Dell PowerSwitch S6100-ON User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6100-ON User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S6100–ON
System
9.10(0.2)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 03
Rev. A00
Contents
1 About this Guide...........................................................................................................................................32
Audience............................................................................................................................................................................32
Conventions......................................................................................................................................................................32
Related Documents......................................................................................................................................................... 32
2 Conguration Fundamentals........................................................................................................................ 33
Accessing the Command Line........................................................................................................................................33
CLI Modes.........................................................................................................................................................................33
Navigating CLI Modes...............................................................................................................................................35
The do Command............................................................................................................................................................ 38
Undoing Commands........................................................................................................................................................ 38
Obtaining Help..................................................................................................................................................................39
Entering and Editing Commands....................................................................................................................................39
Command History............................................................................................................................................................40
Filtering show Command Outputs.................................................................................................................................40
Example of the grep Keyword...................................................................................................................................41
Multiple Users in Conguration Mode............................................................................................................................41
3 Getting Started............................................................................................................................................43
Console Access................................................................................................................................................................ 44
Serial Console............................................................................................................................................................. 44
Micro USB-B Access.................................................................................................................................................45
Default Conguration...................................................................................................................................................... 46
Conguring a Host Name............................................................................................................................................... 46
Accessing the System Remotely....................................................................................................................................46
Accessing the System Remotely..............................................................................................................................46
Congure the Management Port IP Address......................................................................................................... 46
Congure a Management Route..............................................................................................................................47
Conguring a Username and Password.................................................................................................................. 47
Conguring the Enable Password.................................................................................................................................. 47
Conguration File Management.....................................................................................................................................48
Copy Files to and from the System......................................................................................................................... 48
Mounting an NFS File System..................................................................................................................................49
Save the Running-Conguration............................................................................................................................. 50
Congure the Overload Bit for a Startup Scenario................................................................................................ 51
Viewing Files................................................................................................................................................................51
Managing the File System.............................................................................................................................................. 52
View Command History.................................................................................................................................................. 52
Upgrading Dell Networking OS...................................................................................................................................... 53
Using HTTP for File Transfers........................................................................................................................................ 53
Verify Software Images Before Installation...................................................................................................................54
Contents
3
4 Management............................................................................................................................................... 56
Conguring Privilege Levels........................................................................................................................................... 56
Creating a Custom Privilege Level...........................................................................................................................56
Removing a Command from EXEC Mode.............................................................................................................. 57
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................57
Allowing Access to CONFIGURATION Mode Commands.................................................................................... 57
Allowing Access to Dierent Modes........................................................................................................................57
Applying a Privilege Level to a Username............................................................................................................... 59
Applying a Privilege Level to a Terminal Line.......................................................................................................... 59
Conguring Logging........................................................................................................................................................ 59
Audit and Security Logs............................................................................................................................................ 60
Conguring Logging Format ................................................................................................................................... 61
Setting Up a Secure Connection to a Syslog Server............................................................................................. 61
Log Messages in the Internal Buer..............................................................................................................................63
Conguration Task List for System Log Management.......................................................................................... 63
Disabling System Logging............................................................................................................................................... 63
Sending System Messages to a Syslog Server............................................................................................................ 63
Conguring a UNIX System as a Syslog Server.....................................................................................................63
Track Login Activity......................................................................................................................................................... 64
Restrictions for Tracking Login Activity...................................................................................................................64
Conguring Login Activity Tracking......................................................................................................................... 64
Display Login Statistics..............................................................................................................................................65
Limit Concurrent Login Sessions....................................................................................................................................66
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 66
Conguring Concurrent Session Limit.....................................................................................................................66
Enabling the System to Clear Existing Sessions.................................................................................................... 67
Changing System Logging Settings...............................................................................................................................68
Display the Logging Buer and the Logging Conguration........................................................................................69
Conguring a UNIX Logging Facility Level....................................................................................................................69
Synchronizing Log Messages......................................................................................................................................... 70
Enabling Timestamp on Syslog Messages.....................................................................................................................71
File Transfer Services....................................................................................................................................................... 71
Conguration Task List for File Transfer Services...................................................................................................71
Enabling the FTP Server............................................................................................................................................71
Conguring FTP Server Parameters........................................................................................................................72
Conguring FTP Client Parameters......................................................................................................................... 72
Terminal Lines................................................................................................................................................................... 73
Denying and Permitting Access to a Terminal Line................................................................................................ 73
Conguring Login Authentication for Terminal Lines............................................................................................. 74
Setting Timeout for EXEC Privilege Mode................................................................................................................... 75
Using Telnet to get to Another Network Device..........................................................................................................75
Lock CONFIGURATION Mode....................................................................................................................................... 76
Viewing the Conguration Lock Status...................................................................................................................76
Restoring the Factory Default Settings.........................................................................................................................77
Important Points to Remember................................................................................................................................ 77
4
Contents
Restoring Factory Default Environment Variables..................................................................................................77
Reloading the system...................................................................................................................................................... 79
5 802.1X......................................................................................................................................................... 80
Port-Authentication Process..........................................................................................................................................82
EAP over RADIUS......................................................................................................................................................83
Conguring 802.1X...........................................................................................................................................................83
Related Conguration Tasks..................................................................................................................................... 83
Important Points to Remember......................................................................................................................................84
Enabling 802.1X................................................................................................................................................................ 84
Conguring dot1x Prole ................................................................................................................................................85
Conguring MAC addresses for a do1x Prole.............................................................................................................86
Conguring the Static MAB and MAB Prole .............................................................................................................86
Conguring Critical VLAN ..............................................................................................................................................87
Conguring Request Identity Re-Transmissions...........................................................................................................88
Conguring a Quiet Period after a Failed Authentication..................................................................................... 88
Conguring a Quiet Period after a Failed Authentication........................................................................................... 89
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 90
Re-Authenticating a Port.................................................................................................................................................91
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................92
Guest and Authentication-Fail VLANs.......................................................................................................................... 93
Conguring a Guest VLAN....................................................................................................................................... 93
Conguring an Authentication-Fail VLAN...............................................................................................................93
Conguring Timeouts................................................................................................................................................94
Multi-Host Authentication.............................................................................................................................................. 95
Conguring Multi-Host AuthenticationConguring Single-Host Authentication............................................... 97
Multi-Supplicant Authentication.................................................................................................................................... 98
Conguring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication..............................98
MAC Authentication Bypass...........................................................................................................................................99
MAB in Single-host and Multi-Host Mode............................................................................................................100
MAB in Multi-Supplicant Authentication Mode....................................................................................................100
Conguring MAC Authentication Bypass..............................................................................................................100
Dynamic CoS with 802.1X.............................................................................................................................................. 101
6 Access Control Lists (ACLs)....................................................................................................................... 103
IP Access Control Lists (ACLs).....................................................................................................................................104
CAM Usage...............................................................................................................................................................104
Implementing ACLs on Dell Networking OS..........................................................................................................105
Important Points to Remember.................................................................................................................................... 107
Conguration Task List for Route Maps................................................................................................................ 107
Conguring Match Routes...................................................................................................................................... 109
Conguring Set Conditions......................................................................................................................................110
Congure a Route Map for Route Redistribution.................................................................................................. 111
Congure a Route Map for Route Tagging............................................................................................................ 112
Continue Clause........................................................................................................................................................ 112
IP Fragment Handling..................................................................................................................................................... 113
Contents
5
IP Fragments ACL Examples....................................................................................................................................113
Layer 4 ACL Rules Examples................................................................................................................................... 113
Congure a Standard IP ACL.........................................................................................................................................114
Conguring a Standard IP ACL Filter......................................................................................................................115
Congure an Extended IP ACL......................................................................................................................................116
Conguring Filters with a Sequence Number........................................................................................................116
Conguring Filters Without a Sequence Number..................................................................................................117
Congure Layer 2 and Layer 3 ACLs............................................................................................................................ 118
Assign an IP ACL to an Interface...................................................................................................................................118
Applying an IP ACL..........................................................................................................................................................119
Counting ACL Hits.................................................................................................................................................... 119
Congure Ingress ACLs................................................................................................................................................. 120
Congure Egress ACLs..................................................................................................................................................120
Applying Egress Layer 3 ACLs (Control-Plane)..................................................................................................... 121
IP Prex Lists.................................................................................................................................................................. 122
Implementation Information.................................................................................................................................... 122
Conguration Task List for Prex Lists.................................................................................................................. 122
ACL Resequencing......................................................................................................................................................... 126
Resequencing an ACL or Prex List.......................................................................................................................126
Route Maps..................................................................................................................................................................... 127
Implementation Information.................................................................................................................................... 128
Flow-Based Monitoring Support for ACLs.................................................................................................................. 128
Behavior of Flow-Based Monitoring.......................................................................................................................128
Enabling Flow-Based Monitoring............................................................................................................................129
7 Bidirectional Forwarding Detection (BFD)................................................................................................... 131
How BFD Works.............................................................................................................................................................. 131
BFD Packet Format..................................................................................................................................................132
BFD Sessions............................................................................................................................................................ 133
BFD Three-Way Handshake.................................................................................................................................... 134
Session State Changes............................................................................................................................................136
Important Points to Remember.................................................................................................................................... 136
Congure BFD................................................................................................................................................................ 136
Congure BFD for Physical Ports...........................................................................................................................137
Congure BFD for Static Routes............................................................................................................................140
Congure BFD for OSPF.........................................................................................................................................142
Congure BFD for OSPFv3.....................................................................................................................................147
Congure BFD for IS-IS...........................................................................................................................................149
Congure BFD for BGP............................................................................................................................................151
Congure BFD for VRRP.........................................................................................................................................158
Conguring Protocol Liveness.................................................................................................................................161
Troubleshooting BFD.................................................................................................................................................161
8 Border Gateway Protocol IPv4 (BGPv4).....................................................................................................163
Autonomous Systems (AS)........................................................................................................................................... 163
Sessions and Peers........................................................................................................................................................ 165
6
Contents
Establish a Session...................................................................................................................................................165
Route Reectors.............................................................................................................................................................166
BGP Attributes................................................................................................................................................................167
Best Path Selection Criteria.................................................................................................................................... 167
Weight........................................................................................................................................................................169
Local Preference.......................................................................................................................................................169
Multi-Exit Discriminators (MEDs)...........................................................................................................................170
Origin...........................................................................................................................................................................171
AS Path...................................................................................................................................................................... 172
Next Hop................................................................................................................................................................... 172
Multiprotocol BGP.......................................................................................................................................................... 172
Implement BGP with Dell Networking OS...................................................................................................................173
Additional Path (Add-Path) Support......................................................................................................................173
Advertise IGP Cost as MED for Redistributed Routes.........................................................................................173
Ignore Router-ID in Best-Path Calculation.............................................................................................................174
Four-Byte AS Numbers............................................................................................................................................174
AS4 Number Representation...................................................................................................................................174
AS Number Migration...............................................................................................................................................176
BGP4 Management Information Base (MIB)........................................................................................................ 177
Important Points to Remember...............................................................................................................................177
Conguration Information..............................................................................................................................................178
BGP Conguration..........................................................................................................................................................178
Enabling BGP............................................................................................................................................................ 179
Conguring AS4 Number Representations........................................................................................................... 182
Conguring Peer Groups......................................................................................................................................... 184
Conguring BGP Fast Fall-Over.............................................................................................................................186
Conguring Passive Peering................................................................................................................................... 188
Maintaining Existing AS Numbers During an AS Migration................................................................................. 188
Allowing an AS Number to Appear in its Own AS Path....................................................................................... 189
Enabling Graceful Restart....................................................................................................................................... 190
Enabling Neighbor Graceful Restart....................................................................................................................... 191
Filtering on an AS-Path Attribute............................................................................................................................191
Regular Expressions as Filters.................................................................................................................................193
Redistributing Routes...............................................................................................................................................194
Enabling Additional Paths........................................................................................................................................ 195
Conguring IP Community Lists.............................................................................................................................195
Conguring an IP Extended Community List........................................................................................................196
Filtering Routes with Community Lists.................................................................................................................. 197
Manipulating the COMMUNITY Attribute.............................................................................................................198
Changing MED Attributes....................................................................................................................................... 199
Changing the LOCAL_PREFERENCE Attribute.................................................................................................. 199
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............ 200
Changing the WEIGHT Attribute............................................................................................................................201
Enabling Multipath....................................................................................................................................................201
Filtering BGP Routes................................................................................................................................................201
Contents
7
Filtering BGP Routes Using Route Maps..............................................................................................................203
Filtering BGP Routes Using AS-PATH Information..............................................................................................203
Conguring BGP Route Reectors........................................................................................................................204
Aggregating Routes.................................................................................................................................................205
Conguring BGP Confederations.......................................................................................................................... 205
Enabling Route Flap Dampening............................................................................................................................ 206
Changing BGP Timers.............................................................................................................................................208
Enabling BGP Neighbor Soft-Reconguration.....................................................................................................208
Route Map Continue............................................................................................................................................... 209
Enabling MBGP Congurations.................................................................................................................................... 210
BGP Regular Expression Optimization..........................................................................................................................211
Debugging BGP...............................................................................................................................................................211
Storing Last and Bad PDUs.....................................................................................................................................212
Capturing PDUs........................................................................................................................................................213
PDU Counters...........................................................................................................................................................214
Sample Congurations...................................................................................................................................................214
9 Content Addressable Memory (CAM).........................................................................................................221
CAM Allocation............................................................................................................................................................... 221
Test CAM Usage............................................................................................................................................................ 223
View CAM-ACL Settings.............................................................................................................................................. 223
View CAM Usage...........................................................................................................................................................224
CAM Optimization......................................................................................................................................................... 225
Troubleshoot CAM Proling..........................................................................................................................................225
QoS CAM Region Limitation...................................................................................................................................225
Syslog Error When the Table is Full....................................................................................................................... 225
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................226
Syslog Warning for Discrepancies Between Congured Extended Prexes....................................................226
Unied Forwarding Table (UFT) Modes......................................................................................................................226
Conguring UFT Modes..........................................................................................................................................226
10 Control Plane Policing (CoPP)................................................................................................................. 228
Congure Control Plane Policing................................................................................................................................. 229
Conguring CoPP for Protocols............................................................................................................................ 230
Conguring CoPP for CPU Queues...................................................................................................................... 232
Displaying CoPP Conguration ............................................................................................................................. 233
11 Data Center Bridging (DCB)......................................................................................................................235
Ethernet Enhancements in Data Center Bridging..................................................................................................... 235
Priority-Based Flow Control................................................................................................................................... 236
Enhanced Transmission Selection..........................................................................................................................237
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................238
Data Center Bridging in a Trac Flow...................................................................................................................239
Enabling Data Center Bridging..................................................................................................................................... 239
DCB Maps and its Attributes..................................................................................................................................240
Data Center Bridging: Default Conguration..............................................................................................................240
8
Contents
Conguring Priority-Based Flow Control.....................................................................................................................241
Conguring Lossless Queues................................................................................................................................. 242
Conguring PFC in a DCB Map................................................................................................................................... 243
PFC Conguration Notes........................................................................................................................................243
PFC Prerequisites and Restrictions....................................................................................................................... 244
Applying a DCB Map on a Port.................................................................................................................................... 244
Conguring PFC without a DCB Map.........................................................................................................................245
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................245
Pause and Resume of Trac..................................................................................................................................245
Buer Sizes for Lossless or PFC Packets.............................................................................................................246
Behavior of Tagged Packets.........................................................................................................................................246
SNMP Support for PFC and Buer Statistics Tracking............................................................................................247
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................247
Conguration Example for DSCP and PFC Priorities................................................................................................248
Using PFC to Manage Converged Ethernet Trac...................................................................................................249
Generation of PFC for a Priority for Untagged Packets...........................................................................................249
Congure Enhanced Transmission Selection..............................................................................................................249
Creating an ETS Priority Group..............................................................................................................................249
ETS Operation with DCBx......................................................................................................................................250
Conguring ETS in a DCB Map.............................................................................................................................. 251
Hierarchical Scheduling in ETS Output Policies......................................................................................................... 252
Using ETS to Manage Converged Ethernet Trac...................................................................................................252
Applying DCB Policies in a Switch Stack.................................................................................................................... 253
Congure a DCBx Operation........................................................................................................................................253
DCBx Operation....................................................................................................................................................... 253
DCBx Port Roles...................................................................................................................................................... 253
DCB Conguration Exchange................................................................................................................................ 255
Conguration Source Election............................................................................................................................... 255
Propagation of DCB Information........................................................................................................................... 256
Auto-Detection and Manual Conguration of the DCBx Version...................................................................... 256
DCBx Example......................................................................................................................................................... 256
DCBx Prerequisites and Restrictions.....................................................................................................................257
Conguring DCBx.................................................................................................................................................... 257
Verifying the DCB Conguration.................................................................................................................................. 261
QoS dot1p Trac Classication and Queue Assignment..........................................................................................268
Conguring the Dynamic Buer Method................................................................................................................... 268
Sample DCB Conguration...........................................................................................................................................269
PFC and ETS Conguration Command Examples................................................................................................271
12 Dynamic Host Conguration Protocol (DHCP)......................................................................................... 272
DHCP Packet Format and Options..............................................................................................................................272
Assign an IP Address using DHCP............................................................................................................................... 274
Implementation Information..........................................................................................................................................275
Congure the System to be a DHCP Server..............................................................................................................275
Conguring the Server for Automatic Address Allocation..................................................................................276
Specifying a Default Gateway.................................................................................................................................277
Contents
9
Congure a Method of Hostname Resolution......................................................................................................277
Using DNS for Address Resolution........................................................................................................................ 277
Using NetBIOS WINS for Address Resolution......................................................................................................278
Creating Manual Binding Entries............................................................................................................................278
Debugging the DHCP Server................................................................................................................................. 278
Using DHCP Clear Commands...............................................................................................................................279
Congure the System to be a DHCP Client............................................................................................................... 279
Conguring the DHCP Client System................................................................................................................... 279
DHCP Client on a Management Interface.............................................................................................................281
DHCP Client Operation with Other Features........................................................................................................281
Congure the System for User Port Stacking (Option 230)....................................................................................282
Congure Secure DHCP............................................................................................................................................... 282
Option 82..................................................................................................................................................................283
DHCP Snooping.......................................................................................................................................................283
Drop DHCP Packets on Snooped VLANs Only....................................................................................................286
Dynamic ARP Inspection.........................................................................................................................................287
Conguring Dynamic ARP Inspection................................................................................................................... 288
Source Address Validation............................................................................................................................................ 289
Enabling IP Source Address Validation..................................................................................................................289
DHCP MAC Source Address Validation................................................................................................................ 290
Enabling IP+MAC Source Address Validation.......................................................................................................290
Viewing the Number of SAV Dropped Packets.................................................................................................... 291
Clearing the Number of SAV Dropped Packets....................................................................................................291
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 292
ECMP for Flow-Based Anity.....................................................................................................................................292
Conguring the Hash Algorithm Seed.................................................................................................................. 292
Link Bundle Monitoring................................................................................................................................................. 292
Managing ECMP Group Paths...............................................................................................................................293
Creating an ECMP Group Bundle.......................................................................................................................... 293
Modifying the ECMP Group Threshold.................................................................................................................294
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................294
Support for ECMP in host table............................................................................................................................ 295
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................295
RTAG7.......................................................................................................................................................................295
Flow-based Hashing for ECMP............................................................................................................................. 296
14 FIP Snooping............................................................................................................................................300
Fibre Channel over Ethernet........................................................................................................................................300
Ensure Robustness in a Converged Ethernet Network............................................................................................300
FIP Snooping on Ethernet Bridges.............................................................................................................................. 302
Using FIP Snooping....................................................................................................................................................... 304
FIP Snooping Prerequisites.....................................................................................................................................304
Important Points to Remember............................................................................................................................. 304
Enabling the FCoE Transit Feature........................................................................................................................305
Enable FIP Snooping on VLANs.............................................................................................................................306
10
Contents
Congure the FC-MAP Value................................................................................................................................ 306
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................306
Congure a Port for a Bridge-to-FCF Link...........................................................................................................306
Impact on Other Software Features......................................................................................................................307
FIP Snooping Restrictions.......................................................................................................................................307
Conguring FIP Snooping.......................................................................................................................................307
Displaying FIP Snooping Information...........................................................................................................................308
FCoE Transit Conguration Example........................................................................................................................... 313
15 Flex Hash and Optimized Boot-Up............................................................................................................ 315
Flex Hash Capability Overview..................................................................................................................................... 315
Conguring the Flex Hash Mechanism........................................................................................................................315
Conguring Fast Boot and LACP Fast Switchover....................................................................................................316
Optimizing the Boot Time............................................................................................................................................. 316
Booting Process When Optimized Boot Time Mechanism is Enabled...............................................................316
Guidelines for Conguring Optimized Booting Mechanism.................................................................................317
Interoperation of Applications with Fast Boot and System States...........................................................................318
LACP and IPv4 Routing...........................................................................................................................................318
LACP and IPv6 Routing...........................................................................................................................................318
BGP Graceful Restart.............................................................................................................................................. 319
Cold Boot Caused by Power Cycling the System................................................................................................ 319
Unexpected Reload of the System........................................................................................................................ 319
Software Upgrade.................................................................................................................................................... 319
LACP Fast Switchover.............................................................................................................................................319
Changes to BGP Multipath.................................................................................................................................... 320
Delayed Installation of ECMP Routes Into BGP...................................................................................................320
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 320
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.......................................................................................321
16 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 322
Protocol Overview......................................................................................................................................................... 322
Ring Status............................................................................................................................................................... 323
Multiple FRRP Rings................................................................................................................................................323
Important FRRP Points........................................................................................................................................... 324
Important FRRP Concepts..................................................................................................................................... 325
Implementing FRRP.......................................................................................................................................................326
FRRP Conguration.......................................................................................................................................................326
Creating the FRRP Group.......................................................................................................................................326
Conguring the Control VLAN...............................................................................................................................326
Conguring and Adding the Member VLANs.......................................................................................................328
Setting the FRRP Timers........................................................................................................................................329
Clearing the FRRP Counters..................................................................................................................................329
Viewing the FRRP Conguration...........................................................................................................................329
Viewing the FRRP Information...............................................................................................................................329
Troubleshooting FRRP.................................................................................................................................................. 330
Conguration Checks..............................................................................................................................................330
Contents
11
Sample Conguration and Topology............................................................................................................................330
17 GARP VLAN Registration Protocol (GVRP).............................................................................................. 332
Important Points to Remember....................................................................................................................................332
Congure GVRP............................................................................................................................................................ 333
Related Conguration Tasks...................................................................................................................................333
Enabling GVRP Globally................................................................................................................................................ 334
Enabling GVRP on a Layer 2 Interface........................................................................................................................334
Congure GVRP Registration.......................................................................................................................................334
Congure a GARP Timer.............................................................................................................................................. 335
18 Internet Group Management Protocol (IGMP)......................................................................................... 336
IGMP Implementation Information.............................................................................................................................. 336
IGMP Protocol Overview..............................................................................................................................................336
IGMP Version 2........................................................................................................................................................ 336
IGMP Version 3........................................................................................................................................................ 338
Congure IGMP..............................................................................................................................................................341
Related Conguration Tasks....................................................................................................................................341
Viewing IGMP Enabled Interfaces............................................................................................................................... 342
Selecting an IGMP Version........................................................................................................................................... 342
Viewing IGMP Groups...................................................................................................................................................342
Adjusting Timers............................................................................................................................................................ 343
Adjusting Query and Response Timers................................................................................................................. 343
Enabling IGMP Immediate-Leave.................................................................................................................................344
IGMP Snooping..............................................................................................................................................................344
IGMP Snooping Implementation Information....................................................................................................... 344
Conguring IGMP Snooping...................................................................................................................................344
Removing a Group-Port Association.....................................................................................................................345
Disabling Multicast Flooding...................................................................................................................................345
Specifying a Port as Connected to a Multicast Router...................................................................................... 345
Conguring the Switch as Querier........................................................................................................................ 346
Fast Convergence after MSTP Topology Changes...................................................................................................346
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................ 347
Protocol Separation................................................................................................................................................. 347
Enabling and Disabling Management Egress Interface Selection...................................................................... 348
Handling of Management Route Conguration................................................................................................... 349
Handling of Switch-Initiated Trac....................................................................................................................... 349
Handling of Switch-Destined Trac..................................................................................................................... 350
Handling of Transit Trac (Trac Separation)..................................................................................................... 351
Mapping of Management Applications and Trac Type......................................................................................351
Behavior of Various Applications for Switch-Initiated Trac ............................................................................ 352
Behavior of Various Applications for Switch-Destined Trac ...........................................................................353
Interworking of EIS With Various Applications.....................................................................................................354
Designating a Multicast Router Interface................................................................................................................... 354
19 Interfaces.................................................................................................................................................355
12
Contents
Basic Interface Conguration.......................................................................................................................................355
Advanced Interface Conguration...............................................................................................................................355
Interface Types...............................................................................................................................................................356
View Basic Interface Information.................................................................................................................................356
Resetting an Interface to its Factory Default State...................................................................................................358
Enabling a Physical Interface........................................................................................................................................359
Physical Interfaces.........................................................................................................................................................359
Conguration Task List for Physical Interfaces....................................................................................................359
Overview of Layer Modes...................................................................................................................................... 360
Conguring Layer 2 (Data Link) Mode..................................................................................................................360
Conguring Layer 2 (Interface) Mode................................................................................................................... 361
Conguring Layer 3 (Network) Mode................................................................................................................... 361
Conguring Layer 3 (Interface) Mode................................................................................................................... 361
Egress Interface Selection (EIS)..................................................................................................................................362
Important Points to Remember............................................................................................................................. 362
Conguring EIS........................................................................................................................................................ 362
Management Interfaces................................................................................................................................................363
Conguring Management Interfaces.....................................................................................................................363
Conguring a Management Interface on an Ethernet Port................................................................................364
VLAN Interfaces............................................................................................................................................................ 365
Loopback Interfaces......................................................................................................................................................366
Null Interfaces................................................................................................................................................................ 366
Port Channel Interfaces................................................................................................................................................366
Port Channel Denition and Standards................................................................................................................. 367
Port Channel Benets............................................................................................................................................. 367
Port Channel Implementation.................................................................................................................................367
Interfaces in Port Channels.................................................................................................................................... 368
Conguration Tasks for Port Channel Interfaces.................................................................................................368
Creating a Port Channel......................................................................................................................................... 368
Adding a Physical Interface to a Port Channel.....................................................................................................369
Reassigning an Interface to a New Port Channel................................................................................................ 370
Conguring the Minimum Oper Up Links in a Port Channel............................................................................... 371
Adding or Removing a Port Channel from a VLAN.............................................................................................. 371
Assigning an IP Address to a Port Channel...........................................................................................................372
Deleting or Disabling a Port Channel..................................................................................................................... 373
Load Balancing Through Port Channels................................................................................................................373
Load-Balancing Method.......................................................................................................................................... 373
Changing the Hash Algorithm................................................................................................................................ 374
Bulk Conguration......................................................................................................................................................... 375
Interface Range........................................................................................................................................................375
Bulk Conguration Examples..................................................................................................................................375
Dening Interface Range Macros.................................................................................................................................377
Dene the Interface Range.....................................................................................................................................377
Choosing an Interface-Range Macro.....................................................................................................................377
Monitoring and Maintaining Interfaces........................................................................................................................378
Contents
13
Split 40G Ports on a 16X40G QSFP+ Module............................................................................................................379
Splitting 100G Ports...................................................................................................................................................... 380
Link Dampening.............................................................................................................................................................. 381
Important Points to Remember.............................................................................................................................. 381
Enabling Link Dampening.........................................................................................................................................381
Link Bundle Monitoring................................................................................................................................................. 383
Using Ethernet Pause Frames for Flow Control........................................................................................................ 383
Enabling Pause Frames........................................................................................................................................... 384
Congure the MTU Size on an Interface....................................................................................................................384
Port-Pipes.......................................................................................................................................................................385
CR4 Auto-Negotiation.................................................................................................................................................. 385
FEC Conguration......................................................................................................................................................... 386
Setting the Speed of Ethernet Interfaces...................................................................................................................387
Adjusting the Keepalive Timer......................................................................................................................................389
View Advanced Interface Information.........................................................................................................................389
Conguring the Interface Sampling Size.............................................................................................................. 390
Dynamic Counters.......................................................................................................................................................... 391
Clearing Interface Counters.................................................................................................................................... 391
Enhanced Validation of Interface Ranges...................................................................................................................392
Compressing Conguration Files................................................................................................................................. 392
20 IPv4 Routing............................................................................................................................................396
IP Addresses................................................................................................................................................................... 397
Implementation Information....................................................................................................................................397
Conguration Tasks for IP Addresses..........................................................................................................................397
Assigning IP Addresses to an Interface.......................................................................................................................397
Conguring Static Routes............................................................................................................................................ 398
Congure Static Routes for the Management Interface..........................................................................................399
Using the Congured Source IP Address in ICMP Messages..................................................................................400
Conguring the ICMP Source Interface............................................................................................................... 400
Conguring the Duration to Establish a TCP Connection........................................................................................ 400
Enabling Directed Broadcast.........................................................................................................................................401
Resolution of Host Names............................................................................................................................................ 401
Enabling Dynamic Resolution of Host Names.............................................................................................................401
Specifying the Local System Domain and a List of Domains................................................................................... 402
Conguring DNS with Traceroute................................................................................................................................402
ARP................................................................................................................................................................................. 403
Conguration Tasks for ARP........................................................................................................................................ 403
Conguring Static ARP Entries....................................................................................................................................403
Enabling Proxy ARP.......................................................................................................................................................404
Clearing ARP Cache......................................................................................................................................................404
ARP Learning via Gratuitous ARP............................................................................................................................... 404
Enabling ARP Learning via Gratuitous ARP................................................................................................................405
ARP Learning via ARP Request................................................................................................................................... 405
Conguring ARP Retries...............................................................................................................................................406
ICMP............................................................................................................................................................................... 406
14
Contents
Conguration Tasks for ICMP...................................................................................................................................... 406
Enabling ICMP Unreachable Messages...................................................................................................................... 406
UDP Helper.....................................................................................................................................................................407
Congure UDP Helper.............................................................................................................................................407
Important Points to Remember..............................................................................................................................407
Enabling UDP Helper..................................................................................................................................................... 407
Conguring a Broadcast Address................................................................................................................................ 407
Congurations Using UDP Helper............................................................................................................................... 408
UDP Helper with Broadcast-All Addresses.................................................................................................................408
UDP Helper with Subnet Broadcast Addresses.........................................................................................................409
UDP Helper with Congured Broadcast Addresses..................................................................................................409
UDP Helper with No Congured Broadcast Addresses............................................................................................ 410
Troubleshooting UDP Helper.........................................................................................................................................410
21 IPv6 Routing..............................................................................................................................................411
Protocol Overview...........................................................................................................................................................411
Extended Address Space.........................................................................................................................................412
Stateless Autoconguration.................................................................................................................................... 412
IPv6 Headers.............................................................................................................................................................412
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support.................................................................... 413
IPv6 Header Fields................................................................................................................................................... 414
Extension Header Fields.......................................................................................................................................... 416
Addressing................................................................................................................................................................. 417
Implementing IPv6 with Dell Networking OS..............................................................................................................418
ICMPv6............................................................................................................................................................................418
Path MTU Discovery......................................................................................................................................................418
IPv6 Neighbor Discovery...............................................................................................................................................419
IPv6 Neighbor Discovery of MTU Packets........................................................................................................... 419
Conguring the IPv6 Recursive DNS Server........................................................................................................419
Debugging IPv6 RDNSS Information Sent to the Host ..................................................................................... 420
Displaying IPv6 RDNSS Information.......................................................................................................................421
Secure Shell (SSH) Over an IPv6 Transport............................................................................................................... 421
Conguration Tasks for IPv6........................................................................................................................................ 422
Adjusting Your CAM-Prole....................................................................................................................................422
Assigning an IPv6 Address to an Interface........................................................................................................... 423
Assigning a Static IPv6 Route................................................................................................................................ 423
Conguring Telnet with IPv6.................................................................................................................................. 424
SNMP over IPv6......................................................................................................................................................424
Displaying IPv6 Information.................................................................................................................................... 424
Displaying an IPv6 Interface Information.............................................................................................................. 425
Showing IPv6 Routes..............................................................................................................................................426
Showing the Running-Conguration for an Interface......................................................................................... 427
Clearing IPv6 Routes............................................................................................................................................... 427
Conguring IPv6 RA Guard.......................................................................................................................................... 428
Conguring IPv6 RA Guard on an Interface.........................................................................................................429
Monitoring IPv6 RA Guard..................................................................................................................................... 430
Contents
15
22 iSCSI Optimization................................................................................................................................... 431
iSCSI Optimization Overview........................................................................................................................................431
Monitoring iSCSI Trac Flows...............................................................................................................................433
Application of Quality of Service to iSCSI Trac Flows......................................................................................433
Information Monitored in iSCSI Trac Flows....................................................................................................... 433
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 434
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................434
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................435
Enable and Disable iSCSI Optimization................................................................................................................. 435
Default iSCSI Optimization Values...............................................................................................................................436
iSCSI Optimization Prerequisites................................................................................................................................. 436
Conguring iSCSI Optimization....................................................................................................................................436
Displaying iSCSI Optimization Information..................................................................................................................438
23 Intermediate System to Intermediate System.......................................................................................... 440
IS-IS Protocol Overview............................................................................................................................................... 440
IS-IS Addressing.............................................................................................................................................................440
Multi-Topology IS-IS....................................................................................................................................................... 441
Transition Mode........................................................................................................................................................ 441
Interface Support.....................................................................................................................................................442
Adjacencies...............................................................................................................................................................442
Graceful Restart.............................................................................................................................................................442
Timers........................................................................................................................................................................442
Implementation Information..........................................................................................................................................442
Conguration Information.............................................................................................................................................443
Conguration Tasks for IS-IS..................................................................................................................................444
Conguring the Distance of a Route......................................................................................................................451
Changing the IS-Type.............................................................................................................................................. 452
Redistributing IPv4 Routes.....................................................................................................................................454
Redistributing IPv6 Routes.....................................................................................................................................455
Conguring Authentication Passwords.................................................................................................................456
Setting the Overload Bit......................................................................................................................................... 456
Debugging IS-IS....................................................................................................................................................... 457
IS-IS Metric Styles.........................................................................................................................................................458
Congure Metric Values............................................................................................................................................... 458
Maximum Values in the Routing Table.................................................................................................................. 459
Change the IS-IS Metric Style in One Level Only................................................................................................459
Leaks from One Level to Another..........................................................................................................................460
Sample Congurations...................................................................................................................................................461
24 Link Aggregation Control Protocol (LACP).............................................................................................. 464
Introduction to Dynamic LAGs and LACP.................................................................................................................. 464
Important Points to Remember............................................................................................................................. 464
LACP Modes............................................................................................................................................................ 465
Conguring LACP Commands...............................................................................................................................465
16
Contents
LACP Conguration Tasks............................................................................................................................................466
Creating a LAG.........................................................................................................................................................466
Conguring the LAG Interfaces as Dynamic........................................................................................................466
Setting the LACP Long Timeout............................................................................................................................467
Monitoring and Debugging LACP.......................................................................................................................... 467
Shared LAG State Tracking.......................................................................................................................................... 468
Conguring Shared LAG State Tracking...............................................................................................................468
Important Points about Shared LAG State Tracking........................................................................................... 470
LACP Basic Conguration Example.............................................................................................................................470
Congure a LAG on ALPHA................................................................................................................................... 470
25 Layer 2.....................................................................................................................................................479
Manage the MAC Address Table................................................................................................................................. 479
Clearing the MAC Address Table........................................................................................................................... 479
Setting the Aging Time for Dynamic Entries........................................................................................................ 479
Conguring a Static MAC Address........................................................................................................................480
Displaying the MAC Address Table........................................................................................................................ 480
MAC Learning Limit.......................................................................................................................................................480
Setting the MAC Learning Limit............................................................................................................................. 481
mac learning-limit Dynamic..................................................................................................................................... 481
mac learning-limit mac-address-sticky.................................................................................................................. 481
mac learning-limit station-move.............................................................................................................................482
mac learning-limit no-station-move.......................................................................................................................482
Learning Limit Violation Actions............................................................................................................................. 482
Setting Station Move Violation Actions................................................................................................................ 483
Recovering from Learning Limit and Station Move Violations........................................................................... 483
Disabling MAC Address Learning on the System.................................................................................................484
NIC Teaming................................................................................................................................................................... 484
Congure Redundant Pairs...........................................................................................................................................485
Important Points about Conguring Redundant Pairs.........................................................................................487
Far-End Failure Detection............................................................................................................................................. 488
FEFD State Changes...............................................................................................................................................489
Conguring FEFD.................................................................................................................................................... 490
Enabling FEFD on an Interface.............................................................................................................................. 490
Debugging FEFD.......................................................................................................................................................491
26 Link Layer Discovery Protocol (LLDP)..................................................................................................... 493
802.1AB (LLDP) Overview............................................................................................................................................493
Protocol Data Units................................................................................................................................................. 493
Optional TLVs................................................................................................................................................................. 494
Management TLVs.................................................................................................................................................. 494
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 496
TIA Organizationally Specic TLVs........................................................................................................................496
Congure LLDP............................................................................................................................................................. 500
Related Conguration Tasks...................................................................................................................................500
Important Points to Remember............................................................................................................................. 500
Contents
17
LLDP Compatibility..................................................................................................................................................500
CONFIGURATION versus INTERFACE Congurations............................................................................................500
Enabling LLDP................................................................................................................................................................ 501
Disabling and Undoing LLDP...................................................................................................................................501
Enabling LLDP on Management Ports........................................................................................................................502
Disabling and Undoing LLDP on Management Ports..........................................................................................502
Advertising TLVs............................................................................................................................................................ 502
Viewing the LLDP Conguration................................................................................................................................. 503
Viewing Information Advertised by Adjacent LLDP Agents..................................................................................... 504
Conguring LLDPDU Intervals.....................................................................................................................................505
Conguring Transmit and Receive Mode................................................................................................................... 505
Conguring the Time to Live Value............................................................................................................................. 506
Debugging LLDP............................................................................................................................................................507
Relevant Management Objects................................................................................................................................... 508
27 Microsoft Network Load Balancing........................................................................................................... 513
NLB Unicast Mode Scenario.........................................................................................................................................513
NLB Multicast Mode Scenario......................................................................................................................................513
Limitations of the NLB Feature.....................................................................................................................................514
Microsoft Clustering.......................................................................................................................................................514
Enable and Disable VLAN Flooding ............................................................................................................................. 514
Conguring a Switch for NLB ......................................................................................................................................514
Enabling a Switch for Multicast NLB..................................................................................................................... 515
28 Multicast Source Discovery Protocol (MSDP)..........................................................................................516
Protocol Overview..........................................................................................................................................................516
Anycast RP......................................................................................................................................................................517
Implementation Information.......................................................................................................................................... 518
Congure Multicast Source Discovery Protocol.........................................................................................................518
Related Conguration Tasks....................................................................................................................................518
Enable MSDP................................................................................................................................................................. 522
Manage the Source-Active Cache.............................................................................................................................. 523
Viewing the Source-Active Cache.........................................................................................................................523
Limiting the Source-Active Cache.........................................................................................................................523
Clearing the Source-Active Cache........................................................................................................................ 524
Enabling the Rejected Source-Active Cache....................................................................................................... 524
Accept Source-Active Messages that Fail the RFP Check......................................................................................524
Specifying Source-Active Messages........................................................................................................................... 527
Limiting the Source-Active Messages from a Peer...................................................................................................528
Preventing MSDP from Caching a Local Source.......................................................................................................528
Preventing MSDP from Caching a Remote Source.................................................................................................. 529
Preventing MSDP from Advertising a Local Source..................................................................................................529
Logging Changes in Peership States...........................................................................................................................530
Terminating a Peership..................................................................................................................................................530
Clearing Peer Statistics..................................................................................................................................................531
Debugging MSDP...........................................................................................................................................................531
18
Contents
MSDP with Anycast RP................................................................................................................................................532
Conguring Anycast RP................................................................................................................................................533
Reducing Source-Active Message Flooding.........................................................................................................534
Specifying the RP Address Used in SA Messages.............................................................................................. 534
MSDP Sample Congurations..................................................................................................................................... 536
29 Multiple Spanning Tree Protocol (MSTP)................................................................................................ 539
Protocol Overview.........................................................................................................................................................539
Spanning Tree Variations.............................................................................................................................................. 540
Implementation Information................................................................................................................................... 540
Congure Multiple Spanning Tree Protocol................................................................................................................540
Related Conguration Tasks....................................................................................................................................541
Enable Multiple Spanning Tree Globally....................................................................................................................... 541
Adding and Removing Interfaces..................................................................................................................................541
Creating Multiple Spanning Tree Instances................................................................................................................ 542
Inuencing MSTP Root Selection................................................................................................................................542
Interoperate with Non-Dell Bridges.............................................................................................................................543
Changing the Region Name or Revision..................................................................................................................... 543
Modifying Global Parameters....................................................................................................................................... 544
Modifying the Interface Parameters........................................................................................................................... 545
Conguring an EdgePort.............................................................................................................................................. 546
Flush MAC Addresses after a Topology Change........................................................................................................547
MSTP Sample Congurations...................................................................................................................................... 547
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration....................................................................................... 547
Debugging and Verifying MSTP Congurations........................................................................................................ 549
30 Multicast Features................................................................................................................................... 551
Enabling IP Multicast..................................................................................................................................................... 551
Implementation Information.......................................................................................................................................... 551
Multicast Policies...........................................................................................................................................................552
IPv4 Multicast Policies............................................................................................................................................552
31 Object Tracking........................................................................................................................................ 560
Object Tracking Overview............................................................................................................................................ 560
Track Layer 2 Interfaces.......................................................................................................................................... 561
Track Layer 3 Interfaces.......................................................................................................................................... 561
Track IPv4 and IPv6 Routes................................................................................................................................... 562
Set Tracking Delays................................................................................................................................................. 563
VRRP Object Tracking............................................................................................................................................ 563
Object Tracking Conguration..................................................................................................................................... 563
Tracking a Layer 2 Interface................................................................................................................................... 563
Tracking a Layer 3 Interface................................................................................................................................... 564
Track an IPv4/IPv6 Route......................................................................................................................................566
Displaying Tracked Objects...........................................................................................................................................569
Contents
19
32 Open Shortest Path First (OSPFv2 and OSPFv3).................................................................................... 571
Protocol Overview..........................................................................................................................................................571
Autonomous System (AS) Areas............................................................................................................................ 571
Area Types................................................................................................................................................................ 572
Networks and Neighbors........................................................................................................................................ 573
Router Types.............................................................................................................................................................573
Designated and Backup Designated Routers....................................................................................................... 575
Link-State Advertisements (LSAs)........................................................................................................................ 575
Router Priority and Cost......................................................................................................................................... 576
OSPF with Dell Networking OS................................................................................................................................... 577
Graceful Restart.......................................................................................................................................................578
Fast Convergence (OSPFv2, IPv4 Only).............................................................................................................. 579
Multi-Process OSPFv2 with VRF.......................................................................................................................... 579
RFC-2328 Compliant OSPF Flooding....................................................................................................................579
OSPF ACK Packing................................................................................................................................................. 580
Setting OSPF Adjacency with Cisco Routers...................................................................................................... 580
Conguration Information..............................................................................................................................................581
Conguration Task List for OSPFv2 (OSPF for IPv4)......................................................................................... 581
Conguration Task List for OSPFv3 (OSPF for IPv6).............................................................................................. 595
Enabling IPv6 Unicast Routing...............................................................................................................................596
Assigning IPv6 Addresses on an Interface........................................................................................................... 596
Assigning Area ID on an Interface.......................................................................................................................... 597
Assigning OSPFv3 Process ID and Router ID Globally........................................................................................ 597
Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................598
Applying cost for OSPFv3......................................................................................................................................598
Conguring Stub Areas...........................................................................................................................................599
Conguring Passive-Interface................................................................................................................................599
Redistributing Routes..............................................................................................................................................599
Conguring a Default Route...................................................................................................................................600
Applying cost for OSPFv3......................................................................................................................................600
Enabling OSPFv3 Graceful Restart.......................................................................................................................600
OSPFv3 Authentication Using IPsec.....................................................................................................................603
Troubleshooting OSPFv3........................................................................................................................................609
33 Policy-based Routing (PBR)..................................................................................................................... 611
Overview.......................................................................................................................................................................... 611
Implementing PBR..........................................................................................................................................................612
Conguration Task List for Policy-based Routing.......................................................................................................612
PBR Exceptions (Permit)........................................................................................................................................ 613
Create a Redirect List.............................................................................................................................................. 613
Create a Rule for a Redirect-list............................................................................................................................. 613
Apply a Redirect-list to an Interface using a Redirect-group.............................................................................. 615
Sample Conguration.....................................................................................................................................................617
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD...... 618
20
Contents
/