 321
Configuration Task List for Physical Interfaces..................................................................................................321
Overview of Layer Modes........................................................................................................................................321
Configuring Layer 2 (Data Link) Mode................................................................................................................. 321
Configuring Layer 2 (Interface) Mode................................................................................................................. 322
Configuring Layer 3 (Network) Mode..................................................................................................................322
Configuring Layer 3 (Interface) Mode................................................................................................................. 323
Automatic recovery of an Err-disabled interface....................................................................................................323
Configuring an automatic recovery for an Err-disabled interface.................................................................324
Egress Interface Selection (EIS).................................................................................................................................324
10
Contents
Configuring EIS..........................................................................................................................................................325
Management Interfaces................................................................................................................................................ 325
Configuring Management Interfaces....................................................................................................................325
Configuring a Management Interface on an Ethernet Port............................................................................326
VLAN Interfaces.............................................................................................................................................................. 327
Loopback Interfaces.......................................................................................................................................................328
Null Interfaces..................................................................................................................................................................328
Port Channel Interfaces................................................................................................................................................ 328
Port Channel Definition and Standards............................................................................................................... 328
Port Channel Benefits..............................................................................................................................................329
Port Channel Implementation.................................................................................................................................329
Interfaces in Port Channels.................................................................................................................................... 329
Configuration Tasks for Port Channel Interfaces............................................................................................. 330
Creating a Port Channel.......................................................................................................................................... 330
Adding a Physical Interface to a Port Channel.................................................................................................. 330
Reassigning an Interface to a New Port Channel............................................................................................. 332
Configuring the Minimum Oper Up Links in a Port Channel...........................................................................332
Adding or Removing a Port Channel from a VLAN........................................................................................... 333
Assigning an IP Address to a Port Channel........................................................................................................ 334
Deleting or Disabling a Port Channel.................................................................................................................... 334
Load Balancing Through Port Channels.............................................................................................................. 334
Changing the Hash Algorithm................................................................................................................................ 334
Bulk Configuration.......................................................................................................................................................... 335
Interface Range......................................................................................................................................................... 335
Bulk Configuration Examples..................................................................................................................................336
Defining Interface Range Macros................................................................................................................................337
Define the Interface Range.....................................................................................................................................338
Choosing an Interface-Range Macro................................................................................................................... 338
Monitoring and Maintaining Interfaces......................................................................................................................338
Maintenance Using TDR..........................................................................................................................................339
Configuring wavelength for 10Gigabit SFP+ optics.............................................................................................339
Link Dampening............................................................................................................................................................... 340
Enabling Link Dampening.........................................................................................................................................342
Link Bundle Monitoring.................................................................................................................................................. 343
Using Ethernet Pause Frames for Flow Control......................................................................................................343
Enabling Pause Frames............................................................................................................................................ 344
Configure the MTU Size on an Interface.................................................................................................................. 344
Port-Pipes.........................................................................................................................................................................345
Auto-Negotiation on Ethernet Interfaces................................................................................................................. 345
Setting the Speed of Ethernet Interfaces.......................................................................................................... 346
Set Auto-Negotiation Options................................................................................................................................347
View Advanced Interface Information........................................................................................................................347
Configuring the Interface Sampling Size.............................................................................................................348
Configuring the Traffic Sampling Size Globally....................................................................................................... 349
Dynamic Counters.......................................................................................................................................................... 350
Clearing Interface Counters.................................................................................................................................... 351
Discard Counters............................................................................................................................................................. 351
Display discard counters..........................................................................................................................................352
Chapter 20: Internet Protocol Security (IPSec).........................................................................354
Contents
11
Configuring IPSec ..........................................................................................................................................................354
Chapter 21: IPv4 Routing...........................................................................................................356
IP Addresses.....................................................................................................................................................................357
Configuration Tasks for IP Addresses........................................................................................................................357
Assigning IP Addresses to an Interface..................................................................................................................... 357
Configuring Static Routes............................................................................................................................................ 358
Adding description for IPv4 and IPv6 static routes..........................................................................................359
Configure Static Routes for the Management Interface...................................................................................... 360
IPv4 Path MTU Discovery Overview......................................................................................................................... 360
Using the Configured Source IP Address in ICMP Messages...............................................................................361
Configuring the Duration to Establish a TCP Connection..................................................................................... 361
Enabling Directed Broadcast.........................................................................................................................................361
Resolution of Host Names............................................................................................................................................ 362
Enabling Dynamic Resolution of Host Names.......................................................................................................... 362
Specifying the Local System Domain and a List of Domains............................................................................... 363
Configuring DNS with Traceroute.............................................................................................................................. 363
ARP.....................................................................................................................................................................................364
Configuration Tasks for ARP........................................................................................................................................364
Configuring Static ARP Entries................................................................................................................................... 364
Enabling Proxy ARP........................................................................................................................................................365
Clearing ARP Cache....................................................................................................................................................... 365
ARP Learning via Gratuitous ARP...............................................................................................................................365
Enabling ARP Learning via Gratuitous ARP..............................................................................................................365
ARP Learning via ARP Request...................................................................................................................................366
Configuring ARP Retries............................................................................................................................................... 366
ICMP.................................................................................................................................................................................. 367
Configuration Tasks for ICMP..................................................................................................................................... 367
Enabling ICMP Unreachable Messages..................................................................................................................... 367
ICMP Redirects............................................................................................................................................................... 367
UDP Helper.......................................................................................................................................................................368
Enabling UDP Helper......................................................................................................................................................369
Configurations Using UDP Helper...............................................................................................................................369
UDP Helper with Broadcast-All Addresses...............................................................................................................369
UDP Helper with Subnet Broadcast Addresses.......................................................................................................370
UDP Helper with Configured Broadcast Addresses............................................................................................... 370
UDP Helper with No Configured Broadcast Addresses..........................................................................................371
Troubleshooting UDP Helper.........................................................................................................................................371
Chapter 22: IPv6 Routing.......................................................................................................... 372
Protocol Overview.......................................................................................................................................................... 372
Extended Address Space.........................................................................................................................................372
Stateless Autoconfiguration................................................................................................................................... 372
IPv6 Headers.............................................................................................................................................................. 373
IPv6 Header Fields.................................................................................................................................................... 373
Extension Header Fields.......................................................................................................................................... 375
Addressing...................................................................................................................................................................376
Implementing IPv6 with Dell EMC Networking OS................................................................................................. 377
ICMPv6..............................................................................................................................................................................378
12
Contents
Path MTU discovery.......................................................................................................................................................379
IPv6 Neighbor Discovery...............................................................................................................................................379
IPv6 Neighbor Discovery of MTU Packets......................................................................................................... 380
Configuration Task List for IPv6 RDNSS.................................................................................................................. 380
Configuring the IPv6 Recursive DNS Server..................................................................................................... 380
Debugging IPv6 RDNSS Information Sent to the Host ...................................................................................381
Displaying IPv6 RDNSS Information......................................................................................................................381
Secure Shell (SSH) Over an IPv6 Transport............................................................................................................382
Configuration Tasks for IPv6....................................................................................................................................... 382
Adjusting Your CAM-Profile....................................................................................................................................382
Assigning an IPv6 Address to an Interface......................................................................................................... 383
Assigning a Static IPv6 Route................................................................................................................................383
Configuring Telnet with IPv6................................................................................................................................. 384
SNMP over IPv6........................................................................................................................................................384
Displaying IPv6 Information....................................................................................................................................385
Displaying an IPv6 Interface Information............................................................................................................ 385
Showing IPv6 Routes...............................................................................................................................................386
Showing the Running-Configuration for an Interface...................................................................................... 387
Clearing IPv6 Routes................................................................................................................................................ 387
Disabling ND Entry Timeout....................................................................................................................................387
Configuring IPv6 RA Guard.......................................................................................................................................... 388
Configuring IPv6 RA Guard on an Interface....................................................................................................... 389
Monitoring IPv6 RA Guard......................................................................................................................................390
Chapter 23: Intermediate System to Intermediate System......................................................... 391
IS-IS Protocol Overview................................................................................................................................................ 391
IS-IS Addressing...............................................................................................................................................................391
Multi-Topology IS-IS...................................................................................................................................................... 392
Transition Mode.........................................................................................................................................................392
Interface Support......................................................................................................................................................392
Adjacencies.................................................................................................................................................................392
Graceful Restart..............................................................................................................................................................393
Timers.......................................................................................................................................................................... 393
Implementation Information......................................................................................................................................... 393
Configuration Information.............................................................................................................................................394
Configuration Tasks for IS-IS.................................................................................................................................394
Configuring the Distance of a Route.................................................................................................................... 401
Changing the IS-Type............................................................................................................................................... 401
Redistributing IPv4 Routes..................................................................................................................................... 403
Redistributing IPv6 Routes..................................................................................................................................... 404
Configuring Authentication Passwords............................................................................................................... 405
Setting the Overload Bit......................................................................................................................................... 405
Debugging IS-IS.........................................................................................................................................................406
IS-IS Metric Styles..........................................................................................................................................................406
Configure Metric Values................................................................................................................................................407
Maximum Values in the Routing Table................................................................................................................. 407
Change the IS-IS Metric Style in One Level Only............................................................................................. 407
Leaks from One Level to Another.........................................................................................................................408
Sample Configurations...................................................................................................................................................409
Contents
13
Chapter 24: Link Aggregation Control Protocol (LACP)..............................................................412
Introduction to Dynamic LAGs and LACP..................................................................................................................412
Important Points to Remember..............................................................................................................................412
LACP Modes............................................................................................................................................................... 413
Configuring LACP Commands................................................................................................................................ 413
LACP Configuration Tasks.............................................................................................................................................413
Creating a LAG........................................................................................................................................................... 414
Configuring the LAG Interfaces as Dynamic....................................................................................................... 414
Setting the LACP Long Timeout............................................................................................................................ 414
Monitoring and Debugging LACP...........................................................................................................................415
Shared LAG State Tracking.......................................................................................................................................... 415
Configuring Shared LAG State Tracking..............................................................................................................416
Important Points about Shared LAG State Tracking.........................................................................................417
LACP Basic Configuration Example.............................................................................................................................418
Configure a LAG on ALPHA.................................................................................................................................... 418
Chapter 25: Layer 2................................................................................................................... 426
Manage the MAC Address Table................................................................................................................................ 426
Clearing the MAC Address Table.......................................................................................................................... 426
Setting the Aging Time for Dynamic Entries...................................................................................................... 426
Configuring a Static MAC Address....................................................................................................................... 427
Displaying the MAC Address Table....................................................................................................................... 427
MAC Learning Limit........................................................................................................................................................ 427
Setting the MAC Learning Limit............................................................................................................................ 428
mac learning-limit Dynamic..................................................................................................................................... 428
mac learning-limit mac-address-sticky................................................................................................................ 428
mac learning-limit station-move............................................................................................................................ 428
mac learning-limit no-station-move......................................................................................................................429
Learning Limit Violation Actions............................................................................................................................ 429
Setting Station Move Violation Actions...............................................................................................................429
Recovering from Learning Limit and Station Move Violations.......................................................................430
Disabling MAC Address Learning on the System.............................................................................................. 430
Enabling port security.............................................................................................................................................. 430
NIC Teaming..................................................................................................................................................................... 431
Configure Redundant Pairs...........................................................................................................................................432
Far-End Failure Detection.............................................................................................................................................435
FEFD State Changes................................................................................................................................................435
Configuring FEFD......................................................................................................................................................436
Enabling FEFD on an Interface...............................................................................................................................437
Debugging FEFD........................................................................................................................................................438
Chapter 26: Link Layer Discovery Protocol (LLDP).................................................................... 439
802.1AB (LLDP) Overview............................................................................................................................................439
Protocol Data Units.................................................................................................................................................. 439
Optional TLVs................................................................................................................................................................... 441
Management TLVs.....................................................................................................................................................441
TIA-1057 (LLDP-MED) Overview............................................................................................................................... 442
TIA Organizationally Specific TLVs....................................................................................................................... 443
14
Contents
Configure LLDP............................................................................................................................................................... 446
CONFIGURATION versus INTERFACE Configurations..........................................................................................447
Enabling LLDP..................................................................................................................................................................447
Disabling and Undoing LLDP...................................................................................................................................447
Enabling LLDP on Management Ports....................................................................................................................... 448
Disabling and Undoing LLDP on Management Ports........................................................................................448
Advertising TLVs............................................................................................................................................................. 448
Storing and Viewing Unrecognized LLDP TLVs...................................................................................................... 449
Viewing the LLDP Configuration.................................................................................................................................450
Viewing Information Advertised by Adjacent LLDP Neighbors............................................................................ 451
Examples of Viewing Information Advertised by Neighbors............................................................................451
Configuring LLDPDU Intervals.....................................................................................................................................453
Configuring LLDP Notification Interval......................................................................................................................454
Configuring LLDP Notification Interval......................................................................................................................454
Configuring Transmit and Receive Mode..................................................................................................................454
Configuring the Time to Live Value............................................................................................................................455
Debugging LLDP............................................................................................................................................................. 456
Relevant Management Objects................................................................................................................................... 457
Chapter 27: Microsoft Network Load Balancing......................................................................... 462
Configuring a Switch for NLB .....................................................................................................................................463
Enabling a Switch for Multicast NLB................................................................................................................... 464
Chapter 28: Multicast Source Discovery Protocol (MSDP)........................................................ 465
Anycast RP.......................................................................................................................................................................466
Implementation Information..........................................................................................................................................467
Configure Multicast Source Discovery Protocol..................................................................................................... 467
Related Configuration Tasks.................................................................................................................................. 467
Enable MSDP.................................................................................................................................................................... 471
Manage the Source-Active Cache..............................................................................................................................472
Viewing the Source-Active Cache........................................................................................................................ 472
Limiting the Source-Active Cache........................................................................................................................ 472
Clearing the Source-Active Cache........................................................................................................................472
Enabling the Rejected Source-Active Cache......................................................................................................473
Accept Source-Active Messages that Fail the RFP Check.................................................................................. 473
Specifying Source-Active Messages..........................................................................................................................476
Limiting the Source-Active Messages from a Peer................................................................................................ 477
Preventing MSDP from Caching a Local Source.....................................................................................................477
Preventing MSDP from Caching a Remote Source................................................................................................478
Preventing MSDP from Advertising a Local Source...............................................................................................478
Logging Changes in Peership States..........................................................................................................................479
Terminating a Peership..................................................................................................................................................479
Clearing Peer Statistics................................................................................................................................................. 479
Debugging MSDP............................................................................................................................................................480
MSDP with Anycast RP.................................................................................................................................................480
Configuring Anycast RP.................................................................................................................................................481
Reducing Source-Active Message Flooding....................................................................................................... 482
Specifying the RP Address Used in SA Messages............................................................................................ 482
MSDP Sample Configurations......................................................................................................................................484
Contents
15
Chapter 29: Multicast Listener Discovery Protocol.................................................................... 487
MLD timers.......................................................................................................................................................................490
Reducing Host Response Burstiness....................................................................................................................490
Configuring MLD Version...............................................................................................................................................491
Clearing MLD groups...................................................................................................................................................... 491
Debugging MLD................................................................................................................................................................491
Explicit Tracking...............................................................................................................................................................491
Reducing Leave Latency................................................................................................................................................491
Displaying MLD groups table........................................................................................................................................492
Displaying MLD Interfaces............................................................................................................................................ 492
MLD Snooping................................................................................................................................................................. 492
Enable MLD Snooping..............................................................................................................................................493
Disable MLD Snooping............................................................................................................................................. 493
Configure the switch as a querier.........................................................................................................................493
Specify port as connected to multicast router..................................................................................................493
Enable Snooping Explicit Tracking........................................................................................................................ 493
Display the MLD Snooping Table...........................................................................................................................494
Chapter 30: Multiple Spanning Tree Protocol (MSTP)............................................................... 495
Spanning Tree Variations.............................................................................................................................................. 496
Implementation Information....................................................................................................................................496
Configure Multiple Spanning Tree Protocol............................................................................................................. 496
Related Configuration Tasks.................................................................................................................................. 496
Enable Multiple Spanning Tree Globally.....................................................................................................................497
Adding and Removing Interfaces................................................................................................................................ 497
Creating Multiple Spanning Tree Instances.............................................................................................................. 497
Influencing MSTP Root Selection............................................................................................................................... 498
Interoperate with Non-Dell Bridges............................................................................................................................499
Changing the Region Name or Revision....................................................................................................................499
Modifying Global Parameters.......................................................................................................................................499
Modifying the Interface Parameters..........................................................................................................................500
Setting STP path cost as constant.............................................................................................................................501
Configuring an EdgePort...............................................................................................................................................502
Flush MAC Addresses after a Topology Change.................................................................................................... 502
MSTP Sample Configurations......................................................................................................................................502
Debugging and Verifying MSTP Configurations......................................................................................................506
Chapter 31: Multicast Features..................................................................................................508
Enabling IP Multicast..................................................................................................................................................... 508
Implementation Information......................................................................................................................................... 508
Multicast Policies............................................................................................................................................................509
IPv4 Multicast Policies.............................................................................................................................................509
Understanding Multicast Traceroute (mtrace)........................................................................................................515
Printing Multicast Traceroute (mtrace) Paths.........................................................................................................515
Supported Error Codes.................................................................................................................................................. 517
mtrace Scenarios.............................................................................................................................................................518
Chapter 32: Object Tracking......................................................................................................524
16
Contents
Object Tracking Overview............................................................................................................................................ 524
Track Layer 2 Interfaces......................................................................................................................................... 525
Track Layer 3 Interfaces......................................................................................................................................... 525
Track IPv4 and IPv6 Routes...................................................................................................................................525
Set Tracking Delays..................................................................................................................................................526
VRRP Object Tracking............................................................................................................................................. 527
Object Tracking Configuration.....................................................................................................................................527
Tracking a Layer 2 Interface...................................................................................................................................527
Tracking a Layer 3 Interface.................................................................................................................................. 528
Track an IPv4/IPv6 Route...................................................................................................................................... 529
Displaying Tracked Objects.......................................................................................................................................... 532
Chapter 33: Open Shortest Path First (OSPFv2 and OSPFv3)................................................... 534
Protocol Overview..........................................................................................................................................................534
Autonomous System (AS) Areas...........................................................................................................................534
Area Types..................................................................................................................................................................535
Networks and Neighbors.........................................................................................................................................536
Router Types..............................................................................................................................................................536
Designated and Backup Designated Routers..................................................................................................... 537
Link-State Advertisements (LSAs).......................................................................................................................537
Router Priority and Cost......................................................................................................................................... 538
OSPF with Dell EMC Networking OS........................................................................................................................ 539
Graceful Restart........................................................................................................................................................539
Fast Convergence (OSPFv2, IPv4 Only)............................................................................................................ 540
Multi-Process OSPFv2 with VRF.......................................................................................................................... 541
OSPF ACK Packing................................................................................................................................................... 541
Setting OSPF Adjacency with Cisco Routers..................................................................................................... 541
Configuration Information.............................................................................................................................................542
Configuration Task List for OSPFv2 (OSPF for IPv4).....................................................................................542
OSPFv3 NSSA................................................................................................................................................................. 554
Configuration Task List for OSPFv3 (OSPF for IPv6).......................................................................................... 555
Enabling IPv6 Unicast Routing.............................................................................................................................. 555
Applying cost for OSPFv3...................................................................................................................................... 555
Assigning IPv6 Addresses on an Interface..........................................................................................................556
Assigning Area ID on an Interface.........................................................................................................................556
Assigning OSPFv3 Process ID and Router ID Globally.....................................................................................556
Assigning OSPFv3 Process ID and Router ID to a VRF................................................................................... 557
Configuring Stub Areas............................................................................................................................................557
Configuring Passive-Interface............................................................................................................................... 557
Redistributing Routes.............................................................................................................................................. 558
Configuring a Default Route...................................................................................................................................558
Enabling OSPFv3 Graceful Restart...................................................................................................................... 558
OSPFv3 Authentication Using IPsec....................................................................................................................560
Troubleshooting OSPFv3........................................................................................................................................ 566
MIB Support for OSPFv3........................................................................................................................................ 567
Chapter 34: Policy-based Routing (PBR)...................................................................................568
Overview...........................................................................................................................................................................568
Implementing PBR.......................................................................................................................................................... 569
Contents
17
Configuration Task List for Policy-based Routing.................................................................................................. 569
Create a Redirect List.............................................................................................................................................. 570
Create a Rule for a Redirect-list............................................................................................................................570
Apply a Redirect-list to an Interface using a Redirect-group.........................................................................572
Sample Configuration.....................................................................................................................................................573
Chapter 35: PIM Sparse-Mode (PIM-SM).................................................................................. 577
Implementation Information..........................................................................................................................................577
Protocol Overview.......................................................................................................................................................... 577
Requesting Multicast Traffic.................................................................................................................................. 577
Refuse Multicast Traffic..........................................................................................................................................578
Send Multicast Traffic............................................................................................................................................. 578
Configuring PIM-SM...................................................................................................................................................... 578
Related Configuration Tasks.................................................................................................................................. 579
Enable PIM-SM................................................................................................................................................................579
Configuring S,G Expiry Timers..................................................................................................................................... 581
Configuring a Static Rendezvous Point..................................................................................................................... 581
Overriding Bootstrap Router Updates................................................................................................................. 582
Configuring a Designated Router................................................................................................................................582
Creating Multicast Boundaries and Domains........................................................................................................... 584
Electing an RP using the BSR Mechanism............................................................................................................... 584
Chapter 36: PIM Source-Specific Mode (PIM-SSM).................................................................. 586
Implementation Information......................................................................................................................................... 586
Configure PIM-SSM.......................................................................................................................................................586
Enabling PIM-SSM..........................................................................................................................................................587
Use PIM-SSM with IGMP Version 2 Hosts...............................................................................................................587
Electing an RP using the BSR Mechanism............................................................................................................... 588
Enabling RP to Server Specific Multicast Groups............................................................................................ 590
Chapter 37: Port Monitoring...................................................................................................... 591
Important Points to Remember....................................................................................................................................591
Port Monitoring............................................................................................................................................................... 592
Configuring Port Monitoring........................................................................................................................................ 594
Configuring Monitor Multicast Queue....................................................................................................................... 595
Enabling Flow-Based Monitoring................................................................................................................................ 596
Remote Port Mirroring...................................................................................................................................................597
Remote Port Mirroring Example............................................................................................................................597
Configuring Remote Port Mirroring......................................................................................................................598
Displaying Remote-Port Mirroring Configurations............................................................................................599
Configuration procedure for Remote Port Mirroring....................................................................................... 600
Encapsulated Remote Port Monitoring..................................................................................................................... 604
ERPM Behavior on a typical Dell EMC Networking OS ....................................................................................... 606
Port Monitoring on VLT.................................................................................................................................................607
Chapter 38: Private VLANs (PVLAN)..........................................................................................610
Private VLAN Concepts.................................................................................................................................................610
Using the Private VLAN Commands............................................................................................................................ 611
Configuration Task List.................................................................................................................................................. 612
18
Contents
Creating PVLAN ports.............................................................................................................................................. 612
Creating a Primary VLAN.........................................................................................................................................612
Creating a Community VLAN..................................................................................................................................613
Creating an Isolated VLAN...................................................................................................................................... 614
Private VLAN Configuration Example.........................................................................................................................615
Inspecting the Private VLAN Configuration..............................................................................................................616
Chapter 39: Per-VLAN Spanning Tree Plus (PVST+).................................................................. 618
Protocol Overview...........................................................................................................................................................618
Implementation Information.......................................................................................................................................... 619
Configure Per-VLAN Spanning Tree Plus................................................................................................................. 620
Enabling PVST+...............................................................................................................................................................620
Disabling PVST+..............................................................................................................................................................620
Influencing PVST+ Root Selection.............................................................................................................................. 621
Modifying Global PVST+ Parameters........................................................................................................................ 622
Modifying Interface PVST+ Parameters................................................................................................................... 622
Configuring an EdgePort...............................................................................................................................................623
PVST+ in Multi-Vendor Networks.............................................................................................................................. 624
Enabling PVST+ Extend System ID............................................................................................................................ 624
PVST+ Sample Configurations.................................................................................................................................... 625
Chapter 40: Quality of Service (QoS)........................................................................................ 627
Implementation Information......................................................................................................................................... 629
Port-Based QoS Configurations..................................................................................................................................629
Setting dot1p Priorities for Incoming Traffic......................................................................................................629
Honoring dot1p Priorities on Ingress Traffic.......................................................................................................630
Configuring Port-Based Rate Policing................................................................................................................. 630
Configuring Port-Based Rate Shaping..................................................................................................................631
Policy-Based QoS Configurations...............................................................................................................................632
Classify Traffic...........................................................................................................................................................632
Create a QoS Policy................................................................................................................................................. 635
Create Policy Maps...................................................................................................................................................637
DSCP Color Maps........................................................................................................................................................... 640
Creating a DSCP Color Map...................................................................................................................................640
Displaying DSCP Color Maps.................................................................................................................................. 641
Displaying a DSCP Color Policy Configuration .................................................................................................. 641
Enabling QoS Rate Adjustment................................................................................................................................... 642
Enabling Strict-Priority Queueing............................................................................................................................... 642
Weighted Random Early Detection.............................................................................................................................643
Creating WRED Profiles.......................................................................................................................................... 643
Applying a WRED Profile to Traffic...................................................................................................................... 644
Displaying Default and Configured WRED Profiles........................................................................................... 644
Displaying WRED Drop Statistics.......................................................................................................................... 644
Displaying egressqueue Statistics...................................................................................................................... 645
Pre-Calculating Available QoS CAM Space..............................................................................................................645
Configuring Weights and ECN for WRED ................................................................................................................646
Configuring WRED and ECN Attributes.................................................................................................................... 647
Guidelines for Configuring ECN for Classifying and Color-Marking Packets................................................... 648
Sample configuration to mark non-ecn packets as yellow with Multiple traffic class..........................648
Contents
19
Classifying Incoming Packets Using ECN and Color-Marking........................................................................649
Sample configuration to mark non-ecn packets as yellow with single traffic class..............................650
Applying Layer 2 Match Criteria on a Layer 3 Interface........................................................................................ 651
Applying DSCP and VLAN Match Criteria on a Service Queue...........................................................................652
Classifying Incoming Packets Using ECN and Color-Marking............................................................................. 652
Guidelines for Configuring ECN for Classifying and Color-Marking Packets...................................................654
Sample configuration to mark non-ecn packets as yellow with Multiple traffic class............................... 655
Sample configuration to mark non-ecn packets as yellow with single traffic class....................................655
Chapter 41: Routing Information Protocol (RIP)........................................................................ 657
Protocol Overview.......................................................................................................................................................... 657
RIPv1.............................................................................................................................................................................657
RIPv2............................................................................................................................................................................657
Implementation Information..........................................................................................................................................657
Configuration Information.............................................................................................................................................658
Configuration Task List............................................................................................................................................658
RIP Configuration Example.....................................................................................................................................663
Chapter 42: Remote Monitoring (RMON).................................................................................. 669
Implementation Information......................................................................................................................................... 669
Fault Recovery................................................................................................................................................................ 669
Setting the RMON Alarm........................................................................................................................................ 669
Configuring an RMON Event..................................................................................................................................670
Configuring RMON Collection Statistics..............................................................................................................671
Configuring the RMON Collection History...........................................................................................................671
Chapter 43: Rapid Spanning Tree Protocol (RSTP)....................................................................672
Protocol Overview.......................................................................................................................................................... 672
Configuring Rapid Spanning Tree................................................................................................................................672
Important Points to Remember................................................................................................................................... 673
RSTP and VLT............................................................................................................................................................673
Configuring Interfaces for Layer 2 Mode..................................................................................................................673
Enabling Rapid Spanning Tree Protocol Globally.....................................................................................................674
Adding and Removing Interfaces................................................................................................................................ 676
Modifying Global Parameters.......................................................................................................................................676
Enabling SNMP Traps for Root Elections and Topology Changes................................................................ 677
Modifying Interface Parameters..................................................................................................................................677
Enabling SNMP Traps for Root Elections and Topology Changes......................................................................678
Influencing RSTP Root Selection................................................................................................................................ 678
Configuring an EdgePort...............................................................................................................................................678
Configuring Fast Hellos for Link State Detection................................................................................................... 679
Chapter 44: Software-Defined Networking (SDN)..................................................................... 680
Chapter 45: Security..................................................................................................................681
AAA Accounting............................................................................................................................................................... 681
Configuration Task List for AAA Accounting...................................................................................................... 681
RADIUS Accounting..................................................................................................................................................683
AAA Authentication........................................................................................................................................................ 688
20
Contents
/