Dell PowerSwitch S4810P User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4810P User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S4810 System
9.11(0.0)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 01
Rev. A00
Contents
1 About this Guide...........................................................................................................................................34
Audience............................................................................................................................................................................34
Conventions......................................................................................................................................................................34
Related Documents......................................................................................................................................................... 34
2 Configuration Fundamentals........................................................................................................................35
Accessing the Command Line........................................................................................................................................35
CLI Modes.........................................................................................................................................................................35
Navigating CLI Modes............................................................................................................................................... 37
The do Command............................................................................................................................................................ 40
Undoing Commands........................................................................................................................................................ 40
Obtaining Help...................................................................................................................................................................41
Entering and Editing Commands.................................................................................................................................... 41
Command History............................................................................................................................................................42
Filtering show Command Outputs.................................................................................................................................42
Example of the grep Keyword..................................................................................................................................42
Multiple Users in Configuration Mode...........................................................................................................................43
3 Getting Started........................................................................................................................................... 44
Console Access................................................................................................................................................................45
Serial Console.............................................................................................................................................................45
Accessing the CLI Interface and Running Scripts Using SSH................................................................................... 46
Entering CLI commands Using an SSH Connection..............................................................................................46
Executing Local CLI Scripts Using an SSH Connection........................................................................................46
Default Configuration...................................................................................................................................................... 47
Configuring a Host Name................................................................................................................................................47
Accessing the System Remotely................................................................................................................................... 47
Accessing the System Remotely............................................................................................................................. 47
Configure the Management Port IP Address.........................................................................................................48
Configure a Management Route............................................................................................................................. 48
Configuring a Username and Password..................................................................................................................48
Configuring the Enable Password................................................................................................................................. 49
Configuration File Management.....................................................................................................................................49
Copy Files to and from the System.........................................................................................................................49
Mounting an NFS File System................................................................................................................................. 50
Save the Running-Configuration............................................................................................................................. 52
Configure the Overload Bit for a Startup Scenario...............................................................................................52
Viewing Files...............................................................................................................................................................52
Compressing Configuration Files............................................................................................................................. 53
Managing the File System.............................................................................................................................................. 56
Enabling Software Features on Devices Using a Command Option.........................................................................56
View Command History.................................................................................................................................................. 57
Contents
3
Upgrading Dell Networking OS...................................................................................................................................... 57
Verify Software Images Before Installation.................................................................................................................. 57
Using HTTP for File Transfers....................................................................................................................................... 58
4 Management............................................................................................................................................... 60
Configuring Privilege Levels........................................................................................................................................... 60
Creating a Custom Privilege Level........................................................................................................................... 61
Removing a Command from EXEC Mode...............................................................................................................61
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................ 61
Allowing Access to CONFIGURATION Mode Commands.................................................................................... 61
Allowing Access to Different Modes........................................................................................................................61
Applying a Privilege Level to a Username...............................................................................................................63
Applying a Privilege Level to a Terminal Line......................................................................................................... 63
Configuring Logging........................................................................................................................................................ 63
Audit and Security Logs............................................................................................................................................64
Configuring Logging Format .................................................................................................................................. 66
Display the Logging Buffer and the Logging Configuration................................................................................. 66
Setting Up a Secure Connection to a Syslog Server............................................................................................ 67
Sending System Messages to a Syslog Server......................................................................................................68
Track Login Activity.........................................................................................................................................................68
Restrictions for Tracking Login Activity..................................................................................................................68
Configuring Login Activity Tracking........................................................................................................................ 68
Display Login Statistics............................................................................................................................................. 69
Limit Concurrent Login Sessions................................................................................................................................... 70
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 70
Configuring Concurrent Session Limit..................................................................................................................... 71
Enabling the System to Clear Existing Sessions.....................................................................................................71
Enabling Secured CLI Mode........................................................................................................................................... 72
Log Messages in the Internal Buffer............................................................................................................................. 72
Configuration Task List for System Log Management......................................................................................... 72
Disabling System Logging............................................................................................................................................... 72
Sending System Messages to a Syslog Server............................................................................................................73
Configuring a UNIX System as a Syslog Server.....................................................................................................73
Changing System Logging Settings.............................................................................................................................. 73
Display the Logging Buffer and the Logging Configuration....................................................................................... 74
Configuring a UNIX Logging Facility Level................................................................................................................... 75
Synchronizing Log Messages.........................................................................................................................................76
Enabling Timestamp on Syslog Messages....................................................................................................................76
File Transfer Services...................................................................................................................................................... 77
Configuration Task List for File Transfer Services.................................................................................................77
Enabling the FTP Server........................................................................................................................................... 77
Configuring FTP Server Parameters....................................................................................................................... 77
Configuring FTP Client Parameters.........................................................................................................................78
Terminal Lines...................................................................................................................................................................78
Denying and Permitting Access to a Terminal Line............................................................................................... 79
Configuring Login Authentication for Terminal Lines............................................................................................80
4
Contents
Setting Timeout for EXEC Privilege Mode....................................................................................................................81
Using Telnet to get to Another Network Device..........................................................................................................81
Lock CONFIGURATION Mode.......................................................................................................................................82
Viewing the Configuration Lock Status.................................................................................................................. 82
Recovering from a Forgotten Password...................................................................................................................... 82
Recovering from a Forgotten Enable Password....................................................................................................83
Recovering from a Failed Start...................................................................................................................................... 84
Restoring the Factory Default Settings........................................................................................................................84
Important Points to Remember............................................................................................................................... 85
Restoring Factory Default Environment Variables................................................................................................ 85
5 802.1X......................................................................................................................................................... 87
Port-Authentication Process..........................................................................................................................................89
EAP over RADIUS......................................................................................................................................................89
Configuring 802.1X.......................................................................................................................................................... 90
Related Configuration Tasks.................................................................................................................................... 90
Important Points to Remember..................................................................................................................................... 90
Enabling 802.1X.................................................................................................................................................................91
Configuring MAC addresses for a do1x Profile............................................................................................................ 92
Configuring Request Identity Re-Transmissions..........................................................................................................93
Configuring a Quiet Period after a Failed Authentication.....................................................................................93
Forcibly Authorizing or Unauthorizing a Port...............................................................................................................94
Re-Authenticating a Port................................................................................................................................................95
Configuring Timeouts......................................................................................................................................................96
Configuring Dynamic VLAN Assignment with Port Authentication...........................................................................97
Guest and Authentication-Fail VLANs.......................................................................................................................... 98
Configuring a Guest VLAN....................................................................................................................................... 98
Configuring an Authentication-Fail VLAN...............................................................................................................98
Configuring dot1x Profile ............................................................................................................................................... 99
Configuring the Static MAB and MAB Profile ...........................................................................................................100
Configuring Critical VLAN .............................................................................................................................................101
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)................................. 102
Optimizing CAM Utilization During the Attachment of ACLs to VLANs.................................................................102
Guidelines for Configuring ACL VLAN Groups........................................................................................................... 103
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.............................................. 103
Configuring ACL VLAN Groups..............................................................................................................................103
Configuring FP Blocks for VLAN Parameters.......................................................................................................104
Viewing CAM Usage......................................................................................................................................................105
Allocating FP Blocks for VLAN Processes..................................................................................................................106
7 Access Control Lists (ACLs)...................................................................................................................... 108
IP Access Control Lists (ACLs)....................................................................................................................................109
CAM Usage................................................................................................................................................................110
Implementing ACLs on Dell Networking OS.......................................................................................................... 110
Important Points to Remember.....................................................................................................................................112
Contents
5
Configuration Task List for Route Maps................................................................................................................112
Configuring Match Routes.......................................................................................................................................114
Configuring Set Conditions......................................................................................................................................115
Configure a Route Map for Route Redistribution.................................................................................................116
Configure a Route Map for Route Tagging........................................................................................................... 117
Continue Clause.........................................................................................................................................................117
IP Fragment Handling.....................................................................................................................................................118
IP Fragments ACL Examples................................................................................................................................... 118
Layer 4 ACL Rules Examples................................................................................................................................... 118
Configure a Standard IP ACL........................................................................................................................................ 119
Configuring a Standard IP ACL Filter.....................................................................................................................120
Configure an Extended IP ACL......................................................................................................................................121
Configuring Filters with a Sequence Number........................................................................................................121
Configuring Filters Without a Sequence Number................................................................................................ 122
Configure Layer 2 and Layer 3 ACLs...........................................................................................................................123
Assign an IP ACL to an Interface..................................................................................................................................124
Applying an IP ACL.........................................................................................................................................................124
Counting ACL Hits................................................................................................................................................... 125
Configure Ingress ACLs.................................................................................................................................................125
Configure Egress ACLs..................................................................................................................................................125
Applying Egress Layer 3 ACLs (Control-Plane)................................................................................................... 126
IP Prefix Lists.................................................................................................................................................................. 127
Implementation Information.................................................................................................................................... 127
Configuration Task List for Prefix Lists................................................................................................................. 127
ACL Resequencing..........................................................................................................................................................131
Resequencing an ACL or Prefix List....................................................................................................................... 131
Route Maps.....................................................................................................................................................................133
Implementation Information.................................................................................................................................... 133
Logging of ACL Processes............................................................................................................................................133
Guidelines for Configuring ACL Logging............................................................................................................... 134
Configuring ACL Logging........................................................................................................................................ 134
Flow-Based Monitoring Support for ACLs..................................................................................................................135
Behavior of Flow-Based Monitoring...................................................................................................................... 135
Enabling Flow-Based Monitoring............................................................................................................................136
8 Bidirectional Forwarding Detection (BFD)..................................................................................................138
How BFD Works.............................................................................................................................................................138
BFD Packet Format................................................................................................................................................. 139
BFD Sessions............................................................................................................................................................ 140
BFD Three-Way Handshake.................................................................................................................................... 141
Session State Changes............................................................................................................................................143
Important Points to Remember....................................................................................................................................143
Configure BFD................................................................................................................................................................ 143
Configure BFD for Physical Ports.......................................................................................................................... 144
Configure BFD for Static Routes........................................................................................................................... 145
Configure BFD for OSPF.........................................................................................................................................148
6
Contents
Configure BFD for OSPFv3.....................................................................................................................................151
Configure BFD for IS-IS...........................................................................................................................................152
Configure BFD for BGP...........................................................................................................................................154
Configure BFD for VRRP......................................................................................................................................... 161
Configuring Protocol Liveness................................................................................................................................164
Troubleshooting BFD............................................................................................................................................... 164
Establishing Sessions for Static Routes................................................................................................................ 165
9 Border Gateway Protocol IPv4 (BGPv4)....................................................................................................168
Autonomous Systems (AS)...........................................................................................................................................168
Sessions and Peers........................................................................................................................................................ 170
Establish a Session................................................................................................................................................... 170
Route Reflectors............................................................................................................................................................. 171
BGP Attributes................................................................................................................................................................172
Best Path Selection Criteria....................................................................................................................................173
Weight........................................................................................................................................................................174
Local Preference.......................................................................................................................................................174
Multi-Exit Discriminators (MEDs).......................................................................................................................... 175
Origin..........................................................................................................................................................................176
AS Path......................................................................................................................................................................177
Next Hop....................................................................................................................................................................177
Multiprotocol BGP..........................................................................................................................................................177
Implement BGP with Dell Networking OS...................................................................................................................178
Additional Path (Add-Path) Support..................................................................................................................... 178
Advertise IGP Cost as MED for Redistributed Routes........................................................................................178
Ignore Router-ID in Best-Path Calculation............................................................................................................179
Four-Byte AS Numbers........................................................................................................................................... 179
AS4 Number Representation.................................................................................................................................. 179
AS Number Migration...............................................................................................................................................181
BGP4 Management Information Base (MIB)....................................................................................................... 182
Important Points to Remember..............................................................................................................................182
Configuration Information............................................................................................................................................. 183
BGP Configuration......................................................................................................................................................... 183
Enabling BGP............................................................................................................................................................ 184
Configuring AS4 Number Representations...........................................................................................................187
Configuring Peer Groups.........................................................................................................................................189
Configuring BGP Fast Fall-Over..............................................................................................................................191
Configuring Passive Peering................................................................................................................................... 193
Maintaining Existing AS Numbers During an AS Migration.................................................................................193
Allowing an AS Number to Appear in its Own AS Path.......................................................................................194
Enabling Graceful Restart....................................................................................................................................... 195
Enabling Neighbor Graceful Restart...................................................................................................................... 196
Enabling or disabling BGP neighbors..................................................................................................................... 196
Filtering on an AS-Path Attribute...........................................................................................................................198
Regular Expressions as Filters................................................................................................................................ 199
Redistributing Routes............................................................................................................................................. 200
Contents
7
Enabling Additional Paths........................................................................................................................................201
Configuring IP Community Lists.............................................................................................................................201
Configuring an IP Extended Community List.......................................................................................................202
Filtering Routes with Community Lists.................................................................................................................203
Manipulating the COMMUNITY Attribute............................................................................................................204
Changing MED Attributes...................................................................................................................................... 205
Changing the LOCAL_PREFERENCE Attribute................................................................................................. 206
Configuring the local System or a Different System to be the Next Hop for BGP-Learned Routes...........206
Changing the WEIGHT Attribute...........................................................................................................................207
Enabling Multipath...................................................................................................................................................207
Filtering BGP Routes...............................................................................................................................................208
Filtering BGP Routes Using Route Maps............................................................................................................. 209
Filtering BGP Routes Using AS-PATH Information............................................................................................. 210
Configuring BGP Route Reflectors........................................................................................................................210
Aggregating Routes.................................................................................................................................................. 211
Configuring BGP Confederations............................................................................................................................211
Enabling Route Flap Dampening.............................................................................................................................212
Changing BGP Timers..............................................................................................................................................214
Enabling BGP Neighbor Soft-Reconfiguration.....................................................................................................215
Enabling or disabling BGP neighbors..................................................................................................................... 216
Route Map Continue................................................................................................................................................217
Enabling MBGP Configurations.................................................................................................................................... 217
BGP Regular Expression Optimization.........................................................................................................................218
Debugging BGP.............................................................................................................................................................. 218
Storing Last and Bad PDUs.................................................................................................................................... 219
Capturing PDUs.......................................................................................................................................................220
PDU Counters...........................................................................................................................................................221
Sample Configurations...................................................................................................................................................221
10 Content Addressable Memory (CAM)...................................................................................................... 228
CAM Allocation.............................................................................................................................................................. 228
Test CAM Usage........................................................................................................................................................... 230
View CAM-ACL Settings..............................................................................................................................................230
View CAM Usage...........................................................................................................................................................232
CAM Optimization......................................................................................................................................................... 232
Troubleshoot CAM Profiling.........................................................................................................................................232
QoS CAM Region Limitation.................................................................................................................................. 232
11 Control Plane Policing (CoPP)..................................................................................................................234
Configure Control Plane Policing.................................................................................................................................235
Configuring CoPP for Protocols............................................................................................................................236
Configuring CoPP for CPU Queues...................................................................................................................... 238
CoPP for OSPFv3 Packets.................................................................................................................................... 239
Configuring CoPP for OSPFv3..............................................................................................................................242
Displaying CoPP Configuration .............................................................................................................................242
8
Contents
12 Data Center Bridging (DCB).....................................................................................................................245
Ethernet Enhancements in Data Center Bridging.....................................................................................................245
Priority-Based Flow Control...................................................................................................................................246
Enhanced Transmission Selection......................................................................................................................... 247
Data Center Bridging Exchange Protocol (DCBx).............................................................................................. 248
Data Center Bridging in a Traffic Flow................................................................................................................. 249
Enabling Data Center Bridging.....................................................................................................................................249
DCB Maps and its Attributes................................................................................................................................. 250
QoS dot1p Traffic Classification and Queue Assignment..........................................................................................251
Data Center Bridging: Default Configuration.............................................................................................................252
Configuring Priority-Based Flow Control....................................................................................................................252
Configuring Lossless Queues................................................................................................................................. 253
Configuring PFC in a DCB Map................................................................................................................................... 254
PFC Configuration Notes....................................................................................................................................... 254
PFC Prerequisites and Restrictions...................................................................................................................... 255
Applying a DCB Map on a Port....................................................................................................................................255
Priority-Based Flow Control Using Dynamic Buffer Method...................................................................................256
Pause and Resume of Traffic.................................................................................................................................256
Buffer Sizes for Lossless or PFC Packets............................................................................................................256
Configuring PFC without a DCB Map.........................................................................................................................257
Configuring Lossless QueuesExample:..................................................................................................................257
Behavior of Tagged Packets........................................................................................................................................259
Configuration Example for DSCP and PFC Priorities............................................................................................... 259
Using PFC to Manage Converged Ethernet Traffic................................................................................................. 260
Configure Enhanced Transmission Selection.............................................................................................................260
ETS Prerequisites and Restrictions.......................................................................................................................260
Creating an ETS Priority Group..............................................................................................................................261
ETS Operation with DCBx......................................................................................................................................262
Configuring Bandwidth Allocation for DCBx CIN................................................................................................ 262
Configuring ETS in a DCB Map..............................................................................................................................263
Hierarchical Scheduling in ETS Output Policies...................................................................................................264
Using ETS to Manage Converged Ethernet Traffic............................................................................................265
Applying DCB Policies in a Switch Stack....................................................................................................................265
Configure a DCBx Operation....................................................................................................................................... 265
DCBx Operation.......................................................................................................................................................266
DCBx Port Roles......................................................................................................................................................266
DCB Configuration Exchange................................................................................................................................ 267
Configuration Source Election............................................................................................................................... 268
Propagation of DCB Information........................................................................................................................... 268
Auto-Detection and Manual Configuration of the DCBx Version..................................................................... 268
DCBx Example......................................................................................................................................................... 269
DCBx Prerequisites and Restrictions.................................................................................................................... 269
Configuring DCBx....................................................................................................................................................270
Verifying the DCB Configuration................................................................................................................................. 273
QoS dot1p Traffic Classification and Queue Assignment.........................................................................................282
Contents
9
Configuring the Dynamic Buffer Method................................................................................................................... 283
Sample DCB Configuration...........................................................................................................................................284
PFC and ETS Configuration Command Examples.............................................................................................. 286
13 Dynamic Host Configuration Protocol (DHCP).........................................................................................287
DHCP Packet Format and Options............................................................................................................................. 287
Assign an IP Address using DHCP...............................................................................................................................289
Implementation Information......................................................................................................................................... 290
Configure the System to be a DHCP Server.............................................................................................................290
Configuring the Server for Automatic Address Allocation..................................................................................291
Specifying a Default Gateway................................................................................................................................292
Configure a Method of Hostname Resolution..................................................................................................... 292
Using DNS for Address Resolution........................................................................................................................292
Using NetBIOS WINS for Address Resolution.....................................................................................................293
Creating Manual Binding Entries........................................................................................................................... 293
Debugging the DHCP Server.................................................................................................................................293
Using DHCP Clear Commands.............................................................................................................................. 294
Configure the System to be a Relay Agent................................................................................................................294
Configure the System to be a DHCP Client...............................................................................................................296
Configuring the DHCP Client System...................................................................................................................296
DHCP Client on a Management Interface............................................................................................................297
DHCP Client Operation with Other Features...................................................................................................... 298
Configure the System for User Port Stacking (Option 230)...................................................................................299
Configure Secure DHCP...............................................................................................................................................299
Option 82..................................................................................................................................................................299
DHCP Snooping.......................................................................................................................................................300
Configuring the DHCP secondary-subnet............................................................................................................303
Drop DHCP Packets on Snooped VLANs Only................................................................................................... 304
Dynamic ARP Inspection........................................................................................................................................ 304
Configuring Dynamic ARP Inspection...................................................................................................................305
Source Address Validation............................................................................................................................................306
Enabling IP Source Address Validation................................................................................................................. 306
DHCP MAC Source Address Validation................................................................................................................307
Enabling IP+MAC Source Address Validation...................................................................................................... 307
Viewing the Number of SAV Dropped Packets...................................................................................................308
Clearing the Number of SAV Dropped Packets.................................................................................................. 308
14 Equal Cost Multi-Path (ECMP)................................................................................................................309
Configuring the Hash Algorithm.................................................................................................................................. 309
Enabling Deterministic ECMP Next Hop....................................................................................................................309
Configuring the Hash Algorithm Seed........................................................................................................................ 309
Link Bundle Monitoring..................................................................................................................................................310
Managing ECMP Group Paths............................................................................................................................... 310
Creating an ECMP Group Bundle........................................................................................................................... 311
Modifying the ECMP Group Threshold..................................................................................................................311
10
Contents
15 FIP Snooping............................................................................................................................................ 313
Fibre Channel over Ethernet.........................................................................................................................................313
Ensure Robustness in a Converged Ethernet Network............................................................................................ 313
FIP Snooping on Ethernet Bridges...............................................................................................................................315
FIP Snooping in a Switch Stack....................................................................................................................................317
Using FIP Snooping........................................................................................................................................................ 317
FIP Snooping Prerequisites..................................................................................................................................... 317
Important Points to Remember..............................................................................................................................317
Enabling the FCoE Transit Feature........................................................................................................................318
Enable FIP Snooping on VLANs..............................................................................................................................319
Configure the FC-MAP Value.................................................................................................................................319
Configure a Port for a Bridge-to-Bridge Link....................................................................................................... 319
Configure a Port for a Bridge-to-FCF Link...........................................................................................................319
Impact on Other Software Features......................................................................................................................319
FIP Snooping Restrictions...................................................................................................................................... 320
Configuring FIP Snooping.......................................................................................................................................320
Displaying FIP Snooping Information........................................................................................................................... 321
FCoE Transit Configuration Example..........................................................................................................................326
16 FIPS Cryptography...................................................................................................................................328
Configuration Tasks.......................................................................................................................................................328
Preparing the System................................................................................................................................................... 328
Enabling FIPS Mode...................................................................................................................................................... 329
Generating Host-Keys.................................................................................................................................................. 329
Monitoring FIPS Mode Status..................................................................................................................................... 329
Disabling FIPS Mode..................................................................................................................................................... 330
17 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 331
Protocol Overview......................................................................................................................................................... 331
Ring Status...............................................................................................................................................................332
Multiple FRRP Rings................................................................................................................................................332
Important FRRP Points...........................................................................................................................................333
Important FRRP Concepts.....................................................................................................................................334
Implementing FRRP.......................................................................................................................................................335
FRRP Configuration...................................................................................................................................................... 335
Creating the FRRP Group...................................................................................................................................... 335
Configuring the Control VLAN...............................................................................................................................336
Configuring and Adding the Member VLANs.......................................................................................................337
Setting the FRRP Timers........................................................................................................................................338
Clearing the FRRP Counters..................................................................................................................................338
Viewing the FRRP Configuration...........................................................................................................................338
Viewing the FRRP Information.............................................................................................................................. 338
Troubleshooting FRRP..................................................................................................................................................339
Configuration Checks..............................................................................................................................................339
Sample Configuration and Topology........................................................................................................................... 339
Contents
11
FRRP Support on VLT.................................................................................................................................................. 340
Example Scenario..................................................................................................................................................... 341
Important Points to Remember............................................................................................................................. 342
18 GARP VLAN Registration Protocol (GVRP)............................................................................................. 343
Important Points to Remember................................................................................................................................... 343
Configure GVRP............................................................................................................................................................ 344
Related Configuration Tasks.................................................................................................................................. 344
Enabling GVRP Globally................................................................................................................................................ 345
Enabling GVRP on a Layer 2 Interface....................................................................................................................... 345
Configure GVRP Registration......................................................................................................................................345
Configure a GARP Timer.............................................................................................................................................. 346
RPM Redundancy..........................................................................................................................................................346
19 High Availability (HA)............................................................................................................................... 348
Component Redundancy..............................................................................................................................................348
Automatic and Manual Stack Unit Failover..........................................................................................................348
Synchronization between Management and Standby Units..............................................................................349
Forcing a Stack Unit Failover.................................................................................................................................349
Specifying an Auto-Failover Limit..........................................................................................................................350
Disabling Auto-Reboot............................................................................................................................................350
Manually Synchronizing Management and Standby Units.................................................................................350
Pre-Configuring a Stack Unit Slot...............................................................................................................................350
Removing a Provisioned Logical Stack Unit............................................................................................................... 351
Hitless Behavior..............................................................................................................................................................351
Graceful Restart.............................................................................................................................................................351
Software Resiliency.......................................................................................................................................................352
Software Component Health Monitoring.............................................................................................................352
System Health Monitoring......................................................................................................................................352
Failure and Event Logging......................................................................................................................................352
Hot-Lock Behavior........................................................................................................................................................ 353
20 Internet Group Management Protocol (IGMP)........................................................................................ 354
IGMP Implementation Information.............................................................................................................................. 354
IGMP Protocol Overview............................................................................................................................................. 354
IGMP Version 2........................................................................................................................................................354
IGMP Version 3........................................................................................................................................................356
Configure IGMP.............................................................................................................................................................359
Related Configuration Tasks..................................................................................................................................359
Viewing IGMP Enabled Interfaces...............................................................................................................................360
Selecting an IGMP Version...........................................................................................................................................360
Viewing IGMP Groups...................................................................................................................................................360
Adjusting Timers.............................................................................................................................................................361
Adjusting Query and Response Timers..................................................................................................................361
Preventing a Host from Joining a Group....................................................................................................................362
Enabling IGMP Immediate-Leave................................................................................................................................365
12
Contents
IGMP Snooping..............................................................................................................................................................365
IGMP Snooping Implementation Information.......................................................................................................365
Configuring IGMP Snooping.................................................................................................................................. 365
Removing a Group-Port Association.....................................................................................................................366
Disabling Multicast Flooding...................................................................................................................................366
Specifying a Port as Connected to a Multicast Router...................................................................................... 367
Configuring the Switch as Querier........................................................................................................................ 367
Fast Convergence after MSTP Topology Changes..................................................................................................368
Egress Interface Selection (EIS) for HTTP and IGMP Applications....................................................................... 368
Protocol Separation.................................................................................................................................................368
Enabling and Disabling Management Egress Interface Selection......................................................................369
Handling of Management Route Configuration...................................................................................................370
Handling of Switch-Initiated Traffic.......................................................................................................................371
Handling of Switch-Destined Traffic......................................................................................................................371
Handling of Transit Traffic (Traffic Separation).................................................................................................. 372
Mapping of Management Applications and Traffic Type....................................................................................372
Behavior of Various Applications for Switch-Initiated Traffic ...........................................................................373
Behavior of Various Applications for Switch-Destined Traffic ......................................................................... 374
Interworking of EIS With Various Applications.....................................................................................................375
Designating a Multicast Router Interface...................................................................................................................376
21 Interfaces................................................................................................................................................. 377
Basic Interface Configuration.......................................................................................................................................377
Advanced Interface Configuration...............................................................................................................................377
Interface Types.............................................................................................................................................................. 378
View Basic Interface Information.................................................................................................................................378
Resetting an Interface to its Factory Default State..................................................................................................380
Enabling a Physical Interface....................................................................................................................................... 380
Physical Interfaces......................................................................................................................................................... 381
Configuration Task List for Physical Interfaces....................................................................................................381
Overview of Layer Modes.......................................................................................................................................381
Configuring Layer 2 (Data Link) Mode................................................................................................................. 382
Configuring Layer 2 (Interface) Mode..................................................................................................................382
Configuring Layer 3 (Network) Mode.................................................................................................................. 382
Configuring Layer 3 (Interface) Mode..................................................................................................................383
Egress Interface Selection (EIS)................................................................................................................................. 384
Important Points to Remember............................................................................................................................. 384
Configuring EIS........................................................................................................................................................ 384
Management Interfaces............................................................................................................................................... 385
Configuring Management Interfaces.................................................................................................................... 385
Configuring a Management Interface on an Ethernet Port...............................................................................386
VLAN Interfaces.............................................................................................................................................................387
Loopback Interfaces......................................................................................................................................................388
Null Interfaces................................................................................................................................................................388
Port Channel Interfaces................................................................................................................................................388
Port Channel Definition and Standards................................................................................................................ 389
Contents
13
Port Channel Benefits.............................................................................................................................................389
Port Channel Implementation................................................................................................................................ 389
Interfaces in Port Channels....................................................................................................................................390
Configuration Tasks for Port Channel Interfaces................................................................................................390
Creating a Port Channel......................................................................................................................................... 390
Adding a Physical Interface to a Port Channel.....................................................................................................391
Reassigning an Interface to a New Port Channel............................................................................................... 392
Configuring the Minimum Oper Up Links in a Port Channel.............................................................................. 393
Adding or Removing a Port Channel from a VLAN.............................................................................................393
Assigning an IP Address to a Port Channel..........................................................................................................394
Deleting or Disabling a Port Channel.....................................................................................................................395
Load Balancing Through Port Channels............................................................................................................... 395
Changing the Hash Algorithm................................................................................................................................395
Bulk Configuration.........................................................................................................................................................396
Interface Range....................................................................................................................................................... 396
Bulk Configuration Examples..................................................................................................................................397
Defining Interface Range Macros................................................................................................................................398
Define the Interface Range.................................................................................................................................... 398
Choosing an Interface-Range Macro....................................................................................................................399
Monitoring and Maintaining Interfaces.......................................................................................................................399
Maintenance Using TDR.........................................................................................................................................400
Splitting QSFP Ports to SFP+ Ports...........................................................................................................................400
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port.................................................................................. 401
Important Points to Remember.............................................................................................................................402
Example Scenarios.................................................................................................................................................. 402
Configuring wavelength for 10–Gigabit SFP+ optics............................................................................................... 405
Link Dampening............................................................................................................................................................. 406
Important Points to Remember.............................................................................................................................406
Enabling Link Dampening........................................................................................................................................406
Link Bundle Monitoring................................................................................................................................................. 408
Using Ethernet Pause Frames for Flow Control........................................................................................................408
Enabling Pause Frames...........................................................................................................................................409
Configure the MTU Size on an Interface................................................................................................................... 409
Port-Pipes....................................................................................................................................................................... 410
Auto-Negotiation on Ethernet Interfaces................................................................................................................... 410
Setting the Speed of Ethernet Interfaces............................................................................................................. 411
Set Auto-Negotiation Options................................................................................................................................412
View Advanced Interface Information......................................................................................................................... 413
Configuring the Interface Sampling Size...............................................................................................................413
Configuring the Traffic Sampling Size Globally.................................................................................................... 414
Dynamic Counters..........................................................................................................................................................416
Clearing Interface Counters....................................................................................................................................416
22 Internet Protocol Security (IPSec)...........................................................................................................418
Configuring IPSec ..........................................................................................................................................................418
14
Contents
23 IPv4 Routing............................................................................................................................................420
IP Addresses................................................................................................................................................................... 421
Implementation Information.................................................................................................................................... 421
Configuration Tasks for IP Addresses......................................................................................................................... 421
Assigning IP Addresses to an Interface....................................................................................................................... 421
Configuring Static Routes............................................................................................................................................ 422
Configure Static Routes for the Management Interface......................................................................................... 423
IPv4 Path MTU Discovery Overview.......................................................................................................................... 424
Using the Configured Source IP Address in ICMP Messages................................................................................. 424
Configuring the ICMP Source Interface...............................................................................................................424
Configuring the Duration to Establish a TCP Connection........................................................................................425
Enabling Directed Broadcast........................................................................................................................................425
Resolution of Host Names............................................................................................................................................425
Enabling Dynamic Resolution of Host Names............................................................................................................426
Specifying the Local System Domain and a List of Domains...................................................................................426
Configuring DNS with Traceroute...............................................................................................................................427
ARP..................................................................................................................................................................................427
Configuration Tasks for ARP........................................................................................................................................428
Configuring Static ARP Entries....................................................................................................................................428
Enabling Proxy ARP.......................................................................................................................................................428
Clearing ARP Cache......................................................................................................................................................429
ARP Learning via Gratuitous ARP............................................................................................................................... 429
Enabling ARP Learning via Gratuitous ARP............................................................................................................... 429
ARP Learning via ARP Request...................................................................................................................................429
Configuring ARP Retries...............................................................................................................................................430
ICMP................................................................................................................................................................................ 431
Configuration Tasks for ICMP...................................................................................................................................... 431
Enabling ICMP Unreachable Messages.......................................................................................................................431
UDP Helper..................................................................................................................................................................... 431
Configure UDP Helper............................................................................................................................................. 431
Important Points to Remember............................................................................................................................. 432
Enabling UDP Helper.....................................................................................................................................................432
Configurations Using UDP Helper............................................................................................................................... 432
UDP Helper with Broadcast-All Addresses................................................................................................................ 432
UDP Helper with Subnet Broadcast Addresses........................................................................................................ 433
UDP Helper with Configured Broadcast Addresses..................................................................................................434
UDP Helper with No Configured Broadcast Addresses........................................................................................... 434
Troubleshooting UDP Helper....................................................................................................................................... 434
24 IPv6 Routing............................................................................................................................................436
Protocol Overview.........................................................................................................................................................436
Extended Address Space........................................................................................................................................437
Stateless Autoconfiguration................................................................................................................................... 437
IPv6 Headers............................................................................................................................................................437
IPv6 Header Fields...................................................................................................................................................438
Contents
15
Extension Header Fields......................................................................................................................................... 440
Addressing.................................................................................................................................................................441
Implementing IPv6 with Dell Networking OS.............................................................................................................442
ICMPv6...........................................................................................................................................................................443
Path MTU Discovery.....................................................................................................................................................444
IPv6 Neighbor Discovery.............................................................................................................................................. 444
IPv6 Neighbor Discovery of MTU Packets.......................................................................................................... 445
Configuration Task List for IPv6 RDNSS................................................................................................................... 445
Configuring the IPv6 Recursive DNS Server.......................................................................................................445
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................446
Displaying IPv6 RDNSS Information......................................................................................................................447
Secure Shell (SSH) Over an IPv6 Transport..............................................................................................................447
Configuration Tasks for IPv6....................................................................................................................................... 448
Adjusting Your CAM-Profile................................................................................................................................... 448
Assigning an IPv6 Address to an Interface...........................................................................................................449
Assigning a Static IPv6 Route................................................................................................................................449
Configuring Telnet with IPv6................................................................................................................................. 450
SNMP over IPv6......................................................................................................................................................450
Displaying IPv6 Information....................................................................................................................................450
Displaying an IPv6 Interface Information...............................................................................................................451
Showing IPv6 Routes.............................................................................................................................................. 451
Showing the Running-Configuration for an Interface........................................................................................ 453
Clearing IPv6 Routes...............................................................................................................................................453
Configuring IPv6 RA Guard..........................................................................................................................................453
Configuring IPv6 RA Guard on an Interface........................................................................................................ 455
Monitoring IPv6 RA Guard..................................................................................................................................... 456
25 iSCSI Optimization.................................................................................................................................. 457
iSCSI Optimization Overview.......................................................................................................................................457
Monitoring iSCSI Traffic Flows..............................................................................................................................459
Application of Quality of Service to iSCSI Traffic Flows.................................................................................... 459
Information Monitored in iSCSI Traffic Flows......................................................................................................459
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................... 460
Configuring Detection and Ports for Dell Compellent Arrays............................................................................ 460
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer............................................................... 461
Enable and Disable iSCSI Optimization..................................................................................................................461
Default iSCSI Optimization Values.............................................................................................................................. 462
iSCSI Optimization Prerequisites.................................................................................................................................462
Configuring iSCSI Optimization................................................................................................................................... 462
Displaying iSCSI Optimization Information................................................................................................................. 464
26 Intermediate System to Intermediate System..........................................................................................466
IS-IS Protocol Overview............................................................................................................................................... 466
IS-IS Addressing............................................................................................................................................................ 466
Multi-Topology IS-IS......................................................................................................................................................467
Transition Mode....................................................................................................................................................... 467
16
Contents
Interface Support.................................................................................................................................................... 468
Adjacencies...............................................................................................................................................................468
Graceful Restart............................................................................................................................................................ 468
Timers....................................................................................................................................................................... 468
Implementation Information......................................................................................................................................... 468
Configuration Information............................................................................................................................................ 469
Configuration Tasks for IS-IS.................................................................................................................................470
Configuring the Distance of a Route.....................................................................................................................477
Changing the IS-Type............................................................................................................................................. 478
Redistributing IPv4 Routes.....................................................................................................................................480
Redistributing IPv6 Routes..................................................................................................................................... 481
Configuring Authentication Passwords................................................................................................................ 482
Setting the Overload Bit.........................................................................................................................................482
Debugging IS-IS....................................................................................................................................................... 483
IS-IS Metric Styles.........................................................................................................................................................484
Configure Metric Values............................................................................................................................................... 484
Maximum Values in the Routing Table..................................................................................................................485
Change the IS-IS Metric Style in One Level Only............................................................................................... 485
Leaks from One Level to Another......................................................................................................................... 486
Sample Configurations.................................................................................................................................................. 487
27 Link Aggregation Control Protocol (LACP)..............................................................................................490
Introduction to Dynamic LAGs and LACP..................................................................................................................490
Important Points to Remember.............................................................................................................................490
LACP Modes.............................................................................................................................................................491
Configuring LACP Commands................................................................................................................................491
LACP Configuration Tasks........................................................................................................................................... 492
Creating a LAG.........................................................................................................................................................492
Configuring the LAG Interfaces as Dynamic........................................................................................................492
Setting the LACP Long Timeout........................................................................................................................... 493
Monitoring and Debugging LACP..........................................................................................................................493
Shared LAG State Tracking......................................................................................................................................... 494
Configuring Shared LAG State Tracking.............................................................................................................. 494
Important Points about Shared LAG State Tracking..........................................................................................496
LACP Basic Configuration Example............................................................................................................................ 496
Configure a LAG on ALPHA...................................................................................................................................496
28 Layer 2.................................................................................................................................................... 505
Manage the MAC Address Table................................................................................................................................ 505
Clearing the MAC Address Table.......................................................................................................................... 505
Setting the Aging Time for Dynamic Entries....................................................................................................... 505
Configuring a Static MAC Address....................................................................................................................... 506
Displaying the MAC Address Table.......................................................................................................................506
MAC Learning Limit...................................................................................................................................................... 506
Setting the MAC Learning Limit............................................................................................................................ 507
mac learning-limit Dynamic.....................................................................................................................................507
Contents
17
mac learning-limit mac-address-sticky................................................................................................................. 507
mac learning-limit station-move............................................................................................................................ 508
mac learning-limit no-station-move...................................................................................................................... 508
Learning Limit Violation Actions............................................................................................................................ 508
Setting Station Move Violation Actions................................................................................................................509
Recovering from Learning Limit and Station Move Violations.......................................................................... 509
Disabling MAC Address Learning on the System.................................................................................................510
NIC Teaming................................................................................................................................................................... 510
Configure Redundant Pairs............................................................................................................................................511
Important Points about Configuring Redundant Pairs........................................................................................ 513
Far-End Failure Detection............................................................................................................................................. 514
FEFD State Changes............................................................................................................................................... 515
Configuring FEFD.....................................................................................................................................................516
Enabling FEFD on an Interface...............................................................................................................................516
Debugging FEFD.......................................................................................................................................................517
29 Link Layer Discovery Protocol (LLDP)..................................................................................................... 519
802.1AB (LLDP) Overview............................................................................................................................................519
Protocol Data Units..................................................................................................................................................519
Optional TLVs................................................................................................................................................................ 520
Management TLVs..................................................................................................................................................520
TIA-1057 (LLDP-MED) Overview............................................................................................................................... 522
TIA Organizationally Specific TLVs........................................................................................................................522
Configure LLDP............................................................................................................................................................. 526
Related Configuration Tasks..................................................................................................................................526
Important Points to Remember.............................................................................................................................526
LLDP Compatibility..................................................................................................................................................527
CONFIGURATION versus INTERFACE Configurations............................................................................................527
Enabling LLDP................................................................................................................................................................527
Disabling and Undoing LLDP..................................................................................................................................528
Enabling LLDP on Management Ports........................................................................................................................528
Disabling and Undoing LLDP on Management Ports..........................................................................................528
Advertising TLVs........................................................................................................................................................... 528
Viewing the LLDP Configuration.................................................................................................................................530
Viewing Information Advertised by Adjacent LLDP Agents.....................................................................................530
Configuring LLDPDU Intervals......................................................................................................................................531
Configuring Transmit and Receive Mode...................................................................................................................532
Configuring the Time to Live Value.............................................................................................................................532
Debugging LLDP............................................................................................................................................................533
Relevant Management Objects................................................................................................................................... 534
30 Microsoft Network Load Balancing..........................................................................................................539
NLB Unicast Mode Scenario........................................................................................................................................539
NLB Multicast Mode Scenario.....................................................................................................................................539
Limitations of the NLB Feature................................................................................................................................... 540
Microsoft Clustering..................................................................................................................................................... 540
18
Contents
Enable and Disable VLAN Flooding ............................................................................................................................ 540
Configuring a Switch for NLB .....................................................................................................................................540
Enabling a Switch for Multicast NLB.....................................................................................................................541
31 Multicast Source Discovery Protocol (MSDP)......................................................................................... 542
Protocol Overview.........................................................................................................................................................542
Anycast RP.....................................................................................................................................................................543
Implementation Information......................................................................................................................................... 544
Configure Multicast Source Discovery Protocol....................................................................................................... 544
Related Configuration Tasks..................................................................................................................................544
Enable MSDP................................................................................................................................................................. 548
Manage the Source-Active Cache..............................................................................................................................549
Viewing the Source-Active Cache........................................................................................................................ 549
Limiting the Source-Active Cache........................................................................................................................ 549
Clearing the Source-Active Cache........................................................................................................................550
Enabling the Rejected Source-Active Cache.......................................................................................................550
Accept Source-Active Messages that Fail the RFP Check.....................................................................................550
Specifying Source-Active Messages.......................................................................................................................... 553
Limiting the Source-Active Messages from a Peer.................................................................................................. 554
Preventing MSDP from Caching a Local Source...................................................................................................... 554
Preventing MSDP from Caching a Remote Source................................................................................................. 555
Preventing MSDP from Advertising a Local Source.................................................................................................555
Logging Changes in Peership States..........................................................................................................................556
Terminating a Peership.................................................................................................................................................556
Clearing Peer Statistics.................................................................................................................................................557
Debugging MSDP.......................................................................................................................................................... 557
MSDP with Anycast RP................................................................................................................................................558
Configuring Anycast RP............................................................................................................................................... 559
Reducing Source-Active Message Flooding........................................................................................................560
Specifying the RP Address Used in SA Messages..............................................................................................560
MSDP Sample Configurations..................................................................................................................................... 562
32 Multiple Spanning Tree Protocol (MSTP)................................................................................................565
Protocol Overview........................................................................................................................................................ 565
Spanning Tree Variations..............................................................................................................................................566
Implementation Information................................................................................................................................... 566
Configure Multiple Spanning Tree Protocol...............................................................................................................566
Related Configuration Tasks.................................................................................................................................. 567
Enable Multiple Spanning Tree Globally......................................................................................................................567
Adding and Removing Interfaces.................................................................................................................................567
Creating Multiple Spanning Tree Instances............................................................................................................... 568
Influencing MSTP Root Selection............................................................................................................................... 569
Interoperate with Non-Dell Bridges............................................................................................................................ 569
Changing the Region Name or Revision.....................................................................................................................570
Modifying Global Parameters.......................................................................................................................................570
Modifying the Interface Parameters............................................................................................................................571
Contents
19
Configuring an EdgePort.............................................................................................................................................. 572
Flush MAC Addresses after a Topology Change.......................................................................................................573
MSTP Sample Configurations......................................................................................................................................573
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration.......................................................................................574
Debugging and Verifying MSTP Configurations........................................................................................................ 577
33 Multicast Features...................................................................................................................................579
Enabling IP Multicast.....................................................................................................................................................579
Implementation Information......................................................................................................................................... 579
Multicast Policies...........................................................................................................................................................580
IPv4 Multicast Policies............................................................................................................................................580
Understanding Multicast Traceroute (mtrace)......................................................................................................... 587
Important Points to Remember.............................................................................................................................588
Printing Multicast Traceroute (mtrace) Paths..........................................................................................................588
Supported Error Codes.................................................................................................................................................589
mtrace Scenarios...........................................................................................................................................................590
34 Object Tracking.......................................................................................................................................596
Object Tracking Overview............................................................................................................................................596
Track Layer 2 Interfaces.........................................................................................................................................597
Track Layer 3 Interfaces.........................................................................................................................................597
Track IPv4 and IPv6 Routes.................................................................................................................................. 598
Set Tracking Delays.................................................................................................................................................599
VRRP Object Tracking............................................................................................................................................599
Object Tracking Configuration.....................................................................................................................................599
Tracking a Layer 2 Interface.................................................................................................................................. 599
Tracking a Layer 3 Interface.................................................................................................................................. 600
Track an IPv4/IPv6 Route..................................................................................................................................... 602
Displaying Tracked Objects..........................................................................................................................................605
35 Open Shortest Path First (OSPFv2 and OSPFv3)................................................................................... 607
Protocol Overview.........................................................................................................................................................607
Autonomous System (AS) Areas...........................................................................................................................607
Area Types............................................................................................................................................................... 608
Networks and Neighbors........................................................................................................................................609
Router Types............................................................................................................................................................609
Designated and Backup Designated Routers........................................................................................................ 611
Link-State Advertisements (LSAs).........................................................................................................................611
Router Priority and Cost..........................................................................................................................................612
OSPF with Dell Networking OS....................................................................................................................................613
Graceful Restart....................................................................................................................................................... 614
Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................615
Multi-Process OSPFv2 with VRF.......................................................................................................................... 615
OSPF ACK Packing..................................................................................................................................................615
Setting OSPF Adjacency with Cisco Routers.......................................................................................................615
20
Contents
/