PowerSwitch S4048-ON

Dell PowerSwitch S4048-ON, OS9 User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4048-ON User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S4048–ON
System
9.14.2.8
September 2020
Rev. A00
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
Chapter 1: About this Guide.........................................................................................................33
Audience.............................................................................................................................................................................. 33
Conventions........................................................................................................................................................................33
Related Documents...........................................................................................................................................................33
Chapter 2: Configuration Fundamentals...................................................................................... 34
Accessing the Command Line........................................................................................................................................ 34
CLI Modes........................................................................................................................................................................... 34
Navigating CLI Modes................................................................................................................................................ 36
The do Command.............................................................................................................................................................. 39
Undoing Commands..........................................................................................................................................................39
Obtaining Help....................................................................................................................................................................40
Entering and Editing Commands................................................................................................................................... 40
Command History...............................................................................................................................................................41
Filtering show Command Outputs................................................................................................................................. 41
Multiple Users in Configuration Mode..........................................................................................................................42
Chapter 3: Getting Started..........................................................................................................43
Console Access..................................................................................................................................................................43
Serial Console............................................................................................................................................................... 43
Accessing the CLI Interface and Running Scripts Using SSH................................................................................44
Default Configuration....................................................................................................................................................... 45
Configuring a Host Name................................................................................................................................................ 45
Accessing the System Remotely................................................................................................................................... 45
Configure the Management Port IP Address....................................................................................................... 46
Configure a Management Route..............................................................................................................................46
Configuring a Username and Password................................................................................................................. 46
Configuring the Enable Password................................................................................................................................. 47
Configuration File Management.....................................................................................................................................48
Copy Files to and from the System.........................................................................................................................48
Mounting an NFS File System.................................................................................................................................. 48
Save the Running-Configuration............................................................................................................................. 50
Configure the Overload Bit for a Startup Scenario............................................................................................ 50
Viewing Files.................................................................................................................................................................50
Compressing Configuration Files..............................................................................................................................51
Managing the File System...............................................................................................................................................53
Enabling Software Features on Devices Using a Command Option..................................................................... 54
View Command History................................................................................................................................................... 54
Upgrading Dell EMC Networking OS............................................................................................................................56
Verify Software Images Before Installation................................................................................................................ 56
Using HTTP for File Transfers........................................................................................................................................57
Chapter 4: Management.............................................................................................................. 58
Configuring Privilege Levels........................................................................................................................................... 58
Contents
Contents 3
Removing a Command from EXEC Mode..............................................................................................................59
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 59
Allowing Access to CONFIGURATION Mode Commands................................................................................. 59
Allowing Access to Different Modes...................................................................................................................... 59
Applying a Privilege Level to a Username.............................................................................................................. 61
Applying a Privilege Level to a Terminal Line........................................................................................................ 61
Configuring Logging.......................................................................................................................................................... 61
Audit and Security Logs..............................................................................................................................................61
Configuring Logging Format .............................................................................................................................63
Display the Logging Buffer and the Logging Configuration..............................................................................63
Setting Up a Secure Connection to a Syslog Server.................................................................................64
Sending System Messages to a Syslog Server.................................................................................................... 65
Track Login Activity..........................................................................................................................................................65
Restrictions for Tracking Login Activity................................................................................................................ 65
Configuring Login Activity Tracking........................................................................................................................66
Display Login Statistics.............................................................................................................................................. 66
Limit Concurrent Login Sessions................................................................................................................................... 67
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 68
Configuring Concurrent Session Limit....................................................................................................................68
Enabling the System to Clear Existing Sessions..................................................................................................68
Enabling Secured CLI Mode............................................................................................................................................69
Log Messages in the Internal Buffer............................................................................................................................ 69
Disabling System Logging............................................................................................................................................... 69
Sending System Messages to a Syslog Server.......................................................................................................... 70
Configuring a UNIX System as a Syslog Server...................................................................................................70
Changing System Logging Settings..............................................................................................................................70
Display the Logging Buffer and the Logging Configuration.....................................................................................71
Configuring a UNIX Logging Facility Level.................................................................................................................. 72
Synchronizing Log Messages......................................................................................................................................... 72
Enabling Timestamp on Syslog Messages................................................................................................................... 73
File Transfer Services.......................................................................................................................................................76
Enabling the FTP Server............................................................................................................................................76
Configuring FTP Server Parameters.......................................................................................................................76
Configuring FTP Client Parameters.........................................................................................................................77
Terminal Lines.....................................................................................................................................................................77
Denying and Permitting Access to a Terminal Line............................................................................................. 77
Configuring Login Authentication for Terminal Lines..........................................................................................78
Setting Timeout for EXEC Privilege Mode..................................................................................................................79
Using Telnet to get to Another Network Device.......................................................................................................80
Lock CONFIGURATION Mode....................................................................................................................................... 80
Reloading the system........................................................................................................................................................81
Restoring the Factory Default Settings.......................................................................................................................82
Restoring Factory Default Environment Variables.............................................................................................. 82
Viewing the Reason for Last System Reboot.............................................................................................................83
Chapter 5: 802.1X....................................................................................................................... 85
Port-Authentication Process..........................................................................................................................................86
EAP over RADIUS........................................................................................................................................................87
Configuring 802.1X............................................................................................................................................................88
Important Points to Remember..................................................................................................................................... 88
4
Contents
Enabling 802.1X..................................................................................................................................................................89
Configuring dot1x Profile ................................................................................................................................................90
Configuring MAC addresses for a do1x Profile.......................................................................................................... 90
Configuring the Static MAB and MAB Profile ........................................................................................................... 91
Configuring Critical VLAN .............................................................................................................................................. 92
Configuring Request Identity Re-Transmissions........................................................................................................92
Configuring a Quiet Period after a Failed Authentication..................................................................................93
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 94
Re-Authenticating a Port................................................................................................................................................ 94
Configuring Timeouts....................................................................................................................................................... 95
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 96
Guest and Authentication-Fail VLANs..........................................................................................................................97
Configuring a Guest VLAN........................................................................................................................................ 98
Configuring an Authentication-Fail VLAN............................................................................................................. 98
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)...100
Optimizing CAM Utilization During the Attachment of ACLs to VLANs............................................................100
Guidelines for Configuring ACL VLAN Groups.......................................................................................................... 101
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters......................................... 101
Configuring ACL VLAN Groups............................................................................................................................... 101
Configuring FP Blocks for VLAN Parameters..................................................................................................... 102
Viewing CAM Usage........................................................................................................................................................103
Allocating FP Blocks for VLAN Processes.................................................................................................................104
Unified Forwarding Table (UFT) Modes.................................................................................................................... 104
Configuring UFT Modes........................................................................................................................................... 105
Chapter 7: Access Control Lists (ACLs)..................................................................................... 106
IP Access Control Lists (ACLs)....................................................................................................................................107
CAM Usage..................................................................................................................................................................107
Implementing ACLs on Dell EMC Networking OS..............................................................................................108
Important Points to Remember....................................................................................................................................109
Configuration Task List for Route Maps...............................................................................................................110
Configuring Match Routes....................................................................................................................................... 112
Configuring Set Conditions...................................................................................................................................... 113
Configure a Route Map for Route Redistribution............................................................................................... 113
Configure a Route Map for Route Tagging.......................................................................................................... 114
Continue Clause.......................................................................................................................................................... 114
IP Fragment Handling......................................................................................................................................................115
IP Fragments ACL Examples....................................................................................................................................115
Layer 4 ACL Rules Examples................................................................................................................................... 115
Configure a Standard IP ACL........................................................................................................................................ 116
Configuring a Standard IP ACL Filter.....................................................................................................................117
Configure an Extended IP ACL..................................................................................................................................... 118
Configuring Filters with a Sequence Number...................................................................................................... 118
Configuring Filters Without a Sequence Number............................................................................................... 119
Configure Layer 2 and Layer 3 ACLs...........................................................................................................................119
Assign an IP ACL to an Interface.................................................................................................................................120
Applying an IP ACL..........................................................................................................................................................120
Counting ACL Hits......................................................................................................................................................121
Contents
5
Configure Ingress ACLs.................................................................................................................................................. 121
Configure Egress ACLs.................................................................................................................................................. 122
Applying Egress Layer 3 ACLs (Control-Plane)..................................................................................................122
IP Prefix Lists....................................................................................................................................................................123
Configuration Task List for Prefix Lists................................................................................................................123
ACL Remarks.................................................................................................................................................................... 126
Configuring a Remark................................................................................................................................................127
Deleting a Remark......................................................................................................................................................127
ACL Resequencing.......................................................................................................................................................... 128
Resequencing an ACL or Prefix List......................................................................................................................128
Route Maps.......................................................................................................................................................................129
Logging of ACL Processes............................................................................................................................................ 130
Guidelines for Configuring ACL Logging.............................................................................................................. 130
Configuring ACL Logging..........................................................................................................................................131
Flow-Based Monitoring................................................................................................................................................... 131
Enabling Flow-Based Monitoring............................................................................................................................133
Configuring UDF ACL..................................................................................................................................................... 134
Configuring IP Mirror Access Group........................................................................................................................... 136
Sample Configuration................................................................................................................................................137
Example of viewing IP mirror–access–group applied to an Interface...........................................................137
Chapter 8: Bidirectional Forwarding Detection (BFD)................................................................ 138
How BFD Works...............................................................................................................................................................138
BFD Packet Format...................................................................................................................................................139
BFD Sessions.............................................................................................................................................................. 140
BFD Three-Way Handshake.....................................................................................................................................141
Session State Changes.............................................................................................................................................142
Important Points to Remember....................................................................................................................................142
Configure BFD.................................................................................................................................................................. 142
Configure BFD for Physical Ports..........................................................................................................................143
Configure BFD for Static Routes........................................................................................................................... 144
Configure BFD for IPv6 Static Routes................................................................................................................. 148
Configure BFD for OSPF......................................................................................................................................... 150
Configure BFD for OSPFv3.....................................................................................................................................155
Configure BFD for IS-IS........................................................................................................................................... 158
Configure BFD for BGP............................................................................................................................................160
Configure BFD for VRRP......................................................................................................................................... 166
Configuring Protocol Liveness................................................................................................................................169
Chapter 9: Border Gateway Protocol (BGP)............................................................................... 170
BGP IP version 4 (BGPv4) Overview......................................................................................................................... 170
BGP Autonomous Systems......................................................................................................................................170
AS4 Number Representation...................................................................................................................................172
Four-Byte AS Numbers.............................................................................................................................................174
BGP router ID..............................................................................................................................................................174
Sessions and Peers....................................................................................................................................................174
Establish a Session.....................................................................................................................................................174
BGP Attributes for selecting Best Path............................................................................................................... 175
Multiprotocol BGP..................................................................................................................................................... 180
6
Contents
BGP global and address family configuration...................................................................................................... 181
Implement BGP with Dell EMC Networking OS................................................................................................. 182
Configuration Information........................................................................................................................................185
Basic BGP configuration tasks..................................................................................................................................... 186
Prerequisite for configuring a BGP network....................................................................................................... 186
Restrictions................................................................................................................................................................. 186
Enabling BGP.............................................................................................................................................................. 186
Enabling four-byte autonomous system numbers............................................................................................. 188
Changing a BGP router ID....................................................................................................................................... 189
Configuring AS4 Number Representations..........................................................................................................189
Configuring a BGP peer........................................................................................................................................... 190
Example-Configuring BGP routing between peers.............................................................................................191
BGP peer group..........................................................................................................................................................192
Advanced BGP configuration tasks.............................................................................................................................199
Route-refresh and Soft-reconfiguration..............................................................................................................199
Aggregating Routes...................................................................................................................................................201
Filtering BGP.............................................................................................................................................................. 203
Configuring BGP Fast Fall-Over............................................................................................................................208
Configuring Passive Peering................................................................................................................................... 210
Enabling Graceful Restart.........................................................................................................................................211
Redistributing Routes............................................................................................................................................... 212
Redistributing iBGP Routes into IGP.....................................................................................................................212
Enabling Additional Paths........................................................................................................................................ 215
Configuring IP Community Lists.............................................................................................................................215
Configuring an IP Extended Community List...................................................................................................... 216
Configure BGP attributes.........................................................................................................................................217
Enabling Multipath..................................................................................................................................................... 221
Route Reflectors........................................................................................................................................................ 221
Enabling Route Flap Dampening............................................................................................................................ 223
Changing BGP keepalive and hold timers........................................................................................................... 225
Setting the extended timer.....................................................................................................................................225
Enabling or disabling BGP neighbors....................................................................................................................226
Route Map Continue.................................................................................................................................................227
Configuring BGP Confederations..........................................................................................................................228
Configuring a BGP VRF address family............................................................................................................... 228
Maintaining Existing AS Numbers During an AS Migration.............................................................................229
Allowing an AS Number to Appear in its Own AS Path................................................................................... 230
Enabling MBGP Configurations.............................................................................................................................. 231
MBGP support for IPv6............................................................................................................................................231
Configuring IPv6 MBGP between peers.............................................................................................................. 231
Example-Configuring IPv4 and IPv6 neighbors..................................................................................................232
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor...................................234
BGP Regular Expression Optimization.................................................................................................................236
Debugging BGP......................................................................................................................................................... 236
Chapter 10: Content Addressable Memory (CAM)......................................................................238
CAM Allocation................................................................................................................................................................ 238
Test CAM Usage............................................................................................................................................................. 240
View CAM-ACL Settings...............................................................................................................................................240
View CAM Usage............................................................................................................................................................ 242
Contents
7
Configuring CAM Threshold and Silence Period..................................................................................................... 242
CAM Optimization...........................................................................................................................................................243
Troubleshoot CAM Profiling......................................................................................................................................... 244
QoS CAM Region Limitation...................................................................................................................................244
Chapter 11: Control Plane Policing (CoPP)................................................................................ 245
Configure Control Plane Policing................................................................................................................................ 246
Configuring CoPP for Protocols............................................................................................................................ 247
Configuring CoPP for CPU Queues......................................................................................................................248
CoPP for OSPFv3 Packets.....................................................................................................................................249
Configuring CoPP for OSPFv3.............................................................................................................................. 252
Displaying CoPP Configuration .............................................................................................................................253
Chapter 12: Data Center Bridging (DCB)................................................................................... 255
Ethernet Enhancements in Data Center Bridging...................................................................................................255
Priority-Based Flow Control................................................................................................................................... 256
Enhanced Transmission Selection.........................................................................................................................257
Data Center Bridging Exchange Protocol (DCBx)............................................................................................258
Data Center Bridging in a Traffic Flow................................................................................................................ 258
Enabling Data Center Bridging.....................................................................................................................................259
DCB Maps and its Attributes................................................................................................................................. 259
Data Center Bridging: Default Configuration...........................................................................................................260
Configuring Priority-Based Flow Control.................................................................................................................. 260
Configuring Lossless Queues.................................................................................................................................. 261
Configuring PFC in a DCB Map................................................................................................................................... 262
Applying a DCB Map on a Port....................................................................................................................................263
Configuring PFC without a DCB Map........................................................................................................................ 264
Priority-Based Flow Control Using Dynamic Buffer Method............................................................................... 265
Behavior of Tagged Packets........................................................................................................................................266
Configuration Example for DSCP and PFC Priorities.............................................................................................267
Using PFC to Manage Converged Ethernet Traffic...............................................................................................268
Configure Enhanced Transmission Selection........................................................................................................... 268
ETS Prerequisites and Restrictions...................................................................................................................... 268
Creating an ETS Priority Group.............................................................................................................................269
ETS Operation with DCBx...................................................................................................................................... 269
Configuring Bandwidth Allocation for DCBx CIN.............................................................................................. 270
Configuring ETS in a DCB Map...............................................................................................................................271
Hierarchical Scheduling in ETS Output Policies.......................................................................................................272
Using ETS to Manage Converged Ethernet Traffic................................................................................................272
Applying DCB Policies in a Switch Stack...................................................................................................................272
Configure a DCBx Operation........................................................................................................................................273
DCBx Operation.........................................................................................................................................................273
DCBx Port Roles........................................................................................................................................................273
DCB Configuration Exchange.................................................................................................................................274
Configuration Source Election............................................................................................................................... 275
Propagation of DCB Information........................................................................................................................... 275
Auto-Detection and Manual Configuration of the DCBx Version..................................................................275
DCBx Example............................................................................................................................................................276
DCBx Prerequisites and Restrictions....................................................................................................................276
8
Contents
Configuring DCBx......................................................................................................................................................277
Verifying the DCB Configuration.................................................................................................................................280
QoS dot1p Traffic Classification and Queue Assignment......................................................................................289
Configuring the Dynamic Buffer Method..................................................................................................................290
Sample DCB Configuration...........................................................................................................................................290
Chapter 13: Dynamic Host Configuration Protocol (DHCP)........................................................ 293
DHCP Packet Format and Options.............................................................................................................................293
Assign an IP Address using DHCP.............................................................................................................................. 295
Implementation Information......................................................................................................................................... 295
Configure the System to be a DHCP Server........................................................................................................... 296
Configuring the Server for Automatic Address Allocation..............................................................................296
Specifying a Default Gateway................................................................................................................................297
Configure a Method of Hostname Resolution....................................................................................................298
Using DNS for Address Resolution....................................................................................................................... 298
Using NetBIOS WINS for Address Resolution....................................................................................................298
Creating Manual Binding Entries........................................................................................................................... 298
Debugging the DHCP Server................................................................................................................................. 299
Using DHCP Clear Commands...............................................................................................................................299
Configure the System to be a Relay Agent.............................................................................................................. 299
Configure the System to be a DHCP Client..............................................................................................................301
Configuring the DHCP Client System...................................................................................................................301
DHCP Client on a Management Interface...........................................................................................................302
DHCP Client Operation with Other Features.....................................................................................................303
DHCP Relay When DHCP Server and Client are in Different VRFs................................................................... 304
Configuring Route Leaking between VRFs on DHCP Relay Agent...............................................................304
Non-default VRF configuration for DHCPv6 helper address...............................................................................305
Configuring DHCP relay source interface.................................................................................................................305
Global DHCP relay source IPv4 or IPv6 configuration ....................................................................................305
Interface level DHCP relay source IPv4 or IPv6 configuration .....................................................................306
Configure the System for User Port Stacking (Option 230)............................................................................... 307
Configure Secure DHCP................................................................................................................................................307
Option 82 (DHCPv4 relay options).......................................................................................................................307
DHCPv6 relay agent options..................................................................................................................................308
DHCP Snooping.........................................................................................................................................................308
Drop DHCP Packets on Snooped VLANs Only................................................................................................... 313
Dynamic ARP Inspection.......................................................................................................................................... 313
Configuring Dynamic ARP Inspection................................................................................................................... 313
Source Address Validation.............................................................................................................................................315
Enabling IP Source Address Validation................................................................................................................. 315
DHCP MAC Source Address Validation................................................................................................................315
Enabling IP+MAC Source Address Validation..................................................................................................... 316
Viewing the Number of SAV Dropped Packets.................................................................................................. 316
Clearing the Number of SAV Dropped Packets..................................................................................................317
Chapter 14: Equal Cost Multi-Path (ECMP)................................................................................318
ECMP for Flow-Based Affinity..................................................................................................................................... 318
Configuring the Hash Algorithm............................................................................................................................. 318
Enabling Deterministic ECMP Next Hop.............................................................................................................. 318
Contents
9
Configuring the Hash Algorithm Seed.................................................................................................................. 319
Link Bundle Monitoring...................................................................................................................................................319
Managing ECMP Group Paths............................................................................................................................... 320
Creating an ECMP Group Bundle..........................................................................................................................320
Modifying the ECMP Group Threshold................................................................................................................320
RTAG7................................................................................................................................................................................ 321
Flow-based Hashing for ECMP................................................................................................................................... 322
Chapter 15: FIP Snooping.......................................................................................................... 325
Fibre Channel over Ethernet........................................................................................................................................ 325
Ensure Robustness in a Converged Ethernet Network.........................................................................................325
FIP Snooping on Ethernet Bridges..............................................................................................................................326
FIP Snooping in a Switch Stack.................................................................................................................................. 328
Using FIP Snooping........................................................................................................................................................ 328
FIP Snooping Prerequisites.....................................................................................................................................328
Important Points to Remember............................................................................................................................. 328
Enabling the FCoE Transit Feature.......................................................................................................................329
Enable FIP Snooping on VLANs.............................................................................................................................329
Configure the FC-MAP Value................................................................................................................................ 330
Configure a Port for a Bridge-to-Bridge Link.....................................................................................................330
Configure a Port for a Bridge-to-FCF Link.........................................................................................................330
Impact on Other Software Features.................................................................................................................... 330
FIP Snooping Restrictions........................................................................................................................................331
Configuring FIP Snooping........................................................................................................................................ 331
Displaying FIP Snooping Information..........................................................................................................................332
FCoE Transit Configuration Example......................................................................................................................... 337
Chapter 16: Flex Hash and Optimized Boot-Up...........................................................................339
Flex Hash Capability Overview.................................................................................................................................... 339
Configuring the Flex Hash Mechanism......................................................................................................................339
Configuring Fast Boot and LACP Fast Switchover................................................................................................ 340
Optimizing the Boot Time............................................................................................................................................. 340
Interoperation of Applications with Fast Boot and System States..................................................................... 341
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 344
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 344
Chapter 17: FIPS Cryptography................................................................................................. 346
Configuration Tasks........................................................................................................................................................346
Preparing the System.................................................................................................................................................... 346
Enabling FIPS Mode........................................................................................................................................................347
Generating Host-Keys....................................................................................................................................................347
Monitoring FIPS Mode Status......................................................................................................................................347
Disabling FIPS Mode.......................................................................................................................................................348
Chapter 18: Force10 Resilient Ring Protocol (FRRP)..................................................................349
Protocol Overview..........................................................................................................................................................349
Ring Status................................................................................................................................................................. 350
Multiple FRRP Rings.................................................................................................................................................350
Important FRRP Points............................................................................................................................................ 351
10
Contents
Important FRRP Concepts......................................................................................................................................352
Implementing FRRP........................................................................................................................................................352
FRRP Configuration....................................................................................................................................................... 353
Creating the FRRP Group....................................................................................................................................... 353
Configuring the Control VLAN...............................................................................................................................353
Configuring and Adding the Member VLANs..................................................................................................... 354
Setting the FRRP Timers........................................................................................................................................ 355
Clearing the FRRP Counters.................................................................................................................................. 355
Viewing the FRRP Configuration.......................................................................................................................... 355
Viewing the FRRP Information.............................................................................................................................. 356
Troubleshooting FRRP...................................................................................................................................................356
Sample Configuration and Topology.......................................................................................................................... 356
FRRP Support on VLT................................................................................................................................................... 357
Chapter 19: GARP VLAN Registration Protocol (GVRP)............................................................. 360
Configure GVRP...............................................................................................................................................................361
Enabling GVRP Globally..................................................................................................................................................361
Enabling GVRP on a Layer 2 Interface...................................................................................................................... 362
Configure GVRP Registration...................................................................................................................................... 362
Configure a GARP Timer...............................................................................................................................................363
RPM Redundancy........................................................................................................................................................... 363
Chapter 20: High Availability (HA).............................................................................................364
Component Redundancy...............................................................................................................................................364
Automatic and Manual Stack Unit Failover.........................................................................................................364
Synchronization between Management and Standby Units...........................................................................365
Forcing a Stack Unit Failover.................................................................................................................................365
Disabling Auto-Reboot.............................................................................................................................................365
Pre-Configuring a Stack Unit Slot.............................................................................................................................. 366
Removing a Provisioned Logical Stack Unit............................................................................................................. 366
Hitless Behavior...............................................................................................................................................................366
Graceful Restart..............................................................................................................................................................366
Software Resiliency........................................................................................................................................................ 367
Software Component Health Monitoring............................................................................................................ 367
System Health Monitoring...................................................................................................................................... 367
Failure and Event Logging.......................................................................................................................................367
Hot-Lock Behavior..........................................................................................................................................................368
Chapter 21: Internet Group Management Protocol (IGMP)........................................................ 369
IGMP Protocol Overview.............................................................................................................................................. 369
IGMP Version 2..........................................................................................................................................................369
IGMP Version 3...........................................................................................................................................................371
Configure IGMP...............................................................................................................................................................373
Viewing IGMP Enabled Interfaces...............................................................................................................................374
Selecting an IGMP Version........................................................................................................................................... 374
Viewing IGMP Groups....................................................................................................................................................375
Adjusting Timers..............................................................................................................................................................375
Adjusting Query and Response Timers................................................................................................................ 375
Preventing a Host from Joining a Group...................................................................................................................376
Contents
11
Enabling IGMP Immediate-Leave................................................................................................................................ 378
IGMP Snooping................................................................................................................................................................379
Configuring IGMP Snooping................................................................................................................................... 379
Removing a Group-Port Association.................................................................................................................... 379
Disabling Multicast Flooding...................................................................................................................................380
Specifying a Port as Connected to a Multicast Router................................................................................... 380
Configuring the Switch as Querier........................................................................................................................380
Fast Convergence after MSTP Topology Changes.................................................................................................381
Egress Interface Selection (EIS) for HTTP and IGMP Applications....................................................................381
Designating a Multicast Router Interface................................................................................................................. 388
Chapter 22: Interfaces.............................................................................................................. 389
Interface Types............................................................................................................................................................... 390
View Basic Interface Information................................................................................................................................390
Resetting an Interface to its Factory Default State...............................................................................................392
Enabling a Physical Interface....................................................................................................................................... 392
Physical Interfaces..........................................................................................................................................................393
Configuration Task List for Physical Interfaces.................................................................................................393
Overview of Layer Modes.......................................................................................................................................393
Configuring Layer 2 (Data Link) Mode................................................................................................................ 394
Configuring Layer 2 (Interface) Mode.................................................................................................................394
Configuring Layer 3 (Network) Mode..................................................................................................................394
Configuring Layer 3 (Interface) Mode.................................................................................................................395
Monitoring internal physical temperature of 10GBase-T optical ports..............................................................395
Enabling temperature polling on ports................................................................................................................. 397
Setting the reset port to normal mode................................................................................................................ 397
Automatic recovery of an Err-disabled interface....................................................................................................398
Configuring an automatic recovery for an Err-disabled interface.................................................................398
Egress Interface Selection (EIS).................................................................................................................................399
Configuring EIS..........................................................................................................................................................399
Management Interfaces................................................................................................................................................ 400
Configuring Management Interfaces....................................................................................................................400
Configuring a Management Interface on an Ethernet Port.............................................................................401
VLAN Interfaces..............................................................................................................................................................402
Loopback Interfaces.......................................................................................................................................................402
Null Interfaces..................................................................................................................................................................403
Configuring Port Delay.................................................................................................................................................. 403
Port Channel Interfaces................................................................................................................................................ 403
Port Channel Definition and Standards............................................................................................................... 404
Port Channel Benefits..............................................................................................................................................404
Port Channel Implementation.................................................................................................................................404
Interfaces in Port Channels.................................................................................................................................... 404
Configuration Tasks for Port Channel Interfaces............................................................................................. 405
Creating a Port Channel..........................................................................................................................................405
Adding a Physical Interface to a Port Channel.................................................................................................. 405
Reassigning an Interface to a New Port Channel............................................................................................. 407
Configuring the Minimum Oper Up Links in a Port Channel........................................................................... 407
Adding or Removing a Port Channel from a VLAN...........................................................................................408
Assigning an IP Address to a Port Channel........................................................................................................ 409
Deleting or Disabling a Port Channel....................................................................................................................409
12
Contents
Load Balancing Through Port Channels.............................................................................................................. 409
Changing the Hash Algorithm................................................................................................................................ 409
Bulk Configuration........................................................................................................................................................... 410
Interface Range..........................................................................................................................................................410
Bulk Configuration Examples.................................................................................................................................. 410
Defining Interface Range Macros................................................................................................................................ 412
Define the Interface Range..................................................................................................................................... 412
Choosing an Interface-Range Macro.................................................................................................................... 412
Monitoring and Maintaining Interfaces.......................................................................................................................413
Maintenance Using TDR...........................................................................................................................................414
Non Dell-Qualified Transceivers...................................................................................................................................414
Splitting 40G Ports without Reload............................................................................................................................ 414
Splitting QSFP Ports to SFP+ Ports...........................................................................................................................416
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................................... 417
Configuring wavelength for 10–Gigabit SFP+ optics............................................................................................. 418
Link Dampening................................................................................................................................................................ 419
Enabling Link Dampening.........................................................................................................................................422
Link Bundle Monitoring.................................................................................................................................................. 423
Using Ethernet Pause Frames for Flow Control......................................................................................................423
Enabling Pause Frames............................................................................................................................................ 424
Configure the MTU Size on an Interface.................................................................................................................. 425
Port-Pipes.........................................................................................................................................................................426
Auto-Negotiation on Ethernet Interfaces................................................................................................................. 426
Setting the Speed of Ethernet Interfaces.......................................................................................................... 426
Set Auto-Negotiation Options................................................................................................................................427
View Advanced Interface Information....................................................................................................................... 428
Configuring the Interface Sampling Size.............................................................................................................429
Configuring the Traffic Sampling Size Globally....................................................................................................... 430
Dynamic Counters........................................................................................................................................................... 431
Clearing Interface Counters.................................................................................................................................... 431
Discard Counters.............................................................................................................................................................432
Display discard counters..........................................................................................................................................432
Chapter 23: Internet Protocol Security (IPSec).........................................................................434
Configuring IPSec .......................................................................................................................................................... 434
Chapter 24: IPv4 Routing.......................................................................................................... 436
IP Addresses.....................................................................................................................................................................437
Configuration Tasks for IP Addresses........................................................................................................................437
Assigning IP Addresses to an Interface..................................................................................................................... 437
Configuring Static Routes.............................................................................................................................................438
Adding description for IPv4 and IPv6 static routes..........................................................................................439
Configure Static Routes for the Management Interface...................................................................................... 440
IPv4 Path MTU Discovery Overview..........................................................................................................................440
Using the Configured Source IP Address in ICMP Messages...............................................................................441
Configuring the Duration to Establish a TCP Connection..................................................................................... 441
Enabling Directed Broadcast.........................................................................................................................................441
Resolution of Host Names............................................................................................................................................ 442
Enabling Dynamic Resolution of Host Names.......................................................................................................... 442
Contents
13
Specifying the Local System Domain and a List of Domains................................................................................443
Configuring DNS with Traceroute.............................................................................................................................. 443
ARP.....................................................................................................................................................................................444
Configuration Tasks for ARP........................................................................................................................................444
Configuring Static ARP Entries................................................................................................................................... 444
Enabling Proxy ARP........................................................................................................................................................445
Clearing ARP Cache....................................................................................................................................................... 445
ARP Learning via Gratuitous ARP...............................................................................................................................445
Enabling ARP Learning via Gratuitous ARP..............................................................................................................445
ARP Learning via ARP Request................................................................................................................................... 446
Configuring ARP Retries............................................................................................................................................... 446
ICMP...................................................................................................................................................................................447
Configuration Tasks for ICMP......................................................................................................................................447
Enabling ICMP Unreachable Messages......................................................................................................................447
ICMP Redirects................................................................................................................................................................447
UDP Helper.......................................................................................................................................................................448
Enabling UDP Helper......................................................................................................................................................449
Configurations Using UDP Helper...............................................................................................................................449
UDP Helper with Broadcast-All Addresses...............................................................................................................449
UDP Helper with Subnet Broadcast Addresses...................................................................................................... 450
UDP Helper with Configured Broadcast Addresses............................................................................................... 450
UDP Helper with No Configured Broadcast Addresses......................................................................................... 451
Troubleshooting UDP Helper........................................................................................................................................ 451
Chapter 25: IPv6 Routing.......................................................................................................... 452
Protocol Overview..........................................................................................................................................................452
Extended Address Space........................................................................................................................................ 452
Stateless Autoconfiguration................................................................................................................................... 452
IPv6 Headers..............................................................................................................................................................453
IPv6 Header Fields....................................................................................................................................................454
Extension Header Fields.......................................................................................................................................... 455
Addressing.................................................................................................................................................................. 456
Implementing IPv6 with Dell EMC Networking OS.................................................................................................457
ICMPv6..............................................................................................................................................................................459
Path MTU discovery...................................................................................................................................................... 459
IPv6 Neighbor Discovery...............................................................................................................................................459
IPv6 Neighbor Discovery of MTU Packets......................................................................................................... 460
Configuration Task List for IPv6 RDNSS.................................................................................................................. 460
Configuring the IPv6 Recursive DNS Server..................................................................................................... 460
Debugging IPv6 RDNSS Information Sent to the Host ...................................................................................461
Displaying IPv6 RDNSS Information..................................................................................................................... 462
Secure Shell (SSH) Over an IPv6 Transport............................................................................................................462
Configuration Tasks for IPv6....................................................................................................................................... 463
Adjusting Your CAM-Profile....................................................................................................................................463
Assigning an IPv6 Address to an Interface......................................................................................................... 463
Assigning a Static IPv6 Route................................................................................................................................464
Configuring Telnet with IPv6................................................................................................................................. 464
SNMP over IPv6........................................................................................................................................................465
Displaying IPv6 Information.................................................................................................................................... 465
Displaying an IPv6 Interface Information............................................................................................................ 465
14
Contents
Showing IPv6 Routes...............................................................................................................................................466
Showing the Running-Configuration for an Interface...................................................................................... 467
Clearing IPv6 Routes................................................................................................................................................468
Disabling ND Entry Timeout....................................................................................................................................468
Configuring IPv6 RA Guard.......................................................................................................................................... 468
Configuring IPv6 RA Guard on an Interface....................................................................................................... 470
Monitoring IPv6 RA Guard......................................................................................................................................470
Chapter 26: iSCSI Optimization..................................................................................................471
iSCSI Optimization Overview........................................................................................................................................471
Monitoring iSCSI Traffic Flows.............................................................................................................................. 472
Application of Quality of Service to iSCSI Traffic Flows................................................................................. 473
Information Monitored in iSCSI Traffic Flows.................................................................................................... 473
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................474
Configuring Detection and Ports for Dell Compellent Arrays.........................................................................474
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer...........................................................474
Enable and Disable iSCSI Optimization................................................................................................................ 475
Default iSCSI Optimization Values..............................................................................................................................475
iSCSI Optimization Prerequisites.................................................................................................................................476
Configuring iSCSI Optimization................................................................................................................................... 476
Displaying iSCSI Optimization Information................................................................................................................478
Chapter 27: Intermediate System to Intermediate System.........................................................480
IS-IS Protocol Overview................................................................................................................................................480
IS-IS Addressing..............................................................................................................................................................480
Multi-Topology IS-IS....................................................................................................................................................... 481
Transition Mode......................................................................................................................................................... 481
Interface Support.......................................................................................................................................................481
Adjacencies..................................................................................................................................................................481
Graceful Restart..............................................................................................................................................................482
Timers.......................................................................................................................................................................... 482
Implementation Information..........................................................................................................................................482
Configuration Information.............................................................................................................................................483
Configuration Tasks for IS-IS.................................................................................................................................483
Configuring the Distance of a Route....................................................................................................................490
Changing the IS-Type.............................................................................................................................................. 490
Redistributing IPv4 Routes..................................................................................................................................... 493
Redistributing IPv6 Routes..................................................................................................................................... 493
Configuring Authentication Passwords............................................................................................................... 494
Setting the Overload Bit..........................................................................................................................................494
Debugging IS-IS.........................................................................................................................................................495
IS-IS Metric Styles..........................................................................................................................................................496
Configure Metric Values................................................................................................................................................496
Maximum Values in the Routing Table.................................................................................................................496
Change the IS-IS Metric Style in One Level Only............................................................................................. 496
Leaks from One Level to Another......................................................................................................................... 498
Sample Configurations...................................................................................................................................................498
Chapter 28: Link Aggregation Control Protocol (LACP)............................................................. 501
Contents
15
Introduction to Dynamic LAGs and LACP..................................................................................................................501
Important Points to Remember..............................................................................................................................501
LACP Modes.............................................................................................................................................................. 502
Configuring LACP Commands............................................................................................................................... 502
LACP Configuration Tasks............................................................................................................................................502
Creating a LAG.......................................................................................................................................................... 503
Configuring the LAG Interfaces as Dynamic...................................................................................................... 503
Setting the LACP Long Timeout........................................................................................................................... 504
Monitoring and Debugging LACP..........................................................................................................................504
Shared LAG State Tracking..........................................................................................................................................504
Configuring Shared LAG State Tracking.............................................................................................................505
Important Points about Shared LAG State Tracking....................................................................................... 506
LACP Basic Configuration Example............................................................................................................................507
Configure a LAG on ALPHA....................................................................................................................................507
Chapter 29: Layer 2................................................................................................................... 515
Manage the MAC Address Table................................................................................................................................. 515
Clearing the MAC Address Table...........................................................................................................................515
Setting the Aging Time for Dynamic Entries.......................................................................................................515
Configuring a Static MAC Address........................................................................................................................516
Displaying the MAC Address Table........................................................................................................................516
MAC Learning Limit.........................................................................................................................................................516
Setting the MAC Learning Limit.............................................................................................................................517
mac learning-limit Dynamic......................................................................................................................................517
mac learning-limit mac-address-sticky................................................................................................................. 517
mac learning-limit station-move.............................................................................................................................517
mac learning-limit no-station-move...................................................................................................................... 518
Learning Limit Violation Actions.............................................................................................................................518
Setting Station Move Violation Actions............................................................................................................... 518
Recovering from Learning Limit and Station Move Violations........................................................................519
Disabling MAC Address Learning on the System...............................................................................................519
Enabling port security...............................................................................................................................................519
NIC Teaming.....................................................................................................................................................................520
Configure Redundant Pairs........................................................................................................................................... 521
Far-End Failure Detection.............................................................................................................................................524
FEFD State Changes................................................................................................................................................524
Configuring FEFD......................................................................................................................................................525
Enabling FEFD on an Interface.............................................................................................................................. 526
Debugging FEFD........................................................................................................................................................527
Chapter 30: Link Layer Discovery Protocol (LLDP).................................................................... 528
802.1AB (LLDP) Overview............................................................................................................................................528
Protocol Data Units.................................................................................................................................................. 528
Optional TLVs.................................................................................................................................................................. 530
Management TLVs....................................................................................................................................................530
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 531
TIA Organizationally Specific TLVs.......................................................................................................................532
Configure LLDP...............................................................................................................................................................535
CONFIGURATION versus INTERFACE Configurations......................................................................................... 536
16
Contents
Enabling LLDP..................................................................................................................................................................536
Disabling and Undoing LLDP.................................................................................................................................. 536
Enabling LLDP on Management Ports....................................................................................................................... 537
Disabling and Undoing LLDP on Management Ports........................................................................................537
Advertising TLVs............................................................................................................................................................. 537
Storing and Viewing Unrecognized LLDP TLVs...................................................................................................... 538
Viewing the LLDP Configuration.................................................................................................................................539
Viewing Information Advertised by Adjacent LLDP Neighbors............................................................................540
Examples of Viewing Information Advertised by Neighbors...........................................................................540
Configuring LLDPDU Intervals.....................................................................................................................................542
Configuring LLDP Notification Interval......................................................................................................................543
Configuring LLDP Notification Interval......................................................................................................................543
Configuring Transmit and Receive Mode..................................................................................................................543
Configuring the Time to Live Value............................................................................................................................ 544
Debugging LLDP............................................................................................................................................................. 545
Relevant Management Objects................................................................................................................................... 546
Chapter 31: Microsoft Network Load Balancing..........................................................................551
Configuring a Switch for NLB .................................................................................................................................... 552
Enabling a Switch for Multicast NLB................................................................................................................... 553
Chapter 32: Multicast Source Discovery Protocol (MSDP)........................................................ 554
Anycast RP.......................................................................................................................................................................555
Implementation Information......................................................................................................................................... 556
Configure Multicast Source Discovery Protocol.....................................................................................................556
Related Configuration Tasks.................................................................................................................................. 556
Enable MSDP................................................................................................................................................................... 560
Manage the Source-Active Cache.............................................................................................................................. 561
Viewing the Source-Active Cache.........................................................................................................................561
Limiting the Source-Active Cache.........................................................................................................................561
Clearing the Source-Active Cache....................................................................................................................... 562
Enabling the Rejected Source-Active Cache..................................................................................................... 562
Accept Source-Active Messages that Fail the RFP Check..................................................................................562
Specifying Source-Active Messages..........................................................................................................................565
Limiting the Source-Active Messages from a Peer................................................................................................566
Preventing MSDP from Caching a Local Source.................................................................................................... 566
Preventing MSDP from Caching a Remote Source................................................................................................567
Preventing MSDP from Advertising a Local Source...............................................................................................567
Logging Changes in Peership States......................................................................................................................... 568
Terminating a Peership..................................................................................................................................................568
Clearing Peer Statistics.................................................................................................................................................568
Debugging MSDP............................................................................................................................................................569
MSDP with Anycast RP................................................................................................................................................ 569
Configuring Anycast RP................................................................................................................................................ 570
Reducing Source-Active Message Flooding........................................................................................................571
Specifying the RP Address Used in SA Messages.............................................................................................571
MSDP Sample Configurations......................................................................................................................................573
Chapter 33: Multicast Listener Discovery Protocol.................................................................... 576
Contents
17
MLD timers....................................................................................................................................................................... 579
Reducing Host Response Burstiness....................................................................................................................579
Configuring MLD Version..............................................................................................................................................580
Clearing MLD groups..................................................................................................................................................... 580
Debugging MLD...............................................................................................................................................................580
Explicit Tracking..............................................................................................................................................................580
Reducing Leave Latency...............................................................................................................................................580
Displaying MLD groups table........................................................................................................................................ 581
Displaying MLD Interfaces.............................................................................................................................................581
Chapter 34: Multiple Spanning Tree Protocol (MSTP)............................................................... 582
Spanning Tree Variations.............................................................................................................................................. 583
Implementation Information....................................................................................................................................583
Configure Multiple Spanning Tree Protocol............................................................................................................. 583
Related Configuration Tasks.................................................................................................................................. 583
Enable Multiple Spanning Tree Globally.....................................................................................................................584
Adding and Removing Interfaces................................................................................................................................ 584
Creating Multiple Spanning Tree Instances..............................................................................................................584
Influencing MSTP Root Selection...............................................................................................................................585
Interoperate with Non-Dell Bridges............................................................................................................................586
Changing the Region Name or Revision....................................................................................................................586
Modifying Global Parameters.......................................................................................................................................586
Modifying the Interface Parameters.......................................................................................................................... 587
Setting STP path cost as constant............................................................................................................................ 588
Configuring an EdgePort...............................................................................................................................................589
Flush MAC Addresses after a Topology Change.....................................................................................................589
MSTP Sample Configurations......................................................................................................................................590
Debugging and Verifying MSTP Configurations......................................................................................................593
Chapter 35: Multicast Features................................................................................................. 595
Enabling IP Multicast..................................................................................................................................................... 595
Implementation Information......................................................................................................................................... 595
Multicast Policies............................................................................................................................................................ 596
IPv4 Multicast Policies.............................................................................................................................................596
Understanding Multicast Traceroute (mtrace)....................................................................................................... 602
Printing Multicast Traceroute (mtrace) Paths........................................................................................................ 603
Supported Error Codes..................................................................................................................................................604
mtrace Scenarios............................................................................................................................................................ 605
Chapter 36: Multicast Listener Discovery Protocol..................................................................... 611
MLD timers........................................................................................................................................................................614
Reducing Host Response Burstiness.................................................................................................................... 614
Clearing MLD groups...................................................................................................................................................... 615
Debugging MLD............................................................................................................................................................... 615
Explicit Tracking...............................................................................................................................................................615
Reducing Leave Latency................................................................................................................................................615
Displaying MLD groups table........................................................................................................................................ 615
Displaying MLD Interfaces.............................................................................................................................................616
MLD Snooping.................................................................................................................................................................. 616
18
Contents
Enable MLD Snooping...............................................................................................................................................616
Disable MLD Snooping..............................................................................................................................................616
Configure the switch as a querier..........................................................................................................................617
Specify port as connected to multicast router...................................................................................................617
Enable Snooping Explicit Tracking......................................................................................................................... 617
Display the MLD Snooping Table........................................................................................................................... 617
Chapter 37: Object Tracking...................................................................................................... 618
Object Tracking Overview.............................................................................................................................................618
Track Layer 2 Interfaces..........................................................................................................................................619
Track Layer 3 Interfaces..........................................................................................................................................619
Track IPv4 and IPv6 Routes...................................................................................................................................620
Set Tracking Delays...................................................................................................................................................621
VRRP Object Tracking..............................................................................................................................................621
Object Tracking Configuration..................................................................................................................................... 621
Tracking a Layer 2 Interface................................................................................................................................... 621
Tracking a Layer 3 Interface...................................................................................................................................622
Track an IPv4/IPv6 Route...................................................................................................................................... 623
Displaying Tracked Objects.......................................................................................................................................... 626
Chapter 38: Open Shortest Path First (OSPFv2 and OSPFv3)................................................... 629
Protocol Overview..........................................................................................................................................................629
Autonomous System (AS) Areas...........................................................................................................................629
Area Types..................................................................................................................................................................630
Networks and Neighbors......................................................................................................................................... 631
Router Types...............................................................................................................................................................631
Designated and Backup Designated Routers..................................................................................................... 632
Link-State Advertisements (LSAs).......................................................................................................................632
Router Priority and Cost......................................................................................................................................... 633
OSPF with Dell EMC Networking OS........................................................................................................................ 634
Graceful Restart........................................................................................................................................................634
Fast Convergence (OSPFv2, IPv4 Only)............................................................................................................ 635
Multi-Process OSPFv2 with VRF..........................................................................................................................636
OSPF ACK Packing...................................................................................................................................................636
Setting OSPF Adjacency with Cisco Routers.................................................................................................... 636
Configuration Information.............................................................................................................................................637
Configuration Task List for OSPFv2 (OSPF for IPv4).....................................................................................637
OSPFv3 NSSA........................................................................................................................................................... 649
Configuration Task List for OSPFv3 (OSPF for IPv6).................................................................................... 650
MIB Support for OSPFv3..............................................................................................................................................662
Viewing the OSPFv3 MIB........................................................................................................................................662
Configuration Task List for OSPFv3 (OSPF for IPv6).......................................................................................... 663
Enabling IPv6 Unicast Routing...............................................................................................................................663
Applying cost for OSPFv3...................................................................................................................................... 663
Assigning IPv6 Addresses on an Interface..........................................................................................................664
Assigning Area ID on an Interface.........................................................................................................................664
Assigning OSPFv3 Process ID and Router ID Globally.....................................................................................664
Assigning OSPFv3 Process ID and Router ID to a VRF...................................................................................665
Configuring Stub Areas........................................................................................................................................... 665
Contents
19
Configuring Passive-Interface............................................................................................................................... 665
Redistributing Routes.............................................................................................................................................. 666
Configuring a Default Route...................................................................................................................................666
Enabling OSPFv3 Graceful Restart...................................................................................................................... 666
OSPFv3 Authentication Using IPsec....................................................................................................................668
Troubleshooting OSPFv3........................................................................................................................................ 674
Chapter 39: Policy-based Routing (PBR)...................................................................................676
Overview........................................................................................................................................................................... 676
Implementing PBR...........................................................................................................................................................677
Configuration Task List for Policy-based Routing...................................................................................................677
Create a Redirect List.............................................................................................................................................. 678
Create a Rule for a Redirect-list............................................................................................................................678
Apply a Redirect-list to an Interface using a Redirect-group........................................................................ 680
Sample Configuration.....................................................................................................................................................682
Chapter 40: PIM Sparse-Mode (PIM-SM)..................................................................................686
Implementation Information......................................................................................................................................... 686
Protocol Overview..........................................................................................................................................................686
Requesting Multicast Traffic..................................................................................................................................686
Refuse Multicast Traffic..........................................................................................................................................687
Send Multicast Traffic............................................................................................................................................. 687
Configuring PIM-SM...................................................................................................................................................... 687
Related Configuration Tasks.................................................................................................................................. 688
Enable PIM-SM............................................................................................................................................................... 688
Configuring S,G Expiry Timers.....................................................................................................................................690
Configuring a Static Rendezvous Point.................................................................................................................... 690
Overriding Bootstrap Router Updates..................................................................................................................691
Configuring a Designated Router.................................................................................................................................691
Creating Multicast Boundaries and Domains........................................................................................................... 693
Electing an RP using the BSR Mechanism............................................................................................................... 693
Chapter 41: PIM Source-Specific Mode (PIM-SSM).................................................................. 695
Implementation Information......................................................................................................................................... 695
Configure PIM-SSM.......................................................................................................................................................695
Enabling PIM-SSM..........................................................................................................................................................696
Use PIM-SSM with IGMP Version 2 Hosts.............................................................................................................. 696
Electing an RP using the BSR Mechanism............................................................................................................... 698
Enabling RP to Server Specific Multicast Groups............................................................................................ 699
Chapter 42: Port Monitoring...................................................................................................... 701
Important Points to Remember....................................................................................................................................701
Port Monitoring............................................................................................................................................................... 702
Configuring Port Monitoring.........................................................................................................................................704
Configuring Monitor Multicast Queue........................................................................................................................705
Enabling Flow-Based Monitoring.................................................................................................................................706
Remote Port Mirroring...................................................................................................................................................707
Remote Port Mirroring Example............................................................................................................................ 707
Configuring Remote Port Mirroring...................................................................................................................... 708
20
Contents
/