PowerSwitch S3048-ON

Dell PowerSwitch S3048-ON Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S3048-ON Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Conguration Guide for the S3048–ON
System
9.14.1.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2018 - 11
Rev. A00
Contents
1 About this Guide...........................................................................................................................................34
Audience............................................................................................................................................................................34
Conventions......................................................................................................................................................................34
Related Documents......................................................................................................................................................... 34
2 Conguration Fundamentals........................................................................................................................ 35
Accessing the Command Line........................................................................................................................................35
CLI Modes.........................................................................................................................................................................35
Navigating CLI Modes............................................................................................................................................... 37
The do Command............................................................................................................................................................ 40
Undoing Commands........................................................................................................................................................ 40
Obtaining Help...................................................................................................................................................................41
Entering and Editing Commands.................................................................................................................................... 41
Command History............................................................................................................................................................ 42
Filtering show Command Outputs.................................................................................................................................42
Example of the grep Keyword.................................................................................................................................. 42
Multiple Users in Conguration Mode...........................................................................................................................43
3 Getting Started............................................................................................................................................45
Console Access................................................................................................................................................................46
Serial Console.............................................................................................................................................................46
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................47
Entering CLI commands Using an SSH Connection..............................................................................................47
Executing Local CLI Scripts Using an SSH Connection........................................................................................ 47
Default Conguration...................................................................................................................................................... 48
Conguring a Host Name............................................................................................................................................... 48
Accessing the System Remotely....................................................................................................................................48
Accessing the System Remotely..............................................................................................................................48
Congure the Management Port IP Address......................................................................................................... 48
Congure a Management Route..............................................................................................................................49
Conguring a Username and Password..................................................................................................................49
Conguring the Enable Password..................................................................................................................................50
Conguration File Management.....................................................................................................................................50
Copy Files to and from the System..........................................................................................................................51
Mounting an NFS File System...................................................................................................................................51
Save the Running-Conguration..............................................................................................................................53
Congure the Overload Bit for a Startup Scenario............................................................................................... 54
Viewing Files...............................................................................................................................................................54
Compressing Conguration Files............................................................................................................................. 55
Managing the File System...............................................................................................................................................57
Enabling Software Features on Devices Using a Command Option..........................................................................58
View Command History.................................................................................................................................................. 58
Contents
3
Upgrading Dell EMC Networking OS............................................................................................................................ 59
Verify Software Images Before Installation...................................................................................................................59
Using HTTP for File Transfers........................................................................................................................................60
4 Management................................................................................................................................................ 61
Conguring Privilege Levels............................................................................................................................................ 61
Creating a Custom Privilege Level...........................................................................................................................62
Removing a Command from EXEC Mode.............................................................................................................. 62
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................62
Allowing Access to CONFIGURATION Mode Commands....................................................................................62
Allowing Access to Dierent Modes........................................................................................................................62
Applying a Privilege Level to a Username............................................................................................................... 64
Applying a Privilege Level to a Terminal Line.......................................................................................................... 64
Conguring Logging........................................................................................................................................................ 64
Audit and Security Logs............................................................................................................................................65
Conguring Logging Format ...................................................................................................................................67
Display the Logging Buer and the Logging Conguration.................................................................................. 67
Setting Up a Secure Connection to a Syslog Server.............................................................................................68
Sending System Messages to a Syslog Server......................................................................................................69
Track Login Activity......................................................................................................................................................... 69
Restrictions for Tracking Login Activity.................................................................................................................. 69
Conguring Login Activity Tracking.........................................................................................................................69
Display Login Statistics..............................................................................................................................................70
Limit Concurrent Login Sessions.....................................................................................................................................71
Restrictions for Limiting the Number of Concurrent Sessions............................................................................. 71
Conguring Concurrent Session Limit.....................................................................................................................72
Enabling the System to Clear Existing Sessions.................................................................................................... 72
Enabling Secured CLI Mode............................................................................................................................................73
Log Messages in the Internal Buer..............................................................................................................................73
Conguration Task List for System Log Management.......................................................................................... 73
Disabling System Logging............................................................................................................................................... 73
Sending System Messages to a Syslog Server............................................................................................................ 74
Conguring a UNIX System as a Syslog Server.....................................................................................................74
Changing System Logging Settings...............................................................................................................................74
Display the Logging Buer and the Logging Conguration........................................................................................ 75
Conguring a UNIX Logging Facility Level....................................................................................................................76
Synchronizing Log Messages......................................................................................................................................... 77
Enabling Timestamp on Syslog Messages.................................................................................................................... 77
File Transfer Services.......................................................................................................................................................78
Conguration Task List for File Transfer Services..................................................................................................78
Enabling the FTP Server........................................................................................................................................... 78
Conguring FTP Server Parameters........................................................................................................................78
Conguring FTP Client Parameters......................................................................................................................... 79
Terminal Lines................................................................................................................................................................... 79
Denying and Permitting Access to a Terminal Line................................................................................................80
Conguring Login Authentication for Terminal Lines..............................................................................................81
4
Contents
Setting Timeout for EXEC Privilege Mode................................................................................................................... 82
Using Telnet to get to Another Network Device..........................................................................................................82
Lock CONFIGURATION Mode....................................................................................................................................... 83
Viewing the Conguration Lock Status...................................................................................................................83
LPC Bus Quality Degradation......................................................................................................................................... 83
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................84
Reloading the system...................................................................................................................................................... 84
Viewing the Reason for Last System Reboot.............................................................................................................. 85
5 802.1X......................................................................................................................................................... 86
Port-Authentication Process..........................................................................................................................................88
EAP over RADIUS......................................................................................................................................................88
Conguring 802.1X...........................................................................................................................................................89
Related Conguration Tasks..................................................................................................................................... 89
Important Points to Remember......................................................................................................................................89
Conguring dot1x Prole ................................................................................................................................................90
Conguring MAC addresses for a do1x Prole.............................................................................................................90
Conguring the Static MAB and MAB Prole .............................................................................................................90
Conguring Critical VLAN .............................................................................................................................................. 91
Enabling 802.1X................................................................................................................................................................ 93
Conguring Request Identity Re-Transmissions...........................................................................................................94
Conguring a Quiet Period after a Failed Authentication..................................................................................... 95
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 96
Re-Authenticating a Port................................................................................................................................................96
Conguring Timeouts...................................................................................................................................................... 97
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................98
Guest and Authentication-Fail VLANs.......................................................................................................................... 99
Conguring a Guest VLAN......................................................................................................................................100
Conguring an Authentication-Fail VLAN............................................................................................................. 100
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 102
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 102
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 103
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................103
Conguring ACL VLAN Groups.............................................................................................................................. 103
Conguring FP Blocks for VLAN Parameters.......................................................................................................104
Viewing CAM Usage...................................................................................................................................................... 105
Allocating FP Blocks for VLAN Processes.................................................................................................................. 106
7 Access Control Lists (ACLs)....................................................................................................................... 108
IP Access Control Lists (ACLs).....................................................................................................................................109
CAM Usage................................................................................................................................................................110
Implementing ACLs on Dell EMC Networking OS................................................................................................ 110
Important Points to Remember.....................................................................................................................................112
Conguration Task List for Route Maps.................................................................................................................112
Conguring Match Routes.......................................................................................................................................114
Contents
5
Conguring Set Conditions......................................................................................................................................116
Congure a Route Map for Route Redistribution..................................................................................................117
Congure a Route Map for Route Tagging............................................................................................................ 117
Continue Clause........................................................................................................................................................ 118
IP Fragment Handling..................................................................................................................................................... 118
IP Fragments ACL Examples................................................................................................................................... 118
Layer 4 ACL Rules Examples................................................................................................................................... 119
Congure a Standard IP ACL.........................................................................................................................................119
Conguring a Standard IP ACL Filter..................................................................................................................... 120
Congure an Extended IP ACL......................................................................................................................................121
Conguring Filters with a Sequence Number........................................................................................................121
Conguring Filters Without a Sequence Number.................................................................................................123
Congure Layer 2 and Layer 3 ACLs............................................................................................................................123
Assign an IP ACL to an Interface..................................................................................................................................124
Applying an IP ACL.........................................................................................................................................................124
Counting ACL Hits....................................................................................................................................................125
Congure Ingress ACLs................................................................................................................................................. 125
Congure Egress ACLs.................................................................................................................................................. 126
Applying Egress Layer 3 ACLs (Control-Plane).....................................................................................................127
IP Prex Lists...................................................................................................................................................................127
Implementation Information.................................................................................................................................... 128
Conguration Task List for Prex Lists.................................................................................................................. 128
ACL Remarks................................................................................................................................................................... 131
Conguring a Remark............................................................................................................................................... 131
Deleting a Remark.................................................................................................................................................... 132
ACL Resequencing......................................................................................................................................................... 133
Resequencing an ACL or Prex List.......................................................................................................................133
Route Maps.....................................................................................................................................................................134
Implementation Information.................................................................................................................................... 134
Logging of ACL Processes............................................................................................................................................ 135
Guidelines for Conguring ACL Logging................................................................................................................136
Conguring ACL Logging.........................................................................................................................................136
Flow-Based Monitoring..................................................................................................................................................137
Behavior of Flow-Based Monitoring.......................................................................................................................137
Enabling Flow-Based Monitoring............................................................................................................................138
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 140
How BFD Works............................................................................................................................................................. 140
BFD Packet Format.................................................................................................................................................. 141
BFD Sessions............................................................................................................................................................ 142
BFD Three-Way Handshake.................................................................................................................................... 143
Session State Changes............................................................................................................................................145
Important Points to Remember.................................................................................................................................... 145
Congure BFD................................................................................................................................................................ 145
Congure BFD for Physical Ports...........................................................................................................................146
Congure BFD for Static Routes............................................................................................................................147
6
Contents
Congure BFD for IPv6 Static Routes....................................................................................................................151
Congure BFD for OSPF.........................................................................................................................................153
Congure BFD for OSPFv3.....................................................................................................................................156
Congure BFD for IS-IS...........................................................................................................................................159
Congure BFD for BGP............................................................................................................................................161
Congure BFD for VRRP.........................................................................................................................................169
Conguring Protocol Liveness.................................................................................................................................171
9 Border Gateway Protocol (BGP).................................................................................................................172
BGP IP version 4 (BGPv4) Overview.......................................................................................................................... 172
BGP Autonomous Systems........................................................................................................................................... 173
AS4 Number Representation...................................................................................................................................174
Four-Byte AS Numbers............................................................................................................................................176
Multiprotocol BGP..........................................................................................................................................................176
Sessions and Peers.........................................................................................................................................................177
Establish a Session....................................................................................................................................................177
BGP global and address family conguration..............................................................................................................178
BGP global conguration default values................................................................................................................ 178
BGP Attributes for selecting Best Path.......................................................................................................................179
Best Path Selection Criteria.................................................................................................................................... 179
Weight.........................................................................................................................................................................181
Local Preference........................................................................................................................................................181
Multi-Exit Discriminators (MEDs)...........................................................................................................................182
Origin..........................................................................................................................................................................183
AS Path......................................................................................................................................................................184
Next Hop................................................................................................................................................................... 184
Implement BGP with Dell EMC Networking OS.........................................................................................................185
Additional Path (Add-Path) Support......................................................................................................................185
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 185
Ignore Router-ID in Best-Path Calculation............................................................................................................ 186
AS Number Migration.............................................................................................................................................. 186
BGP4 Management Information Base (MIB)........................................................................................................187
Important Points to Remember...............................................................................................................................187
Conguration Information..............................................................................................................................................188
Basic BGP conguration tasks......................................................................................................................................188
Enabling BGP............................................................................................................................................................ 188
Conguring a BGP peer........................................................................................................................................... 191
Conguring AS4 Number Representations........................................................................................................... 192
Conguring a BGP VRF address family................................................................................................................. 193
Route-refresh and Soft-reconguration................................................................................................................195
Aggregating Routes..................................................................................................................................................198
Filtering BGP Routes................................................................................................................................................198
Filtering BGP Routes Using Route Maps...............................................................................................................198
Filtering BGP Routes Using AS-PATH Information.............................................................................................. 199
Conguring Peer Groups........................................................................................................................................ 200
Conguring BGP Fast Fall-Over............................................................................................................................ 208
Contents
7
Conguring Passive Peering...................................................................................................................................209
Maintaining Existing AS Numbers During an AS Migration.................................................................................210
Allowing an AS Number to Appear in its Own AS Path........................................................................................211
Enabling Graceful Restart........................................................................................................................................212
Filtering on an AS-Path Attribute........................................................................................................................... 213
Regular Expressions as Filters.................................................................................................................................214
Redistributing Routes...............................................................................................................................................215
Redistributing iBGP Routes into IGP......................................................................................................................216
Enabling Additional Paths........................................................................................................................................ 219
Conguring IP Community Lists............................................................................................................................. 219
Conguring an IP Extended Community List........................................................................................................ 221
Filtering Routes with Community Lists.................................................................................................................. 221
Manipulating the COMMUNITY Attribute............................................................................................................ 222
Changing MED Attributes.......................................................................................................................................224
Changing the LOCAL_PREFERENCE Attribute..................................................................................................224
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............ 225
Changing the WEIGHT Attribute...........................................................................................................................225
Enabling Multipath...................................................................................................................................................226
Route Reectors......................................................................................................................................................226
Conguring BGP Confederations.......................................................................................................................... 228
Enabling Route Flap Dampening............................................................................................................................ 228
Changing BGP keepalive and hold timers.............................................................................................................230
Setting the extended timer..................................................................................................................................... 231
Enabling or disabling BGP neighbors.....................................................................................................................232
Route Map Continue............................................................................................................................................... 233
Enabling MBGP Congurations....................................................................................................................................234
MBGP support for IPv6................................................................................................................................................234
Conguring IPv6 MBGP between peers.....................................................................................................................234
Example-Conguring IPv4 and IPv6 neighbors......................................................................................................... 235
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor................................................237
BGP Regular Expression Optimization........................................................................................................................239
Debugging BGP............................................................................................................................................................. 239
Storing Last and Bad PDUs....................................................................................................................................240
Capturing PDUs........................................................................................................................................................241
PDU Counters.......................................................................................................................................................... 242
10 Content Addressable Memory (CAM).......................................................................................................243
CAM Allocation...............................................................................................................................................................243
Test CAM Usage............................................................................................................................................................245
View CAM-ACL Settings.............................................................................................................................................. 245
View CAM Usage........................................................................................................................................................... 247
Conguring CAM Threshold and Silence Period........................................................................................................ 247
Setting CAM Threshold and Silence Period..........................................................................................................247
CAM Optimization......................................................................................................................................................... 248
Troubleshoot CAM Proling..........................................................................................................................................248
QoS CAM Region Limitation...................................................................................................................................248
8
Contents
11 Control Plane Policing (CoPP).................................................................................................................. 250
Congure Control Plane Policing.................................................................................................................................. 251
Conguring CoPP for Protocols............................................................................................................................ 252
Conguring CoPP for CPU Queues...................................................................................................................... 254
CoPP for OSPFv3 Packets.................................................................................................................................... 255
Conguring CoPP for OSPFv3.............................................................................................................................. 258
Displaying CoPP Conguration .............................................................................................................................258
12 Dynamic Host Conguration Protocol (DHCP)..........................................................................................261
DHCP Packet Format and Options.............................................................................................................................. 261
Assign an IP Address using DHCP...............................................................................................................................263
Implementation Information..........................................................................................................................................264
Congure the System to be a DHCP Server..............................................................................................................264
Conguring the Server for Automatic Address Allocation..................................................................................265
Specifying a Default Gateway................................................................................................................................ 266
Congure a Method of Hostname Resolution......................................................................................................267
Using DNS for Address Resolution........................................................................................................................ 267
Using NetBIOS WINS for Address Resolution......................................................................................................267
Creating Manual Binding Entries............................................................................................................................267
Debugging the DHCP Server.................................................................................................................................268
Using DHCP Clear Commands.............................................................................................................................. 268
Congure the System to be a Relay Agent................................................................................................................ 268
Congure the System to be a DHCP Client............................................................................................................... 270
Conguring the DHCP Client System................................................................................................................... 270
DHCP Client on a Management Interface.............................................................................................................271
DHCP Client Operation with Other Features....................................................................................................... 272
DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................ 273
Conguring Route Leaking between VRFs on DHCP Relay Agent....................................................................273
Non-default VRF conguration for DHCPv6 helper address................................................................................... 274
Conguring DHCP relay source interface................................................................................................................... 275
Global DHCP relay source IPv4 or IPv6 conguration ....................................................................................... 275
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................275
Congure the System for User Port Stacking (Option 230)....................................................................................277
Congure Secure DHCP................................................................................................................................................277
Option 82...................................................................................................................................................................277
DHCP Snooping....................................................................................................................................................... 278
Drop DHCP Packets on Snooped VLANs Only....................................................................................................282
Dynamic ARP Inspection.........................................................................................................................................283
Conguring Dynamic ARP Inspection................................................................................................................... 283
Source Address Validation............................................................................................................................................ 285
Enabling IP Source Address Validation..................................................................................................................285
DHCP MAC Source Address Validation................................................................................................................ 286
Enabling IP+MAC Source Address Validation.......................................................................................................286
Viewing the Number of SAV Dropped Packets....................................................................................................287
Clearing the Number of SAV Dropped Packets................................................................................................... 287
Contents
9
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 288
ECMP for Flow-Based Anity.....................................................................................................................................288
Conguring the Hash Algorithm............................................................................................................................ 288
Enabling Deterministic ECMP Next Hop.............................................................................................................. 288
Conguring the Hash Algorithm Seed.................................................................................................................. 289
Link Bundle Monitoring................................................................................................................................................. 289
Managing ECMP Group Paths...............................................................................................................................290
Creating an ECMP Group Bundle..........................................................................................................................290
Modifying the ECMP Group Threshold................................................................................................................ 290
14 FIPS Cryptography...................................................................................................................................292
Conguration Tasks....................................................................................................................................................... 292
Preparing the System....................................................................................................................................................292
Enabling FIPS Mode...................................................................................................................................................... 293
Generating Host-Keys...................................................................................................................................................293
Monitoring FIPS Mode Status......................................................................................................................................293
Disabling FIPS Mode..................................................................................................................................................... 294
15 Force10 Resilient Ring Protocol (FRRP)...................................................................................................295
Protocol Overview.........................................................................................................................................................295
Ring Status............................................................................................................................................................... 296
Multiple FRRP Rings............................................................................................................................................... 296
Important FRRP Points........................................................................................................................................... 297
Important FRRP Concepts.....................................................................................................................................298
Implementing FRRP.......................................................................................................................................................299
FRRP Conguration...................................................................................................................................................... 299
Creating the FRRP Group...................................................................................................................................... 299
Conguring the Control VLAN...............................................................................................................................300
Conguring and Adding the Member VLANs....................................................................................................... 301
Setting the FRRP Timers........................................................................................................................................302
Clearing the FRRP Counters..................................................................................................................................302
Viewing the FRRP Conguration...........................................................................................................................302
Viewing the FRRP Information...............................................................................................................................302
Troubleshooting FRRP.................................................................................................................................................. 303
Conguration Checks..............................................................................................................................................303
Sample Conguration and Topology............................................................................................................................303
FRRP Support on VLT...................................................................................................................................................304
Example Scenario.................................................................................................................................................... 305
Important Points to Remember............................................................................................................................. 306
16 GARP VLAN Registration Protocol (GVRP)..............................................................................................307
Important Points to Remember....................................................................................................................................307
Congure GVRP............................................................................................................................................................ 308
Related Conguration Tasks...................................................................................................................................308
Enabling GVRP Globally................................................................................................................................................309
10
Contents
Enabling GVRP on a Layer 2 Interface........................................................................................................................309
Congure GVRP Registration...................................................................................................................................... 309
Congure a GARP Timer............................................................................................................................................... 310
RPM Redundancy.......................................................................................................................................................... 310
17 High Availability (HA)................................................................................................................................ 312
Component Redundancy...............................................................................................................................................312
Automatic and Manual Stack Unit Failover........................................................................................................... 312
Synchronization between Management and Standby Units...............................................................................313
Forcing a Stack Unit Failover.................................................................................................................................. 313
Specifying an Auto-Failover Limit...........................................................................................................................314
Disabling Auto-Reboot............................................................................................................................................. 314
Pre-Conguring a Stack Unit Slot................................................................................................................................ 314
Removing a Provisioned Logical Stack Unit................................................................................................................ 314
Hitless Behavior.............................................................................................................................................................. 314
Graceful Restart............................................................................................................................................................. 315
Software Resiliency........................................................................................................................................................315
Software Component Health Monitoring..............................................................................................................315
System Health Monitoring.......................................................................................................................................315
Failure and Event Logging....................................................................................................................................... 316
Hot-Lock Behavior......................................................................................................................................................... 316
18 Internet Group Management Protocol (IGMP).......................................................................................... 317
IGMP Implementation Information................................................................................................................................317
IGMP Protocol Overview...............................................................................................................................................317
IGMP Version 2......................................................................................................................................................... 317
IGMP Version 3.........................................................................................................................................................319
Congure IGMP............................................................................................................................................................. 322
Related Conguration Tasks................................................................................................................................... 322
Viewing IGMP Enabled Interfaces............................................................................................................................... 323
Selecting an IGMP Version........................................................................................................................................... 323
Viewing IGMP Groups...................................................................................................................................................324
Adjusting Timers.............................................................................................................................................................324
Adjusting Query and Response Timers................................................................................................................. 324
Preventing a Host from Joining a Group.................................................................................................................... 325
Enabling IGMP Immediate-Leave.................................................................................................................................328
IGMP Snooping..............................................................................................................................................................328
IGMP Snooping Implementation Information....................................................................................................... 328
Conguring IGMP Snooping...................................................................................................................................328
Removing a Group-Port Association.....................................................................................................................329
Disabling Multicast Flooding...................................................................................................................................329
Specifying a Port as Connected to a Multicast Router...................................................................................... 330
Conguring the Switch as Querier........................................................................................................................ 330
Fast Convergence after MSTP Topology Changes....................................................................................................331
Egress Interface Selection (EIS) for HTTP and IGMP Applications.........................................................................331
Protocol Separation..................................................................................................................................................331
Contents
11
Enabling and Disabling Management Egress Interface Selection...................................................................... 332
Handling of Management Route Conguration................................................................................................... 333
Handling of Switch-Initiated Trac....................................................................................................................... 334
Handling of Switch-Destined Trac......................................................................................................................334
Handling of Transit Trac (Trac Separation).................................................................................................... 335
Mapping of Management Applications and Trac Type.....................................................................................335
Behavior of Various Applications for Switch-Initiated Trac ............................................................................ 336
Behavior of Various Applications for Switch-Destined Trac ...........................................................................337
Interworking of EIS With Various Applications.....................................................................................................338
Designating a Multicast Router Interface................................................................................................................... 338
19 Interfaces.................................................................................................................................................340
Basic Interface Conguration.......................................................................................................................................340
Advanced Interface Conguration...............................................................................................................................340
Interface Types................................................................................................................................................................341
View Basic Interface Information..................................................................................................................................341
Resetting an Interface to its Factory Default State...................................................................................................343
Enabling a Physical Interface........................................................................................................................................343
Enabling Energy Ecient Ethernet..............................................................................................................................344
View EEE Information....................................................................................................................................................344
Clear EEE Counters.......................................................................................................................................................349
Physical Interfaces.........................................................................................................................................................349
Conguration Task List for Physical Interfaces....................................................................................................349
Overview of Layer Modes...................................................................................................................................... 350
Conguring Layer 2 (Data Link) Mode................................................................................................................. 350
Conguring Layer 2 (Interface) Mode................................................................................................................... 351
Conguring Layer 3 (Network) Mode....................................................................................................................351
Conguring Layer 3 (Interface) Mode................................................................................................................... 351
Automatic recovery of an Err-disabled interface....................................................................................................... 352
Conguring an automatic recovery for an Err-disabled interface......................................................................353
Egress Interface Selection (EIS)..................................................................................................................................353
Important Points to Remember............................................................................................................................. 354
Conguring EIS........................................................................................................................................................ 354
Management Interfaces................................................................................................................................................354
Conguring Management Interfaces.................................................................................................................... 354
Conguring a Management Interface on an Ethernet Port............................................................................... 356
VLAN Interfaces............................................................................................................................................................ 356
Loopback Interfaces...................................................................................................................................................... 357
Null Interfaces................................................................................................................................................................ 358
Port Channel Interfaces................................................................................................................................................358
Port Channel Denition and Standards.................................................................................................................358
Port Channel Benets.............................................................................................................................................358
Port Channel Implementation.................................................................................................................................358
Interfaces in Port Channels.................................................................................................................................... 359
Conguration Tasks for Port Channel Interfaces.................................................................................................359
Creating a Port Channel......................................................................................................................................... 360
12
Contents
Adding a Physical Interface to a Port Channel.....................................................................................................360
Reassigning an Interface to a New Port Channel................................................................................................362
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 362
Adding or Removing a Port Channel from a VLAN............................................................................................. 363
Assigning an IP Address to a Port Channel.......................................................................................................... 364
Deleting or Disabling a Port Channel.....................................................................................................................364
Load Balancing Through Port Channels................................................................................................................364
Changing the Hash Algorithm................................................................................................................................365
Bulk Conguration......................................................................................................................................................... 366
Interface Range....................................................................................................................................................... 366
Bulk Conguration Examples..................................................................................................................................366
Dening Interface Range Macros................................................................................................................................ 368
Dene the Interface Range.................................................................................................................................... 368
Choosing an Interface-Range Macro.................................................................................................................... 368
Monitoring and Maintaining Interfaces....................................................................................................................... 368
Maintenance Using TDR.........................................................................................................................................369
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................370
Link Dampening..............................................................................................................................................................370
Important Points to Remember.............................................................................................................................. 371
Conguration Example of Link Dampening............................................................................................................371
Enabling Link Dampening........................................................................................................................................ 373
Link Bundle Monitoring..................................................................................................................................................374
Using Ethernet Pause Frames for Flow Control........................................................................................................ 375
Enabling Pause Frames........................................................................................................................................... 375
Congure the MTU Size on an Interface.................................................................................................................... 376
Port-Pipes....................................................................................................................................................................... 377
Auto-Negotiation on Ethernet Interfaces....................................................................................................................377
Setting the Speed of Ethernet Interfaces.............................................................................................................377
Set Auto-Negotiation Options................................................................................................................................378
View Advanced Interface Information.........................................................................................................................379
Conguring the Interface Sampling Size.............................................................................................................. 380
Conguring the Trac Sampling Size Globally........................................................................................................... 381
Dynamic Counters......................................................................................................................................................... 382
Clearing Interface Counters....................................................................................................................................383
Discard Counters........................................................................................................................................................... 383
Display discard counters......................................................................................................................................... 384
20 Internet Protocol Security (IPSec).......................................................................................................... 386
Conguring IPSec .........................................................................................................................................................386
21 IPv4 Routing.............................................................................................................................................388
IP Addresses...................................................................................................................................................................389
Implementation Information....................................................................................................................................389
Conguration Tasks for IP Addresses..........................................................................................................................389
Assigning IP Addresses to an Interface.......................................................................................................................389
Conguring Static Routes............................................................................................................................................ 390
Contents
13
Congure Static Routes for the Management Interface...........................................................................................391
IPv4 Path MTU Discovery Overview.......................................................................................................................... 392
Packet handling during MTU mismatch................................................................................................................392
Using the Congured Source IP Address in ICMP Messages..................................................................................392
Conguring the ICMP Source Interface............................................................................................................... 392
Conguring the Duration to Establish a TCP Connection........................................................................................ 393
Enabling Directed Broadcast........................................................................................................................................ 393
Resolution of Host Names............................................................................................................................................393
Enabling Dynamic Resolution of Host Names............................................................................................................394
Specifying the Local System Domain and a List of Domains................................................................................... 394
Conguring DNS with Traceroute............................................................................................................................... 395
ARP................................................................................................................................................................................. 395
Conguration Tasks for ARP........................................................................................................................................ 396
Conguring Static ARP Entries....................................................................................................................................396
Enabling Proxy ARP.......................................................................................................................................................396
Clearing ARP Cache...................................................................................................................................................... 397
ARP Learning via Gratuitous ARP................................................................................................................................397
Enabling ARP Learning via Gratuitous ARP................................................................................................................397
ARP Learning via ARP Request................................................................................................................................... 397
Conguring ARP Retries...............................................................................................................................................398
ICMP............................................................................................................................................................................... 399
Conguration Tasks for ICMP......................................................................................................................................399
Enabling ICMP Unreachable Messages...................................................................................................................... 399
UDP Helper.....................................................................................................................................................................399
Congure UDP Helper............................................................................................................................................ 399
Important Points to Remember............................................................................................................................. 400
Enabling UDP Helper.....................................................................................................................................................400
Congurations Using UDP Helper............................................................................................................................... 400
UDP Helper with Broadcast-All Addresses.................................................................................................................400
UDP Helper with Subnet Broadcast Addresses......................................................................................................... 401
UDP Helper with Congured Broadcast Addresses..................................................................................................402
UDP Helper with No Congured Broadcast Addresses............................................................................................402
Troubleshooting UDP Helper........................................................................................................................................402
22 IPv6 Routing............................................................................................................................................404
Protocol Overview.........................................................................................................................................................404
Extended Address Space........................................................................................................................................405
Stateless Autoconguration................................................................................................................................... 405
IPv6 Headers............................................................................................................................................................405
IPv6 Header Fields.................................................................................................................................................. 406
Extension Header Fields......................................................................................................................................... 408
Addressing................................................................................................................................................................ 409
Implementing IPv6 with Dell EMC Networking OS....................................................................................................410
ICMPv6.............................................................................................................................................................................411
Path MTU discovery...................................................................................................................................................... 412
IPv6 Neighbor Discovery...............................................................................................................................................412
14
Contents
IPv6 Neighbor Discovery of MTU Packets........................................................................................................... 413
Conguration Task List for IPv6 RDNSS..................................................................................................................... 413
Conguring the IPv6 Recursive DNS Server........................................................................................................ 413
Debugging IPv6 RDNSS Information Sent to the Host ......................................................................................414
Displaying IPv6 RDNSS Information...................................................................................................................... 415
Secure Shell (SSH) Over an IPv6 Transport...............................................................................................................415
Conguration Tasks for IPv6.........................................................................................................................................416
Adjusting Your CAM-Prole.....................................................................................................................................416
Assigning an IPv6 Address to an Interface............................................................................................................417
Assigning a Static IPv6 Route.................................................................................................................................417
Conguring Telnet with IPv6...................................................................................................................................418
SNMP over IPv6.......................................................................................................................................................418
Displaying IPv6 Information.....................................................................................................................................418
Displaying an IPv6 Interface Information...............................................................................................................419
Showing IPv6 Routes...............................................................................................................................................419
Showing the Running-Conguration for an Interface..........................................................................................421
Clearing IPv6 Routes................................................................................................................................................421
Disabling ND Entry Timeout....................................................................................................................................421
Conguring IPv6 RA Guard.......................................................................................................................................... 422
Conguring IPv6 RA Guard on an Interface.........................................................................................................423
Monitoring IPv6 RA Guard......................................................................................................................................424
23 Intermediate System to Intermediate System.......................................................................................... 425
IS-IS Protocol Overview................................................................................................................................................425
IS-IS Addressing.............................................................................................................................................................425
Multi-Topology IS-IS...................................................................................................................................................... 426
Transition Mode....................................................................................................................................................... 426
Interface Support.....................................................................................................................................................427
Adjacencies...............................................................................................................................................................427
Graceful Restart.............................................................................................................................................................427
Timers........................................................................................................................................................................427
Implementation Information..........................................................................................................................................427
Conguration Information.............................................................................................................................................428
Conguration Tasks for IS-IS..................................................................................................................................429
Conguring the Distance of a Route.....................................................................................................................436
Changing the IS-Type.............................................................................................................................................. 437
Redistributing IPv4 Routes.....................................................................................................................................439
Redistributing IPv6 Routes.....................................................................................................................................440
Conguring Authentication Passwords..................................................................................................................441
Setting the Overload Bit..........................................................................................................................................441
Debugging IS-IS....................................................................................................................................................... 442
IS-IS Metric Styles.........................................................................................................................................................443
Congure Metric Values................................................................................................................................................443
Maximum Values in the Routing Table...................................................................................................................443
Change the IS-IS Metric Style in One Level Only................................................................................................443
Leaks from One Level to Another..........................................................................................................................445
Contents
15
Sample Congurations.................................................................................................................................................. 446
24 Link Aggregation Control Protocol (LACP).............................................................................................. 448
Introduction to Dynamic LAGs and LACP.................................................................................................................. 448
Important Points to Remember............................................................................................................................. 448
LACP Modes............................................................................................................................................................ 449
Conguring LACP Commands............................................................................................................................... 449
LACP Conguration Tasks............................................................................................................................................450
Creating a LAG.........................................................................................................................................................450
Conguring the LAG Interfaces as Dynamic........................................................................................................450
Setting the LACP Long Timeout............................................................................................................................ 451
Monitoring and Debugging LACP...........................................................................................................................451
Shared LAG State Tracking.......................................................................................................................................... 452
Conguring Shared LAG State Tracking............................................................................................................... 452
Important Points about Shared LAG State Tracking........................................................................................... 454
LACP Basic Conguration Example............................................................................................................................ 454
Congure a LAG on ALPHA................................................................................................................................... 454
25 Layer 2.....................................................................................................................................................463
Manage the MAC Address Table................................................................................................................................. 463
Clearing the MAC Address Table........................................................................................................................... 463
Setting the Aging Time for Dynamic Entries........................................................................................................463
Conguring a Static MAC Address........................................................................................................................464
Displaying the MAC Address Table........................................................................................................................ 464
MAC Learning Limit.......................................................................................................................................................464
Setting the MAC Learning Limit............................................................................................................................ 465
mac learning-limit Dynamic.................................................................................................................................... 465
mac learning-limit mac-address-sticky................................................................................................................. 465
mac learning-limit station-move............................................................................................................................ 466
mac learning-limit no-station-move...................................................................................................................... 466
Learning Limit Violation Actions.............................................................................................................................466
Setting Station Move Violation Actions................................................................................................................ 467
Recovering from Learning Limit and Station Move Violations........................................................................... 467
Disabling MAC Address Learning on the System.................................................................................................468
Enabling port security............................................................................................................................................. 468
NIC Teaming................................................................................................................................................................... 468
Congure Redundant Pairs...........................................................................................................................................469
Important Points about Conguring Redundant Pairs......................................................................................... 471
Far-End Failure Detection............................................................................................................................................. 472
FEFD State Changes...............................................................................................................................................473
Conguring FEFD.....................................................................................................................................................474
Enabling FEFD on an Interface...............................................................................................................................474
Debugging FEFD......................................................................................................................................................475
26 Link Layer Discovery Protocol (LLDP)......................................................................................................477
802.1AB (LLDP) Overview............................................................................................................................................477
16
Contents
Protocol Data Units..................................................................................................................................................477
Optional TLVs................................................................................................................................................................. 478
Management TLVs...................................................................................................................................................478
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 480
TIA Organizationally Specic TLVs........................................................................................................................ 480
Congure LLDP..............................................................................................................................................................484
Related Conguration Tasks...................................................................................................................................484
Important Points to Remember............................................................................................................................. 484
LLDP Compatibility..................................................................................................................................................485
CONFIGURATION versus INTERFACE Congurations............................................................................................ 485
Enabling LLDP................................................................................................................................................................485
Disabling and Undoing LLDP.................................................................................................................................. 486
Enabling LLDP on Management Ports........................................................................................................................486
Disabling and Undoing LLDP on Management Ports.......................................................................................... 486
Advertising TLVs............................................................................................................................................................ 486
Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................488
Reserved Unrecognized LLDP TLVs..................................................................................................................... 488
Organizational Specic Unrecognized LLDP TLVs..............................................................................................488
Viewing Unrecognized LLDP TLVs........................................................................................................................ 488
Viewing the LLDP Conguration................................................................................................................................. 489
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................489
Examples of Viewing Information Advertised by Neighbors...............................................................................489
Conguring LLDPDU Intervals......................................................................................................................................491
Conguring LLDP Notication Interval....................................................................................................................... 492
Conguring LLDP Notication Interval....................................................................................................................... 492
Conguring Transmit and Receive Mode....................................................................................................................492
Conguring the Time to Live Value............................................................................................................................. 493
Debugging LLDP............................................................................................................................................................494
Relevant Management Objects................................................................................................................................... 495
27 Microsoft Network Load Balancing.......................................................................................................... 500
NLB Unicast Mode Scenario........................................................................................................................................500
NLB Multicast Mode Scenario.....................................................................................................................................500
Limitations of the NLB Feature.................................................................................................................................... 501
Microsoft Clustering...................................................................................................................................................... 501
Enable and Disable VLAN Flooding ............................................................................................................................. 501
Conguring a Switch for NLB ......................................................................................................................................501
Enabling a Switch for Multicast NLB.................................................................................................................... 502
28 Multicast Source Discovery Protocol (MSDP)......................................................................................... 503
Protocol Overview.........................................................................................................................................................503
Anycast RP.....................................................................................................................................................................504
Implementation Information......................................................................................................................................... 505
Congure Multicast Source Discovery Protocol........................................................................................................505
Related Conguration Tasks...................................................................................................................................505
Enable MSDP.................................................................................................................................................................509
Contents
17
Manage the Source-Active Cache...............................................................................................................................510
Viewing the Source-Active Cache......................................................................................................................... 510
Limiting the Source-Active Cache......................................................................................................................... 510
Clearing the Source-Active Cache..........................................................................................................................511
Enabling the Rejected Source-Active Cache.........................................................................................................511
Accept Source-Active Messages that Fail the RFP Check....................................................................................... 511
Specifying Source-Active Messages............................................................................................................................514
Limiting the Source-Active Messages from a Peer....................................................................................................515
Preventing MSDP from Caching a Local Source........................................................................................................515
Preventing MSDP from Caching a Remote Source................................................................................................... 516
Preventing MSDP from Advertising a Local Source.................................................................................................. 516
Logging Changes in Peership States............................................................................................................................517
Terminating a Peership...................................................................................................................................................517
Clearing Peer Statistics..................................................................................................................................................518
Debugging MSDP...........................................................................................................................................................518
MSDP with Anycast RP.................................................................................................................................................519
Conguring Anycast RP................................................................................................................................................520
Reducing Source-Active Message Flooding......................................................................................................... 521
Specifying the RP Address Used in SA Messages...............................................................................................521
MSDP Sample Congurations......................................................................................................................................523
29 Multicast Listener Discovery Protocol..................................................................................................... 526
MLD Version 1................................................................................................................................................................ 526
MLD Querier Router......................................................................................................................................................526
Joining a Multicast Group............................................................................................................................................. 527
Leaving a Multicast Group............................................................................................................................................ 527
MLD version 2................................................................................................................................................................ 527
MLD timers.....................................................................................................................................................................529
Reducing Host Response Burstiness.................................................................................................................... 530
Conguring MLD Version............................................................................................................................................. 530
Clearing MLD groups.................................................................................................................................................... 530
Debugging MLD.............................................................................................................................................................530
Explicit Tracking............................................................................................................................................................. 530
Reducing Leave Latency................................................................................................................................................531
Displaying MLD groups table.........................................................................................................................................531
Displaying MLD Interfaces.............................................................................................................................................531
MLD Snooping................................................................................................................................................................ 531
Enable MLD Snooping.............................................................................................................................................532
Disable MLD Snooping............................................................................................................................................532
Congure the switch as a querier..........................................................................................................................532
Specify port as connected to multicast router.................................................................................................... 532
Enable Snooping Explicit Tracking......................................................................................................................... 533
Display the MLD Snooping Table........................................................................................................................... 533
30 Multiple Spanning Tree Protocol (MSTP)................................................................................................ 534
Protocol Overview.........................................................................................................................................................534
18
Contents
Spanning Tree Variations.............................................................................................................................................. 535
Implementation Information................................................................................................................................... 535
Congure Multiple Spanning Tree Protocol................................................................................................................535
Related Conguration Tasks...................................................................................................................................536
Enable Multiple Spanning Tree Globally...................................................................................................................... 536
Adding and Removing Interfaces.................................................................................................................................536
Creating Multiple Spanning Tree Instances................................................................................................................ 537
Inuencing MSTP Root Selection................................................................................................................................538
Interoperate with Non-Dell Bridges.............................................................................................................................538
Changing the Region Name or Revision..................................................................................................................... 539
Modifying Global Parameters.......................................................................................................................................539
Modifying the Interface Parameters........................................................................................................................... 540
Conguring an EdgePort...............................................................................................................................................541
Flush MAC Addresses after a Topology Change....................................................................................................... 542
MSTP Sample Congurations......................................................................................................................................542
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................543
Debugging and Verifying MSTP Congurations........................................................................................................ 546
31 Multicast Features....................................................................................................................................548
Enabling IP Multicast.....................................................................................................................................................548
Implementation Information..........................................................................................................................................548
Multicast Policies...........................................................................................................................................................549
IPv4 Multicast Policies............................................................................................................................................549
Understanding Multicast Traceroute (mtrace).......................................................................................................... 556
Important Points to Remember..............................................................................................................................557
Printing Multicast Traceroute (mtrace) Paths........................................................................................................... 557
Supported Error Codes.................................................................................................................................................558
mtrace Scenarios...........................................................................................................................................................559
32 Object Tracking....................................................................................................................................... 565
Object Tracking Overview............................................................................................................................................ 565
Track Layer 2 Interfaces......................................................................................................................................... 566
Track Layer 3 Interfaces......................................................................................................................................... 566
Track IPv4 and IPv6 Routes................................................................................................................................... 567
Set Tracking Delays................................................................................................................................................. 568
VRRP Object Tracking............................................................................................................................................ 568
Object Tracking Conguration..................................................................................................................................... 568
Tracking a Layer 2 Interface................................................................................................................................... 568
Tracking a Layer 3 Interface................................................................................................................................... 569
Track an IPv4/IPv6 Route....................................................................................................................................... 571
Displaying Tracked Objects...........................................................................................................................................575
33 Open Shortest Path First (OSPFv2 and OSPFv3).................................................................................... 577
Protocol Overview......................................................................................................................................................... 577
Autonomous System (AS) Areas............................................................................................................................577
Contents
19
Area Types................................................................................................................................................................ 578
Networks and Neighbors........................................................................................................................................ 579
Router Types............................................................................................................................................................ 579
Designated and Backup Designated Routers........................................................................................................581
Link-State Advertisements (LSAs).........................................................................................................................581
Router Priority and Cost.........................................................................................................................................582
OSPF with Dell EMC Networking OS.........................................................................................................................583
Graceful Restart...................................................................................................................................................... 584
Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................585
Multi-Process OSPFv2 with VRF..........................................................................................................................585
OSPF ACK Packing................................................................................................................................................. 585
Setting OSPF Adjacency with Cisco Routers...................................................................................................... 585
Conguration Information.............................................................................................................................................586
Conguration Task List for OSPFv2 (OSPF for IPv4)........................................................................................ 586
OSPFv3 NSSA...............................................................................................................................................................600
NSSA Options..........................................................................................................................................................600
Conguration Task List for OSPFv3 (OSPF for IPv6)............................................................................................... 601
Enabling IPv6 Unicast Routing............................................................................................................................... 601
Applying cost for OSPFv3......................................................................................................................................602
Assigning IPv6 Addresses on an Interface............................................................................................................602
Assigning Area ID on an Interface..........................................................................................................................602
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................603
Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................603
Conguring Stub Areas...........................................................................................................................................604
Conguring Passive-Interface................................................................................................................................604
Redistributing Routes..............................................................................................................................................604
Conguring a Default Route...................................................................................................................................605
Enabling OSPFv3 Graceful Restart.......................................................................................................................605
OSPFv3 Authentication Using IPsec.....................................................................................................................607
Troubleshooting OSPFv3.........................................................................................................................................613
MIB Support for OSPFv3........................................................................................................................................614
34 Policy-based Routing (PBR).....................................................................................................................616
Overview......................................................................................................................................................................... 616
Implementing PBR..........................................................................................................................................................617
Conguration Task List for Policy-based Routing.......................................................................................................617
PBR Exceptions (Permit)........................................................................................................................................ 617
Create a Redirect List.............................................................................................................................................. 618
Create a Rule for a Redirect-list............................................................................................................................. 618
Apply a Redirect-list to an Interface using a Redirect-group............................................................................. 620
Sample Conguration....................................................................................................................................................622
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD......623
35 PIM Sparse-Mode (PIM-SM).................................................................................................................. 626
Implementation Information..........................................................................................................................................626
Protocol Overview.........................................................................................................................................................626
20
Contents
/