PowerSwitch S3048-ON

Dell PowerSwitch S3048-ON Quick start guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S3048-ON Quick start guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Conguration Guide for the S3048–ON
System
9.14.2.2
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2019 - 07
Rev. A00
Contents
1 About this Guide...........................................................................................................................................34
Audience............................................................................................................................................................................34
Conventions......................................................................................................................................................................34
Related Documents......................................................................................................................................................... 34
2 Conguration Fundamentals........................................................................................................................ 35
Accessing the Command Line........................................................................................................................................35
CLI Modes.........................................................................................................................................................................35
Navigating CLI Modes............................................................................................................................................... 37
The do Command............................................................................................................................................................ 40
Undoing Commands........................................................................................................................................................ 40
Obtaining Help...................................................................................................................................................................41
Entering and Editing Commands.................................................................................................................................... 41
Command History............................................................................................................................................................ 42
Filtering show Command Outputs.................................................................................................................................42
Example of the grep Keyword.................................................................................................................................. 42
Multiple Users in Conguration Mode...........................................................................................................................43
3 Getting Started............................................................................................................................................45
Console Access................................................................................................................................................................46
Serial Console.............................................................................................................................................................46
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................47
Entering CLI commands Using an SSH Connection..............................................................................................47
Executing Local CLI Scripts Using an SSH Connection........................................................................................ 47
Default Conguration...................................................................................................................................................... 48
Conguring a Host Name............................................................................................................................................... 48
Accessing the System Remotely....................................................................................................................................48
Accessing the System Remotely..............................................................................................................................48
Congure the Management Port IP Address......................................................................................................... 48
Congure a Management Route..............................................................................................................................49
Conguring a Username and Password..................................................................................................................49
Conguring the Enable Password..................................................................................................................................50
Conguration File Management.....................................................................................................................................50
Copy Files to and from the System..........................................................................................................................51
Mounting an NFS File System...................................................................................................................................51
Save the Running-Conguration..............................................................................................................................53
Congure the Overload Bit for a Startup Scenario............................................................................................... 54
Viewing Files...............................................................................................................................................................54
Compressing Conguration Files............................................................................................................................. 55
Managing the File System...............................................................................................................................................57
Enabling Software Features on Devices Using a Command Option..........................................................................58
View Command History.................................................................................................................................................. 58
Contents
3
Upgrading Dell EMC Networking OS............................................................................................................................ 60
Verify Software Images Before Installation...................................................................................................................60
Using HTTP for File Transfers.........................................................................................................................................61
4 Management................................................................................................................................................63
Conguring Privilege Levels............................................................................................................................................63
Creating a Custom Privilege Level...........................................................................................................................64
Removing a Command from EXEC Mode.............................................................................................................. 64
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................64
Allowing Access to CONFIGURATION Mode Commands....................................................................................64
Allowing Access to Dierent Modes........................................................................................................................64
Applying a Privilege Level to a Username............................................................................................................... 66
Applying a Privilege Level to a Terminal Line.......................................................................................................... 66
Conguring Logging........................................................................................................................................................ 66
Audit and Security Logs............................................................................................................................................ 67
Conguring Logging Format ...................................................................................................................................69
Display the Logging Buer and the Logging Conguration..................................................................................69
Setting Up a Secure Connection to a Syslog Server.............................................................................................70
Sending System Messages to a Syslog Server.......................................................................................................71
Track Login Activity.......................................................................................................................................................... 71
Restrictions for Tracking Login Activity................................................................................................................... 71
Conguring Login Activity Tracking..........................................................................................................................71
Display Login Statistics..............................................................................................................................................72
Limit Concurrent Login Sessions....................................................................................................................................73
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................73
Conguring Concurrent Session Limit.....................................................................................................................74
Enabling the System to Clear Existing Sessions.....................................................................................................74
Enabling Secured CLI Mode........................................................................................................................................... 75
Log Messages in the Internal Buer..............................................................................................................................75
Conguration Task List for System Log Management.......................................................................................... 75
Disabling System Logging............................................................................................................................................... 75
Sending System Messages to a Syslog Server............................................................................................................ 76
Conguring a UNIX System as a Syslog Server.....................................................................................................76
Changing System Logging Settings...............................................................................................................................76
Display the Logging Buer and the Logging Conguration........................................................................................ 77
Conguring a UNIX Logging Facility Level.................................................................................................................... 78
Synchronizing Log Messages......................................................................................................................................... 79
Enabling Timestamp on Syslog Messages.................................................................................................................... 79
File Transfer Services...................................................................................................................................................... 82
Conguration Task List for File Transfer Services..................................................................................................82
Enabling the FTP Server...........................................................................................................................................82
Conguring FTP Server Parameters....................................................................................................................... 83
Conguring FTP Client Parameters.........................................................................................................................83
Terminal Lines...................................................................................................................................................................84
Denying and Permitting Access to a Terminal Line................................................................................................84
Conguring Login Authentication for Terminal Lines.............................................................................................85
4
Contents
Setting Timeout for EXEC Privilege Mode................................................................................................................... 86
Using Telnet to get to Another Network Device..........................................................................................................86
Lock CONFIGURATION Mode....................................................................................................................................... 87
Viewing the Conguration Lock Status...................................................................................................................87
LPC Bus Quality Degradation.........................................................................................................................................88
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................88
Reloading the system...................................................................................................................................................... 88
Viewing the Reason for Last System Reboot.............................................................................................................. 89
5 802.1X......................................................................................................................................................... 90
Port-Authentication Process.......................................................................................................................................... 92
EAP over RADIUS......................................................................................................................................................92
Conguring 802.1X...........................................................................................................................................................93
Related Conguration Tasks..................................................................................................................................... 93
Important Points to Remember......................................................................................................................................93
Conguring dot1x Prole ................................................................................................................................................94
Conguring MAC addresses for a do1x Prole.............................................................................................................94
Conguring the Static MAB and MAB Prole .............................................................................................................94
Conguring Critical VLAN ..............................................................................................................................................95
Enabling 802.1X.................................................................................................................................................................97
Conguring Request Identity Re-Transmissions...........................................................................................................98
Conguring a Quiet Period after a Failed Authentication..................................................................................... 99
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................100
Re-Authenticating a Port.............................................................................................................................................. 100
Conguring Timeouts..................................................................................................................................................... 101
Conguring Dynamic VLAN Assignment with Port Authentication......................................................................... 102
Guest and Authentication-Fail VLANs.........................................................................................................................103
Conguring a Guest VLAN......................................................................................................................................104
Conguring an Authentication-Fail VLAN............................................................................................................. 104
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 106
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 106
Guidelines for Conguring ACL VLAN Groups............................................................................................................107
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................107
Conguring ACL VLAN Groups.............................................................................................................................. 107
Conguring FP Blocks for VLAN Parameters.......................................................................................................108
Viewing CAM Usage...................................................................................................................................................... 109
Allocating FP Blocks for VLAN Processes................................................................................................................... 110
7 Access Control Lists (ACLs)........................................................................................................................112
IP Access Control Lists (ACLs)......................................................................................................................................113
CAM Usage................................................................................................................................................................114
Implementing ACLs on Dell EMC Networking OS.................................................................................................114
Important Points to Remember.....................................................................................................................................116
Conguration Task List for Route Maps.................................................................................................................116
Conguring Match Routes.......................................................................................................................................118
Contents
5
Conguring Set Conditions..................................................................................................................................... 120
Congure a Route Map for Route Redistribution..................................................................................................121
Congure a Route Map for Route Tagging............................................................................................................ 121
Continue Clause........................................................................................................................................................122
IP Fragment Handling.................................................................................................................................................... 122
IP Fragments ACL Examples...................................................................................................................................122
Layer 4 ACL Rules Examples...................................................................................................................................123
Congure a Standard IP ACL........................................................................................................................................ 123
Conguring a Standard IP ACL Filter..................................................................................................................... 124
Congure an Extended IP ACL.....................................................................................................................................125
Conguring Filters with a Sequence Number.......................................................................................................125
Conguring Filters Without a Sequence Number.................................................................................................127
Congure Layer 2 and Layer 3 ACLs............................................................................................................................127
Assign an IP ACL to an Interface..................................................................................................................................128
Applying an IP ACL.........................................................................................................................................................128
Counting ACL Hits....................................................................................................................................................129
Congure Ingress ACLs................................................................................................................................................. 129
Congure Egress ACLs..................................................................................................................................................130
Applying Egress Layer 3 ACLs (Control-Plane)..................................................................................................... 131
IP Prex Lists................................................................................................................................................................... 131
Implementation Information.................................................................................................................................... 132
Conguration Task List for Prex Lists.................................................................................................................. 132
ACL Remarks.................................................................................................................................................................. 135
Conguring a Remark.............................................................................................................................................. 135
Deleting a Remark.................................................................................................................................................... 136
ACL Resequencing......................................................................................................................................................... 137
Resequencing an ACL or Prex List.......................................................................................................................137
Route Maps.....................................................................................................................................................................138
Implementation Information.................................................................................................................................... 138
Logging of ACL Processes............................................................................................................................................ 139
Guidelines for Conguring ACL Logging................................................................................................................140
Conguring ACL Logging........................................................................................................................................ 140
Flow-Based Monitoring.................................................................................................................................................. 141
Behavior of Flow-Based Monitoring....................................................................................................................... 141
Enabling Flow-Based Monitoring............................................................................................................................142
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 144
How BFD Works............................................................................................................................................................. 144
BFD Packet Format..................................................................................................................................................145
BFD Sessions............................................................................................................................................................ 146
BFD Three-Way Handshake.................................................................................................................................... 147
Session State Changes............................................................................................................................................149
Important Points to Remember.................................................................................................................................... 149
Congure BFD................................................................................................................................................................ 150
Congure BFD for Physical Ports.......................................................................................................................... 150
Congure BFD for Static Routes............................................................................................................................152
6
Contents
Congure BFD for IPv6 Static Routes...................................................................................................................155
Congure BFD for OSPF.........................................................................................................................................158
Congure BFD for OSPFv3..................................................................................................................................... 161
Congure BFD for IS-IS...........................................................................................................................................164
Congure BFD for BGP...........................................................................................................................................166
Congure BFD for VRRP.........................................................................................................................................173
Conguring Protocol Liveness................................................................................................................................ 176
9 Border Gateway Protocol (BGP).................................................................................................................177
BGP IP version 4 (BGPv4) Overview.......................................................................................................................... 177
BGP Autonomous Systems..................................................................................................................................... 177
AS4 Number Representation.................................................................................................................................. 179
Four-Byte AS Numbers............................................................................................................................................ 181
BGP router ID............................................................................................................................................................ 181
Sessions and Peers................................................................................................................................................... 181
Establish a Session................................................................................................................................................... 182
BGP Attributes for selecting Best Path.................................................................................................................182
Multiprotocol BGP.................................................................................................................................................... 187
BGP global and address family conguration........................................................................................................188
Implement BGP with Dell EMC Networking OS...................................................................................................190
Conguration Information........................................................................................................................................193
Basic BGP conguration tasks......................................................................................................................................193
Prerequisite for conguring a BGP network......................................................................................................... 193
Restrictions............................................................................................................................................................... 194
Enabling BGP............................................................................................................................................................ 194
Enabling four-byte autonomous system numbers................................................................................................196
Changing a BGP router ID....................................................................................................................................... 197
Conguring AS4 Number Representations........................................................................................................... 197
Conguring a BGP peer...........................................................................................................................................199
Example-Conguring BGP routing between peers............................................................................................. 200
BGP peer group........................................................................................................................................................201
Advanced BGP conguration tasks.............................................................................................................................207
Route-refresh and Soft-reconguration............................................................................................................... 208
Aggregating Routes..................................................................................................................................................210
Filtering BGP.............................................................................................................................................................212
Conguring BGP Fast Fall-Over.............................................................................................................................219
Conguring Passive Peering...................................................................................................................................220
Enabling Graceful Restart........................................................................................................................................221
Redistributing Routes..............................................................................................................................................222
Enabling Additional Paths........................................................................................................................................223
Conguring IP Community Lists............................................................................................................................ 224
Conguring an IP Extended Community List....................................................................................................... 225
Congure BGP attributes....................................................................................................................................... 226
Enabling Multipath...................................................................................................................................................230
Route Reectors.......................................................................................................................................................231
Enabling Route Flap Dampening............................................................................................................................ 232
Contents
7
Changing BGP keepalive and hold timers.............................................................................................................234
Setting the extended timer.................................................................................................................................... 235
Enabling or disabling BGP neighbors.....................................................................................................................236
Route Map Continue................................................................................................................................................237
Conguring BGP Confederations...........................................................................................................................237
Conguring a BGP VRF address family.................................................................................................................238
Maintaining Existing AS Numbers During an AS Migration................................................................................ 239
Allowing an AS Number to Appear in its Own AS Path...................................................................................... 240
Enabling MBGP Congurations.............................................................................................................................. 241
MBGP support for IPv6...........................................................................................................................................241
Conguring IPv6 MBGP between peers...............................................................................................................242
Example-Conguring IPv4 and IPv6 neighbors................................................................................................... 243
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor......................................... 245
BGP Regular Expression Optimization.................................................................................................................. 247
Debugging BGP........................................................................................................................................................247
10 Content Addressable Memory (CAM)...................................................................................................... 250
CAM Allocation.............................................................................................................................................................. 250
Test CAM Usage............................................................................................................................................................252
View CAM-ACL Settings.............................................................................................................................................. 252
View CAM Usage...........................................................................................................................................................254
Conguring CAM Threshold and Silence Period........................................................................................................254
Setting CAM Threshold and Silence Period......................................................................................................... 254
CAM Optimization......................................................................................................................................................... 255
Troubleshoot CAM Proling..........................................................................................................................................255
QoS CAM Region Limitation.................................................................................................................................. 255
11 Control Plane Policing (CoPP).................................................................................................................. 257
Congure Control Plane Policing................................................................................................................................. 258
Conguring CoPP for Protocols............................................................................................................................ 259
Conguring CoPP for CPU Queues....................................................................................................................... 261
CoPP for OSPFv3 Packets.....................................................................................................................................262
Conguring CoPP for OSPFv3.............................................................................................................................. 265
Displaying CoPP Conguration .............................................................................................................................265
12 Dynamic Host Conguration Protocol (DHCP).........................................................................................268
DHCP Packet Format and Options............................................................................................................................. 268
Assign an IP Address using DHCP............................................................................................................................... 270
Implementation Information...........................................................................................................................................271
Congure the System to be a DHCP Server...............................................................................................................271
Conguring the Server for Automatic Address Allocation.................................................................................. 272
Specifying a Default Gateway................................................................................................................................ 273
Congure a Method of Hostname Resolution......................................................................................................274
Using DNS for Address Resolution........................................................................................................................ 274
Using NetBIOS WINS for Address Resolution......................................................................................................274
Creating Manual Binding Entries............................................................................................................................ 274
8
Contents
Debugging the DHCP Server................................................................................................................................. 275
Using DHCP Clear Commands...............................................................................................................................275
Congure the System to be a Relay Agent................................................................................................................ 275
Congure the System to be a DHCP Client................................................................................................................277
Conguring the DHCP Client System....................................................................................................................277
DHCP Client on a Management Interface............................................................................................................ 278
DHCP Client Operation with Other Features....................................................................................................... 279
DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................ 280
Conguring Route Leaking between VRFs on DHCP Relay Agent................................................................... 280
Non-default VRF conguration for DHCPv6 helper address....................................................................................281
Conguring DHCP relay source interface................................................................................................................... 282
Global DHCP relay source IPv4 or IPv6 conguration ....................................................................................... 282
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................282
Congure the System for User Port Stacking (Option 230)....................................................................................284
Congure Secure DHCP............................................................................................................................................... 284
Option 82 (DHCPv4 relay options)........................................................................................................................284
DHCPv6 relay agent options..................................................................................................................................285
DHCP Snooping.......................................................................................................................................................285
Drop DHCP Packets on Snooped VLANs Only....................................................................................................290
Dynamic ARP Inspection........................................................................................................................................ 290
Conguring Dynamic ARP Inspection....................................................................................................................291
Source Address Validation............................................................................................................................................ 293
Enabling IP Source Address Validation.................................................................................................................. 293
DHCP MAC Source Address Validation................................................................................................................ 294
Enabling IP+MAC Source Address Validation.......................................................................................................294
Viewing the Number of SAV Dropped Packets................................................................................................... 295
Clearing the Number of SAV Dropped Packets...................................................................................................295
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 296
ECMP for Flow-Based Anity.....................................................................................................................................296
Conguring the Hash Algorithm............................................................................................................................ 296
Enabling Deterministic ECMP Next Hop.............................................................................................................. 296
Conguring the Hash Algorithm Seed...................................................................................................................297
Link Bundle Monitoring..................................................................................................................................................297
Managing ECMP Group Paths...............................................................................................................................298
Creating an ECMP Group Bundle..........................................................................................................................298
Modifying the ECMP Group Threshold.................................................................................................................298
14 FIPS Cryptography...................................................................................................................................300
Conguration Tasks....................................................................................................................................................... 300
Preparing the System................................................................................................................................................... 300
Enabling FIPS Mode.......................................................................................................................................................301
Generating Host-Keys....................................................................................................................................................301
Monitoring FIPS Mode Status...................................................................................................................................... 301
Disabling FIPS Mode..................................................................................................................................................... 302
Contents
9
15 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 303
Protocol Overview.........................................................................................................................................................303
Ring Status............................................................................................................................................................... 304
Multiple FRRP Rings............................................................................................................................................... 304
Important FRRP Points...........................................................................................................................................305
Important FRRP Concepts.....................................................................................................................................306
Implementing FRRP.......................................................................................................................................................307
FRRP Conguration.......................................................................................................................................................307
Creating the FRRP Group.......................................................................................................................................307
Conguring the Control VLAN...............................................................................................................................308
Conguring and Adding the Member VLANs...................................................................................................... 309
Setting the FRRP Timers........................................................................................................................................ 310
Clearing the FRRP Counters...................................................................................................................................310
Viewing the FRRP Conguration............................................................................................................................310
Viewing the FRRP Information............................................................................................................................... 310
Troubleshooting FRRP.................................................................................................................................................... 311
Conguration Checks............................................................................................................................................... 311
Sample Conguration and Topology............................................................................................................................. 311
FRRP Support on VLT................................................................................................................................................... 312
Example Scenario..................................................................................................................................................... 313
Important Points to Remember.............................................................................................................................. 314
16 GARP VLAN Registration Protocol (GVRP).............................................................................................. 315
Important Points to Remember.................................................................................................................................... 315
Congure GVRP............................................................................................................................................................. 316
Related Conguration Tasks....................................................................................................................................316
Enabling GVRP Globally................................................................................................................................................. 317
Enabling GVRP on a Layer 2 Interface.........................................................................................................................317
Congure GVRP Registration....................................................................................................................................... 317
Congure a GARP Timer............................................................................................................................................... 318
RPM Redundancy...........................................................................................................................................................318
17 High Availability (HA)................................................................................................................................320
Component Redundancy.............................................................................................................................................. 320
Automatic and Manual Stack Unit Failover.......................................................................................................... 320
Synchronization between Management and Standby Units...............................................................................321
Forcing a Stack Unit Failover.................................................................................................................................. 321
Specifying an Auto-Failover Limit.......................................................................................................................... 322
Disabling Auto-Reboot............................................................................................................................................ 322
Pre-Conguring a Stack Unit Slot............................................................................................................................... 322
Removing a Provisioned Logical Stack Unit............................................................................................................... 322
Hitless Behavior............................................................................................................................................................. 322
Graceful Restart.............................................................................................................................................................323
Software Resiliency....................................................................................................................................................... 323
Software Component Health Monitoring............................................................................................................. 323
10
Contents
System Health Monitoring......................................................................................................................................323
Failure and Event Logging.......................................................................................................................................324
Hot-Lock Behavior.........................................................................................................................................................324
18 Internet Group Management Protocol (IGMP)......................................................................................... 325
IGMP Implementation Information.............................................................................................................................. 325
IGMP Protocol Overview..............................................................................................................................................325
IGMP Version 2........................................................................................................................................................ 325
IGMP Version 3........................................................................................................................................................ 327
Congure IGMP............................................................................................................................................................. 330
Related Conguration Tasks...................................................................................................................................330
Viewing IGMP Enabled Interfaces................................................................................................................................331
Selecting an IGMP Version............................................................................................................................................331
Viewing IGMP Groups...................................................................................................................................................332
Adjusting Timers............................................................................................................................................................ 332
Adjusting Query and Response Timers................................................................................................................. 332
Preventing a Host from Joining a Group.................................................................................................................... 333
Enabling IGMP Immediate-Leave.................................................................................................................................336
IGMP Snooping..............................................................................................................................................................336
IGMP Snooping Implementation Information....................................................................................................... 336
Conguring IGMP Snooping...................................................................................................................................336
Removing a Group-Port Association..................................................................................................................... 337
Disabling Multicast Flooding................................................................................................................................... 337
Specifying a Port as Connected to a Multicast Router...................................................................................... 338
Conguring the Switch as Querier........................................................................................................................ 338
Fast Convergence after MSTP Topology Changes...................................................................................................339
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................339
Protocol Separation.................................................................................................................................................339
Enabling and Disabling Management Egress Interface Selection...................................................................... 340
Handling of Management Route Conguration....................................................................................................341
Handling of Switch-Initiated Trac....................................................................................................................... 342
Handling of Switch-Destined Trac......................................................................................................................342
Handling of Transit Trac (Trac Separation).................................................................................................... 343
Mapping of Management Applications and Trac Type.....................................................................................343
Behavior of Various Applications for Switch-Initiated Trac ............................................................................ 344
Behavior of Various Applications for Switch-Destined Trac ...........................................................................345
Interworking of EIS With Various Applications.....................................................................................................346
Designating a Multicast Router Interface...................................................................................................................346
19 Interfaces................................................................................................................................................. 348
Basic Interface Conguration.......................................................................................................................................348
Advanced Interface Conguration...............................................................................................................................348
Interface Types...............................................................................................................................................................349
View Basic Interface Information.................................................................................................................................349
Resetting an Interface to its Factory Default State................................................................................................... 351
Enabling a Physical Interface.........................................................................................................................................351
Contents
11
Enabling Energy Ecient Ethernet..............................................................................................................................352
View EEE Information................................................................................................................................................... 352
Clear EEE Counters....................................................................................................................................................... 357
Physical Interfaces.........................................................................................................................................................357
Conguration Task List for Physical Interfaces.................................................................................................... 357
Overview of Layer Modes...................................................................................................................................... 358
Conguring Layer 2 (Data Link) Mode..................................................................................................................358
Conguring Layer 2 (Interface) Mode.................................................................................................................. 359
Conguring Layer 3 (Network) Mode...................................................................................................................359
Conguring Layer 3 (Interface) Mode.................................................................................................................. 359
Automatic recovery of an Err-disabled interface.......................................................................................................360
Conguring an automatic recovery for an Err-disabled interface...................................................................... 361
Egress Interface Selection (EIS)...................................................................................................................................361
Important Points to Remember............................................................................................................................. 362
Conguring EIS........................................................................................................................................................ 362
Management Interfaces................................................................................................................................................362
Conguring Management Interfaces.....................................................................................................................362
Conguring a Management Interface on an Ethernet Port................................................................................364
VLAN Interfaces............................................................................................................................................................ 364
Loopback Interfaces......................................................................................................................................................365
Null Interfaces................................................................................................................................................................ 366
Port Channel Interfaces................................................................................................................................................366
Port Channel Denition and Standards.................................................................................................................366
Port Channel Benets.............................................................................................................................................366
Port Channel Implementation.................................................................................................................................366
Interfaces in Port Channels.................................................................................................................................... 367
Conguration Tasks for Port Channel Interfaces.................................................................................................367
Creating a Port Channel......................................................................................................................................... 368
Adding a Physical Interface to a Port Channel.....................................................................................................368
Reassigning an Interface to a New Port Channel................................................................................................ 370
Conguring the Minimum Oper Up Links in a Port Channel...............................................................................370
Adding or Removing a Port Channel from a VLAN.............................................................................................. 371
Assigning an IP Address to a Port Channel...........................................................................................................372
Deleting or Disabling a Port Channel..................................................................................................................... 372
Load Balancing Through Port Channels................................................................................................................372
Changing the Hash Algorithm................................................................................................................................ 373
Bulk Conguration..........................................................................................................................................................374
Interface Range........................................................................................................................................................374
Bulk Conguration Examples.................................................................................................................................. 374
Dening Interface Range Macros................................................................................................................................ 376
Dene the Interface Range.....................................................................................................................................376
Choosing an Interface-Range Macro.................................................................................................................... 376
Monitoring and Maintaining Interfaces........................................................................................................................376
Maintenance Using TDR..........................................................................................................................................377
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................ 378
12
Contents
Link Dampening..............................................................................................................................................................378
Important Points to Remember..............................................................................................................................379
Conguration Example of Link Dampening...........................................................................................................379
Enabling Link Dampening.........................................................................................................................................381
Link Bundle Monitoring................................................................................................................................................. 382
Using Ethernet Pause Frames for Flow Control........................................................................................................ 383
Enabling Pause Frames........................................................................................................................................... 383
Congure the MTU Size on an Interface....................................................................................................................384
Port-Pipes.......................................................................................................................................................................385
Auto-Negotiation on Ethernet Interfaces...................................................................................................................385
Setting the Speed of Ethernet Interfaces............................................................................................................385
Set Auto-Negotiation Options............................................................................................................................... 386
View Advanced Interface Information......................................................................................................................... 387
Conguring the Interface Sampling Size.............................................................................................................. 388
Conguring the Trac Sampling Size Globally...........................................................................................................389
Dynamic Counters......................................................................................................................................................... 390
Clearing Interface Counters.................................................................................................................................... 391
Discard Counters............................................................................................................................................................ 391
Display discard counters.......................................................................................................................................... 391
20 Internet Protocol Security (IPSec).......................................................................................................... 394
Conguring IPSec .........................................................................................................................................................394
21 IPv4 Routing............................................................................................................................................ 396
IP Addresses................................................................................................................................................................... 397
Implementation Information....................................................................................................................................397
Conguration Tasks for IP Addresses..........................................................................................................................397
Assigning IP Addresses to an Interface....................................................................................................................... 397
Conguring Static Routes............................................................................................................................................ 398
Adding description for IPv4 and IPv6 static routes.............................................................................................399
Congure Static Routes for the Management Interface..........................................................................................400
IPv4 Path MTU Discovery Overview.......................................................................................................................... 400
Packet handling during MTU mismatch.................................................................................................................401
Using the Congured Source IP Address in ICMP Messages...................................................................................401
Conguring the ICMP Source Interface................................................................................................................401
Conguring the Duration to Establish a TCP Connection.........................................................................................401
Enabling Directed Broadcast........................................................................................................................................ 402
Resolution of Host Names............................................................................................................................................402
Enabling Dynamic Resolution of Host Names............................................................................................................403
Specifying the Local System Domain and a List of Domains................................................................................... 403
Conguring DNS with Traceroute............................................................................................................................... 404
ARP................................................................................................................................................................................. 404
Conguration Tasks for ARP........................................................................................................................................ 405
Conguring Static ARP Entries....................................................................................................................................405
Enabling Proxy ARP.......................................................................................................................................................405
Clearing ARP Cache......................................................................................................................................................406
Contents
13
ARP Learning via Gratuitous ARP............................................................................................................................... 406
Enabling ARP Learning via Gratuitous ARP................................................................................................................406
ARP Learning via ARP Request................................................................................................................................... 406
Conguring ARP Retries............................................................................................................................................... 407
ICMP............................................................................................................................................................................... 408
Conguration Tasks for ICMP......................................................................................................................................408
Enabling ICMP Unreachable Messages...................................................................................................................... 408
ICMP Redirects..............................................................................................................................................................408
UDP Helper.....................................................................................................................................................................409
Congure UDP Helper............................................................................................................................................ 409
Important Points to Remember.............................................................................................................................. 410
Enabling UDP Helper......................................................................................................................................................410
Congurations Using UDP Helper................................................................................................................................ 410
UDP Helper with Broadcast-All Addresses................................................................................................................. 410
UDP Helper with Subnet Broadcast Addresses.......................................................................................................... 411
UDP Helper with Congured Broadcast Addresses...................................................................................................412
UDP Helper with No Congured Broadcast Addresses.............................................................................................412
Troubleshooting UDP Helper.........................................................................................................................................412
22 IPv6 Routing.............................................................................................................................................414
Protocol Overview..........................................................................................................................................................414
Extended Address Space........................................................................................................................................ 415
Stateless Autoconguration....................................................................................................................................415
IPv6 Headers.............................................................................................................................................................415
IPv6 Header Fields................................................................................................................................................... 416
Extension Header Fields.......................................................................................................................................... 418
Addressing.................................................................................................................................................................419
Implementing IPv6 with Dell EMC Networking OS................................................................................................... 420
ICMPv6............................................................................................................................................................................421
Path MTU discovery......................................................................................................................................................422
IPv6 Neighbor Discovery.............................................................................................................................................. 422
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................423
Conguration Task List for IPv6 RDNSS.................................................................................................................... 423
Conguring the IPv6 Recursive DNS Server....................................................................................................... 423
Debugging IPv6 RDNSS Information Sent to the Host ..................................................................................... 424
Displaying IPv6 RDNSS Information......................................................................................................................425
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 425
Conguration Tasks for IPv6........................................................................................................................................ 426
Adjusting Your CAM-Prole....................................................................................................................................426
Assigning an IPv6 Address to an Interface........................................................................................................... 427
Assigning a Static IPv6 Route................................................................................................................................ 427
Conguring Telnet with IPv6..................................................................................................................................428
SNMP over IPv6......................................................................................................................................................428
Displaying IPv6 Information.................................................................................................................................... 428
Displaying an IPv6 Interface Information.............................................................................................................. 429
Showing IPv6 Routes..............................................................................................................................................429
14
Contents
Showing the Running-Conguration for an Interface..........................................................................................431
Clearing IPv6 Routes................................................................................................................................................431
Disabling ND Entry Timeout.................................................................................................................................... 431
Conguring IPv6 RA Guard.......................................................................................................................................... 432
Conguring IPv6 RA Guard on an Interface.........................................................................................................433
Monitoring IPv6 RA Guard......................................................................................................................................434
23 Intermediate System to Intermediate System.......................................................................................... 435
IS-IS Protocol Overview............................................................................................................................................... 435
IS-IS Addressing.............................................................................................................................................................435
Multi-Topology IS-IS...................................................................................................................................................... 436
Transition Mode....................................................................................................................................................... 436
Interface Support.....................................................................................................................................................437
Adjacencies...............................................................................................................................................................437
Graceful Restart.............................................................................................................................................................437
Timers........................................................................................................................................................................437
Implementation Information..........................................................................................................................................437
Conguration Information.............................................................................................................................................438
Conguration Tasks for IS-IS..................................................................................................................................439
Conguring the Distance of a Route.....................................................................................................................446
Changing the IS-Type.............................................................................................................................................. 447
Redistributing IPv4 Routes.....................................................................................................................................449
Redistributing IPv6 Routes.....................................................................................................................................450
Conguring Authentication Passwords..................................................................................................................451
Setting the Overload Bit..........................................................................................................................................451
Debugging IS-IS....................................................................................................................................................... 452
IS-IS Metric Styles.........................................................................................................................................................453
Congure Metric Values............................................................................................................................................... 453
Maximum Values in the Routing Table.................................................................................................................. 453
Change the IS-IS Metric Style in One Level Only................................................................................................453
Leaks from One Level to Another..........................................................................................................................455
Sample Congurations..................................................................................................................................................456
24 Link Aggregation Control Protocol (LACP).............................................................................................. 458
Introduction to Dynamic LAGs and LACP.................................................................................................................. 458
Important Points to Remember............................................................................................................................. 458
LACP Modes............................................................................................................................................................ 459
Conguring LACP Commands...............................................................................................................................459
LACP Conguration Tasks............................................................................................................................................460
Creating a LAG.........................................................................................................................................................460
Conguring the LAG Interfaces as Dynamic........................................................................................................460
Setting the LACP Long Timeout............................................................................................................................ 461
Monitoring and Debugging LACP...........................................................................................................................461
Shared LAG State Tracking.......................................................................................................................................... 462
Conguring Shared LAG State Tracking............................................................................................................... 462
Important Points about Shared LAG State Tracking........................................................................................... 464
Contents
15
LACP Basic Conguration Example............................................................................................................................ 464
Congure a LAG on ALPHA................................................................................................................................... 464
25 Layer 2.....................................................................................................................................................473
Manage the MAC Address Table..................................................................................................................................473
Clearing the MAC Address Table........................................................................................................................... 473
Setting the Aging Time for Dynamic Entries........................................................................................................ 473
Conguring a Static MAC Address........................................................................................................................ 474
Displaying the MAC Address Table.........................................................................................................................474
MAC Learning Limit....................................................................................................................................................... 474
Setting the MAC Learning Limit.............................................................................................................................475
mac learning-limit Dynamic.....................................................................................................................................475
mac learning-limit mac-address-sticky................................................................................................................. 475
mac learning-limit station-move.............................................................................................................................476
mac learning-limit no-station-move.......................................................................................................................476
Learning Limit Violation Actions............................................................................................................................. 476
Setting Station Move Violation Actions.................................................................................................................477
Recovering from Learning Limit and Station Move Violations............................................................................477
Disabling MAC Address Learning on the System.................................................................................................478
Enabling port security..............................................................................................................................................478
NIC Teaming................................................................................................................................................................... 478
Congure Redundant Pairs...........................................................................................................................................479
Important Points about Conguring Redundant Pairs......................................................................................... 481
Far-End Failure Detection............................................................................................................................................. 482
FEFD State Changes...............................................................................................................................................483
Conguring FEFD.................................................................................................................................................... 484
Enabling FEFD on an Interface...............................................................................................................................484
Debugging FEFD......................................................................................................................................................485
26 Link Layer Discovery Protocol (LLDP)......................................................................................................487
802.1AB (LLDP) Overview............................................................................................................................................487
Protocol Data Units..................................................................................................................................................487
Optional TLVs................................................................................................................................................................. 488
Management TLVs.................................................................................................................................................. 488
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 490
TIA Organizationally Specic TLVs........................................................................................................................ 490
Congure LLDP..............................................................................................................................................................494
Related Conguration Tasks...................................................................................................................................494
Important Points to Remember............................................................................................................................. 494
LLDP Compatibility..................................................................................................................................................495
CONFIGURATION versus INTERFACE Congurations............................................................................................ 495
Enabling LLDP................................................................................................................................................................495
Disabling and Undoing LLDP.................................................................................................................................. 496
Enabling LLDP on Management Ports........................................................................................................................496
Disabling and Undoing LLDP on Management Ports..........................................................................................496
Advertising TLVs............................................................................................................................................................ 496
16
Contents
Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................498
Reserved Unrecognized LLDP TLVs..................................................................................................................... 498
Organizational Specic Unrecognized LLDP TLVs..............................................................................................498
Viewing Unrecognized LLDP TLVs........................................................................................................................ 498
Viewing the LLDP Conguration................................................................................................................................. 499
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................499
Examples of Viewing Information Advertised by Neighbors.............................................................................. 499
Conguring LLDPDU Intervals.....................................................................................................................................502
Conguring LLDP Notication Interval....................................................................................................................... 503
Conguring LLDP Notication Interval....................................................................................................................... 503
Conguring Transmit and Receive Mode....................................................................................................................503
Conguring the Time to Live Value............................................................................................................................. 504
Debugging LLDP............................................................................................................................................................505
Relevant Management Objects................................................................................................................................... 506
27 Microsoft Network Load Balancing............................................................................................................511
NLB Unicast Mode Scenario..........................................................................................................................................511
NLB Multicast Mode Scenario.......................................................................................................................................511
Limitations of the NLB Feature.....................................................................................................................................512
Microsoft Clustering.......................................................................................................................................................512
Enable and Disable VLAN Flooding ............................................................................................................................. 512
Conguring a Switch for NLB ......................................................................................................................................512
Enabling a Switch for Multicast NLB..................................................................................................................... 513
28 Multicast Source Discovery Protocol (MSDP)..........................................................................................514
Protocol Overview..........................................................................................................................................................514
Anycast RP......................................................................................................................................................................515
Implementation Information.......................................................................................................................................... 516
Congure Multicast Source Discovery Protocol.........................................................................................................516
Related Conguration Tasks....................................................................................................................................516
Enable MSDP................................................................................................................................................................. 520
Manage the Source-Active Cache...............................................................................................................................521
Viewing the Source-Active Cache......................................................................................................................... 521
Limiting the Source-Active Cache..........................................................................................................................521
Clearing the Source-Active Cache........................................................................................................................ 522
Enabling the Rejected Source-Active Cache....................................................................................................... 522
Accept Source-Active Messages that Fail the RFP Check......................................................................................522
Specifying Source-Active Messages...........................................................................................................................525
Limiting the Source-Active Messages from a Peer...................................................................................................526
Preventing MSDP from Caching a Local Source.......................................................................................................526
Preventing MSDP from Caching a Remote Source...................................................................................................527
Preventing MSDP from Advertising a Local Source..................................................................................................527
Logging Changes in Peership States...........................................................................................................................528
Terminating a Peership..................................................................................................................................................528
Clearing Peer Statistics.................................................................................................................................................529
Debugging MSDP.......................................................................................................................................................... 529
Contents
17
MSDP with Anycast RP................................................................................................................................................530
Conguring Anycast RP................................................................................................................................................ 531
Reducing Source-Active Message Flooding.........................................................................................................532
Specifying the RP Address Used in SA Messages.............................................................................................. 532
MSDP Sample Congurations......................................................................................................................................534
29 Multicast Listener Discovery Protocol......................................................................................................537
MLD Version 1.................................................................................................................................................................537
MLD Querier Router...................................................................................................................................................... 537
Joining a Multicast Group.............................................................................................................................................538
Leaving a Multicast Group............................................................................................................................................538
MLD version 2................................................................................................................................................................538
MLD timers.....................................................................................................................................................................540
Reducing Host Response Burstiness..................................................................................................................... 541
Conguring MLD Version.............................................................................................................................................. 541
Clearing MLD groups..................................................................................................................................................... 541
Debugging MLD..............................................................................................................................................................541
Explicit Tracking..............................................................................................................................................................541
Reducing Leave Latency...............................................................................................................................................542
Displaying MLD groups table........................................................................................................................................542
Displaying MLD Interfaces............................................................................................................................................542
MLD Snooping............................................................................................................................................................... 542
Enable MLD Snooping.............................................................................................................................................543
Disable MLD Snooping............................................................................................................................................543
Congure the switch as a querier..........................................................................................................................543
Specify port as connected to multicast router.................................................................................................... 543
Enable Snooping Explicit Tracking......................................................................................................................... 544
Display the MLD Snooping Table........................................................................................................................... 544
30 Multiple Spanning Tree Protocol (MSTP)................................................................................................ 545
Protocol Overview.........................................................................................................................................................545
Spanning Tree Variations.............................................................................................................................................. 546
Implementation Information................................................................................................................................... 546
Congure Multiple Spanning Tree Protocol................................................................................................................546
Related Conguration Tasks................................................................................................................................... 547
Enable Multiple Spanning Tree Globally.......................................................................................................................547
Adding and Removing Interfaces.................................................................................................................................547
Creating Multiple Spanning Tree Instances................................................................................................................ 548
Inuencing MSTP Root Selection................................................................................................................................549
Interoperate with Non-Dell Bridges.............................................................................................................................549
Changing the Region Name or Revision.....................................................................................................................550
Modifying Global Parameters.......................................................................................................................................550
Modifying the Interface Parameters............................................................................................................................ 551
Setting STP path cost as constant.............................................................................................................................552
Conguring an EdgePort.............................................................................................................................................. 553
Flush MAC Addresses after a Topology Change....................................................................................................... 553
18
Contents
MSTP Sample Congurations......................................................................................................................................554
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................554
Debugging and Verifying MSTP Congurations........................................................................................................ 557
31 Multicast Features................................................................................................................................... 559
Enabling IP Multicast.....................................................................................................................................................559
Implementation Information......................................................................................................................................... 559
Multicast Policies...........................................................................................................................................................560
IPv4 Multicast Policies............................................................................................................................................560
Understanding Multicast Traceroute (mtrace)...........................................................................................................567
Important Points to Remember............................................................................................................................. 568
Printing Multicast Traceroute (mtrace) Paths........................................................................................................... 568
Supported Error Codes.................................................................................................................................................569
mtrace Scenarios........................................................................................................................................................... 570
32 Object Tracking........................................................................................................................................576
Object Tracking Overview.............................................................................................................................................576
Track Layer 2 Interfaces.......................................................................................................................................... 577
Track Layer 3 Interfaces.......................................................................................................................................... 577
Track IPv4 and IPv6 Routes................................................................................................................................... 578
Set Tracking Delays................................................................................................................................................. 579
VRRP Object Tracking.............................................................................................................................................579
Object Tracking Conguration......................................................................................................................................579
Tracking a Layer 2 Interface................................................................................................................................... 579
Tracking a Layer 3 Interface................................................................................................................................... 580
Track an IPv4/IPv6 Route...................................................................................................................................... 582
Displaying Tracked Objects...........................................................................................................................................586
33 Open Shortest Path First (OSPFv2 and OSPFv3)....................................................................................588
Protocol Overview.........................................................................................................................................................588
Autonomous System (AS) Areas........................................................................................................................... 588
Area Types................................................................................................................................................................ 589
Networks and Neighbors........................................................................................................................................590
Router Types............................................................................................................................................................ 590
Designated and Backup Designated Routers....................................................................................................... 592
Link-State Advertisements (LSAs)........................................................................................................................592
Router Priority and Cost.........................................................................................................................................593
OSPF with Dell EMC Networking OS.........................................................................................................................594
Graceful Restart...................................................................................................................................................... 595
Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................596
Multi-Process OSPFv2 with VRF..........................................................................................................................596
OSPF ACK Packing................................................................................................................................................. 596
Setting OSPF Adjacency with Cisco Routers...................................................................................................... 596
Conguration Information.............................................................................................................................................597
Conguration Task List for OSPFv2 (OSPF for IPv4).........................................................................................597
Contents
19
OSPFv3 NSSA.................................................................................................................................................................611
NSSA Options............................................................................................................................................................611
Conguration Task List for OSPFv3 (OSPF for IPv6)............................................................................................... 612
Enabling IPv6 Unicast Routing............................................................................................................................... 612
Applying cost for OSPFv3.......................................................................................................................................613
Assigning IPv6 Addresses on an Interface............................................................................................................ 613
Assigning Area ID on an Interface...........................................................................................................................613
Assigning OSPFv3 Process ID and Router ID Globally.........................................................................................614
Assigning OSPFv3 Process ID and Router ID to a VRF.......................................................................................614
Conguring Stub Areas............................................................................................................................................615
Conguring Passive-Interface................................................................................................................................ 615
Redistributing Routes.............................................................................................................................................. 615
Conguring a Default Route....................................................................................................................................616
Enabling OSPFv3 Graceful Restart........................................................................................................................616
OSPFv3 Authentication Using IPsec......................................................................................................................618
Troubleshooting OSPFv3........................................................................................................................................ 624
MIB Support for OSPFv3....................................................................................................................................... 626
34 Policy-based Routing (PBR).................................................................................................................... 627
Overview.........................................................................................................................................................................627
Implementing PBR.........................................................................................................................................................628
Conguration Task List for Policy-based Routing......................................................................................................628
PBR Exceptions (Permit)....................................................................................................................................... 628
Create a Redirect List..............................................................................................................................................629
Create a Rule for a Redirect-list.............................................................................................................................629
Apply a Redirect-list to an Interface using a Redirect-group.............................................................................. 631
Sample Conguration....................................................................................................................................................633
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD......634
35 PIM Sparse-Mode (PIM-SM).................................................................................................................. 637
Implementation Information..........................................................................................................................................637
Protocol Overview......................................................................................................................................................... 637
Requesting Multicast Trac...................................................................................................................................637
Refuse Multicast Trac..........................................................................................................................................638
Send Multicast Trac............................................................................................................................................. 638
Conguring PIM-SM..................................................................................................................................................... 638
Related Conguration Tasks...................................................................................................................................639
Enable PIM-SM..............................................................................................................................................................639
Conguring S,G Expiry Timers......................................................................................................................................641
Conguring a Static Rendezvous Point.......................................................................................................................641
Overriding Bootstrap Router Updates.................................................................................................................. 642
Conguring a Designated Router.................................................................................................................................642
Creating Multicast Boundaries and Domains............................................................................................................. 644
Electing an RP using the BSR Mechanism.................................................................................................................644
36 PIM Source-Specic Mode (PIM-SSM).................................................................................................. 646
20
Contents
/