Dell PowerSwitch S4820T Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4820T Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S4820T
System
9.6(0.0)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 09
Rev. A00
Contents
1 About this Guide..................................................................................................35
Audience..............................................................................................................................................35
Conventions........................................................................................................................................ 35
Related Documents.............................................................................................................................35
2 Configuration Fundamentals........................................................................... 36
Accessing the Command Line............................................................................................................36
CLI Modes............................................................................................................................................36
Navigating CLI Modes................................................................................................................... 37
The do Command............................................................................................................................... 41
Undoing Commands...........................................................................................................................41
Obtaining Help.................................................................................................................................... 42
Entering and Editing Commands....................................................................................................... 42
Command History...............................................................................................................................43
Filtering show Command Outputs.....................................................................................................44
Multiple Users in Configuration Mode............................................................................................... 45
3 Getting Started....................................................................................................46
Console Access...................................................................................................................................46
Serial Console................................................................................................................................46
Accessing the CLI Interface and Running Scripts Using SSH............................................................ 47
S4820T ..........................................................................................................................................47
Entering CLI commands Using an SSH Connection................................................................... 48
Executing Local CLI Scripts Using an SSH Connection...............................................................48
Default Configuration......................................................................................................................... 49
Configuring a Host Name...................................................................................................................49
Accessing the System Remotely........................................................................................................ 49
Accessing the System Remotely...................................................................................................49
Configure the Management Port IP Address............................................................................... 49
Configure a Management Route..................................................................................................50
Configuring a Username and Password.......................................................................................50
Configuring the Enable Password......................................................................................................50
Configuration File Management......................................................................................................... 51
Copy Files to and from the System...............................................................................................51
Save the Running-Configuration..................................................................................................52
Configure the Overload Bit for a Startup Scenario...................................................................... 53
Viewing Files.................................................................................................................................. 53
Managing the File System...................................................................................................................54
Enabling Software Features on Devices Using a Command Option................................................ 55
View Command History......................................................................................................................56
Upgrading Dell Networking OS.......................................................................................................... 56
Using HTTP for File Transfers............................................................................................................. 56
Using Hashes to Validate Software Images........................................................................................56
4 Management........................................................................................................59
Configuring Privilege Levels............................................................................................................... 59
Creating a Custom Privilege Level................................................................................................59
Removing a Command from EXEC Mode................................................................................... 59
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................60
Allowing Access to CONFIGURATION Mode Commands..........................................................60
Allowing Access to the Following Modes.................................................................................... 60
Applying a Privilege Level to a Username.................................................................................... 62
Applying a Privilege Level to a Terminal Line...............................................................................62
Configuring Logging...........................................................................................................................62
Audit and Security Logs.................................................................................................................63
Configuring Logging Format ...................................................................................................... 65
Display the Logging Buffer and the Logging Configuration........................................................65
Setting Up a Secure Connection to a Syslog Server....................................................................66
Log Messages in the Internal Buffer................................................................................................... 67
Configuration Task List for System Log Management.................................................................67
Disabling System Logging...................................................................................................................67
Sending System Messages to a Syslog Server................................................................................... 68
Configuring a UNIX System as a Syslog Server............................................................................68
Changing System Logging Settings................................................................................................... 68
Display the Logging Buffer and the Logging Configuration............................................................. 69
Configuring a UNIX Logging Facility Level.........................................................................................70
Synchronizing Log Messages.............................................................................................................. 71
Enabling Timestamp on Syslog Messages.......................................................................................... 71
File Transfer Services...........................................................................................................................72
Configuration Task List for File Transfer Services........................................................................ 72
Enabling the FTP Server.................................................................................................................72
Configuring FTP Server Parameters..............................................................................................73
Configuring FTP Client Parameters.............................................................................................. 73
Terminal Lines..................................................................................................................................... 74
Denying and Permitting Access to a Terminal Line..................................................................... 74
Configuring Login Authentication for Terminal Lines..................................................................75
Setting Time Out of EXEC Privilege Mode......................................................................................... 76
Using Telnet to get to Another Network Device............................................................................... 76
Lock CONFIGURATION Mode............................................................................................................ 77
Viewing the Configuration Lock Status........................................................................................ 77
Recovering from a Forgotten Password on the S4820T System......................................................78
Recovering from a Forgotten Enable Password on the S4820T.................................................79
Recovering from a Failed Start on the S4820T System.....................................................................80
Restoring the Factory Default Settings.............................................................................................. 80
S4820TMXL Switch....................................................................................................................... 80
Important Points to Remember................................................................................................... 80
Restoring Factory Default Environment Variables....................................................................... 81
5 802.1ag................................................................................................................. 83
Ethernet CFM...................................................................................................................................... 83
Maintenance Domains........................................................................................................................84
Maintenance Points............................................................................................................................ 84
Maintenance End Points..................................................................................................................... 85
Implementation Information..............................................................................................................86
Configuring the CFM.......................................................................................................................... 86
Related Configuration Tasks.........................................................................................................86
Enabling Ethernet CFM.......................................................................................................................86
Creating a Maintenance Domain....................................................................................................... 86
Creating a Maintenance Association..................................................................................................87
Create Maintenance Points.................................................................................................................87
Creating a Maintenance End Point...............................................................................................87
Creating a Maintenance Intermediate Point................................................................................88
Displaying the MP Databases........................................................................................................89
Continuity Check Messages............................................................................................................... 90
Enabling CCM................................................................................................................................ 91
Enabling Cross-Checking..............................................................................................................91
Sending Loopback Messages and Responses....................................................................................91
Sending Linktrace Messages and Responses.....................................................................................92
Caching Link Trace........................................................................................................................92
Enabling CFM SNMP Traps................................................................................................................. 93
Displaying Ethernet CFM Statistics..................................................................................................... 95
6 802.1X...................................................................................................................96
The Port-Authentication Process.......................................................................................................97
EAP over RADIUS...........................................................................................................................99
Configuring 802.1X............................................................................................................................. 99
Related Configuration Tasks.........................................................................................................99
Important Points to Remember....................................................................................................... 100
Enabling 802.1X................................................................................................................................ 100
Configuring Request Identity Re-Transmissions............................................................................. 102
Configuring a Quiet Period after a Failed Authentication......................................................... 102
Forcibly Authorizing or Unauthorizing a Port..................................................................................103
Re-Authenticating a Port..................................................................................................................104
Configuring Timeouts.......................................................................................................................105
Configuring Dynamic VLAN Assignment with Port Authentication................................................106
Guest and Authentication-Fail VLANs.............................................................................................. 107
Configuring a Guest VLAN..........................................................................................................108
Configuring an Authentication-Fail VLAN..................................................................................108
7 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)......................................................................................................110
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..........................................110
Guidelines for Configuring ACL VLAN groups..................................................................................111
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.........................112
Configuring ACL VLAN Groups................................................................................................... 112
Configuring FP Blocks for VLAN Parameters..............................................................................113
Viewing CAM Usage.......................................................................................................................... 114
Allocating FP Blocks for VLAN Processes......................................................................................... 115
8 Access Control Lists (ACLs).............................................................................117
IP Access Control Lists (ACLs)...........................................................................................................118
CAM Usage...................................................................................................................................118
Implementing ACLs on Dell Networking OS..............................................................................120
IP Fragment Handling........................................................................................................................121
IP Fragments ACL Examples........................................................................................................121
Layer 4 ACL Rules Examples....................................................................................................... 122
Configure a Standard IP ACL............................................................................................................ 123
Configuring a Standard IP ACL Filter.......................................................................................... 124
Configure an Extended IP ACL......................................................................................................... 125
Configuring Filters with a Sequence Number............................................................................ 125
Configuring Filters Without a Sequence Number......................................................................126
Configure Layer 2 and Layer 3 ACLs.................................................................................................127
Assign an IP ACL to an Interface.......................................................................................................128
Applying an IP ACL............................................................................................................................128
Counting ACL Hits.......................................................................................................................129
Configure Ingress ACLs.....................................................................................................................129
Configure Egress ACLs......................................................................................................................130
Applying Egress Layer 3 ACLs (Control-Plane)...........................................................................131
IP Prefix Lists...................................................................................................................................... 131
Implementation Information.......................................................................................................132
Configuration Task List for Prefix Lists....................................................................................... 132
ACL Resequencing............................................................................................................................ 136
Resequencing an ACL or Prefix List............................................................................................ 137
Route Maps........................................................................................................................................138
Implementation Information...................................................................................................... 138
Important Points to Remember........................................................................................................138
Configuration Task List for Route Maps..................................................................................... 139
Configuring Match Routes.......................................................................................................... 141
Configuring Set Conditions........................................................................................................ 143
Configure a Route Map for Route Redistribution...................................................................... 144
Configure a Route Map for Route Tagging................................................................................144
Continue Clause..........................................................................................................................145
Logging of ACL Processes................................................................................................................ 145
Guidelines for Configuring ACL Logging................................................................................... 146
Configuring ACL Logging............................................................................................................147
Flow-Based Monitoring Support for ACLs....................................................................................... 147
Behavior of Flow-Based Monitoring.......................................................................................... 148
Enabling Flow-Based Monitoring............................................................................................... 149
9 Bidirectional Forwarding Detection (BFD)...................................................151
How BFD Works.................................................................................................................................151
BFD Packet Format......................................................................................................................152
BFD Sessions................................................................................................................................154
BFD Three-Way Handshake........................................................................................................154
Session State Changes................................................................................................................ 155
Important Points to Remember........................................................................................................156
Configure BFD...................................................................................................................................156
Configure BFD for Physical Ports................................................................................................157
Configure BFD for Static Routes................................................................................................ 160
Configure BFD for OSPF............................................................................................................. 162
Configure BFD for OSPFv3..........................................................................................................165
Configure BFD for IS-IS...............................................................................................................166
Configure BFD for BGP...............................................................................................................169
Configure BFD for VRRP..............................................................................................................176
Configuring Protocol Liveness....................................................................................................179
Troubleshooting BFD.................................................................................................................. 179
10 Border Gateway Protocol IPv4 (BGPv4).....................................................181
Autonomous Systems (AS)................................................................................................................ 181
Sessions and Peers............................................................................................................................183
Establish a Session.......................................................................................................................184
Route Reflectors................................................................................................................................184
BGP Attributes................................................................................................................................... 185
Best Path Selection Criteria........................................................................................................ 186
Weight..........................................................................................................................................188
Local Preference......................................................................................................................... 188
Multi-Exit Discriminators (MEDs)................................................................................................189
Origin...........................................................................................................................................190
AS Path......................................................................................................................................... 191
Next Hop...................................................................................................................................... 191
Multiprotocol BGP.............................................................................................................................192
Implement BGP with Dell Networking OS....................................................................................... 192
Additional Path (Add-Path) Support........................................................................................... 192
Advertise IGP Cost as MED for Redistributed Routes................................................................ 192
Ignore Router-ID for Some Best-Path Calculations..................................................................193
Four-Byte AS Numbers............................................................................................................... 193
AS4 Number Representation...................................................................................................... 194
AS Number Migration..................................................................................................................195
BGP4 Management Information Base (MIB)...............................................................................197
Important Points to Remember..................................................................................................197
Configuration Information................................................................................................................198
BGP Configuration............................................................................................................................198
Enabling BGP...............................................................................................................................199
Configuring AS4 Number Representations............................................................................... 203
Configuring Peer Groups............................................................................................................205
Configuring BGP Fast Fall-Over................................................................................................. 207
Configuring Passive Peering.......................................................................................................209
Maintaining Existing AS Numbers During an AS Migration........................................................210
Allowing an AS Number to Appear in its Own AS Path.............................................................. 211
Enabling Graceful Restart............................................................................................................212
Enabling Neighbor Graceful Restart........................................................................................... 213
Filtering on an AS-Path Attribute................................................................................................ 213
Regular Expressions as Filters..................................................................................................... 215
Redistributing Routes.................................................................................................................. 216
Enabling Additional Paths............................................................................................................217
Configuring IP Community Lists.................................................................................................217
Configuring an IP Extended Community List.............................................................................219
Filtering Routes with Community Lists...................................................................................... 220
Manipulating the COMMUNITY Attribute.................................................................................. 220
Changing MED Attributes........................................................................................................... 222
Changing the LOCAL_PREFERENCE Attribute.......................................................................... 222
Changing the NEXT_HOP Attribute........................................................................................... 223
Changing the WEIGHT Attribute................................................................................................ 224
Enabling Multipath...................................................................................................................... 224
Filtering BGP Routes................................................................................................................... 224
Filtering BGP Routes Using Route Maps.................................................................................... 226
Filtering BGP Routes Using AS-PATH Information.................................................................... 227
Configuring BGP Route Reflectors.............................................................................................227
Aggregating Routes.................................................................................................................... 228
Configuring BGP Confederations.............................................................................................. 229
Enabling Route Flap Dampening................................................................................................229
Changing BGP Timers.................................................................................................................232
Enabling BGP Neighbor Soft-Reconfiguration.......................................................................... 232
Route Map Continue...................................................................................................................234
Enabling MBGP Configurations........................................................................................................234
BGP Regular Expression Optimization.............................................................................................235
Debugging BGP.................................................................................................................................235
Storing Last and Bad PDUs......................................................................................................... 236
Capturing PDUs...........................................................................................................................237
PDU Counters............................................................................................................................. 238
Sample Configurations..................................................................................................................... 239
11 Content Addressable Memory (CAM)......................................................... 245
CAM Allocation................................................................................................................................. 245
Test CAM Usage................................................................................................................................247
View CAM Profiles.............................................................................................................................247
View CAM-ACL Settings................................................................................................................... 248
View CAM Usage...............................................................................................................................250
CAM Optimization.............................................................................................................................251
Troubleshoot CAM Profiling............................................................................................................. 251
CAM Profile Mismatches............................................................................................................. 251
QoS CAM Region Limitation....................................................................................................... 251
12 Control Plane Policing (CoPP)..................................................................... 253
Configure Control Plane Policing.................................................................................................... 254
Configuring CoPP for Protocols.................................................................................................255
Configuring CoPP for CPU Queues........................................................................................... 257
CoPP for OSPFv3 Packets...........................................................................................................258
Configuring CoPP for OSPFv3....................................................................................................261
Show Commands....................................................................................................................... 262
13 Data Center Bridging (DCB)......................................................................... 264
Ethernet Enhancements in Data Center Bridging........................................................................... 264
Priority-Based Flow Control.......................................................................................................265
Enhanced Transmission Selection............................................................................................. 266
Data Center Bridging Exchange Protocol (DCBx)..................................................................... 268
Data Center Bridging in a Traffic Flow.......................................................................................269
Enabling Data Center Bridging.........................................................................................................269
QoS dot1p Traffic Classification and Queue Assignment............................................................... 270
DCB Maps and its Attributes..............................................................................................................271
DCB Map: Configuration Procedure...........................................................................................271
Important Points to Remember.................................................................................................. 271
Applying a DCB Map on a Port................................................................................................... 272
Configuring PFC without a DCB Map.........................................................................................272
Configuring Lossless Queues..................................................................................................... 273
Data Center Bridging: Default Configuration.................................................................................. 274
Configuring PFC and ETS in a DCB Map..........................................................................................274
PFC Configuration Notes............................................................................................................274
PFC Prerequisites and Restrictions.............................................................................................276
ETS Configuration Notes............................................................................................................ 276
ETS Prerequisites and Restrictions..............................................................................................277
Configuring Priority-Based Flow Control.........................................................................................277
Configuring Lossless Queues..................................................................................................... 279
Configure Enhanced Transmission Selection..................................................................................279
ETS Prerequisites and Restrictions.............................................................................................280
Creating an ETS Priority Group.................................................................................................. 280
ETS Operation with DCBx.......................................................................................................... 280
Configuring Bandwidth Allocation for DCBx CIN......................................................................281
Applying DCB Policies in a Switch Stack......................................................................................... 282
Configure a DCBx Operation........................................................................................................... 282
DCBx Operation..........................................................................................................................283
DCBx Port Roles..........................................................................................................................283
DCB Configuration Exchange.................................................................................................... 285
Configuration Source Election...................................................................................................285
Propagation of DCB Information............................................................................................... 286
Auto-Detection and Manual Configuration of the DCBx Version............................................286
Behavior of Tagged Packets....................................................................................................... 287
Configuration Example for DSCP and PFC Priorities.................................................................287
DCBx Example............................................................................................................................ 288
DCBx Prerequisites and Restrictions..........................................................................................289
Configuring DCBx.......................................................................................................................289
Verifying the DCB Configuration..................................................................................................... 293
Using PFC and ETS to Manage Data Center Traffic........................................................................ 305
PFC and ETS Configuration Command Examples.................................................................... 306
Using PFC and ETS to Manage Converged Ethernet Traffic..................................................... 307
Hierarchical Scheduling in ETS Output Policies........................................................................ 307
Priority-Based Flow Control Using Dynamic Buffer Method..........................................................307
Pause and Resume of Traffic......................................................................................................308
Buffer Sizes for Lossless or PFC Packets................................................................................... 308
Configuring the Dynamic Buffer Method........................................................................................309
14 Dynamic Host Configuration Protocol (DHCP)........................................ 311
DHCP Packet Format and Options................................................................................................... 311
Assign an IP Address using DHCP.....................................................................................................313
Implementation Information............................................................................................................ 314
Configure the System to be a DHCP Server.................................................................................... 315
Configuring the Server for Automatic Address Allocation.........................................................315
Specifying a Default Gateway..................................................................................................... 317
Configure a Method of Hostname Resolution........................................................................... 317
Using DNS for Address Resolution..............................................................................................317
Using NetBIOS WINS for Address Resolution.............................................................................317
Creating Manual Binding Entries................................................................................................ 318
Debugging the DHCP Server...................................................................................................... 318
Using DHCP Clear Commands...................................................................................................318
Configure the System to be a Relay Agent...................................................................................... 319
Configure the System to be a DHCP Client.....................................................................................321
DHCP Client Operation with Other Features.............................................................................321
DHCP Client on a Management Interface................................................................................. 322
Configure the System for User Port Stacking (Option 230)............................................................323
Configure Secure DHCP...................................................................................................................323
Option 82.................................................................................................................................... 323
DHCP Snooping..........................................................................................................................324
Drop DHCP Packets on Snooped VLANs Only..........................................................................326
Dynamic ARP Inspection............................................................................................................ 326
Configuring Dynamic ARP Inspection........................................................................................328
Source Address Validation................................................................................................................329
Enabling IP Source Address Validation.......................................................................................329
DHCP MAC Source Address Validation......................................................................................330
Enabling IP+MAC Source Address Validation............................................................................330
Viewing the Number of SAV Dropped Packets.......................................................................... 331
Clearing the Number of SAV Dropped Packets......................................................................... 331
15 Equal Cost Multi-Path (ECMP)..................................................................... 332
ECMP for Flow-Based Affinity.......................................................................................................... 332
Configuring the Hash Algorithm................................................................................................ 332
Enabling Deterministic ECMP Next Hop....................................................................................332
Configuring the Hash Algorithm Seed....................................................................................... 333
Link Bundle Monitoring.....................................................................................................................333
Managing ECMP Group Paths.................................................................................................... 334
Creating an ECMP Group Bundle...............................................................................................335
Modifying the ECMP Group Threshold...................................................................................... 335
16 FCoE Transit.....................................................................................................337
Fibre Channel over Ethernet.............................................................................................................337
Ensure Robustness in a Converged Ethernet Network................................................................... 337
FIP Snooping on Ethernet Bridges................................................................................................... 339
FIP Snooping in a Switch Stack.........................................................................................................341
Using FIP Snooping........................................................................................................................... 341
FIP Snooping Prerequisites......................................................................................................... 341
Important Points to Remember................................................................................................. 342
Enabling the FCoE Transit Feature.............................................................................................342
Enable FIP Snooping on VLANs..................................................................................................343
Configure the FC-MAP Value..................................................................................................... 343
Configure a Port for a Bridge-to-Bridge Link............................................................................343
Configure a Port for a Bridge-to-FCF Link................................................................................ 343
Impact on Other Software Features...........................................................................................343
FIP Snooping Restrictions...........................................................................................................344
Configuring FIP Snooping.......................................................................................................... 344
Displaying FIP Snooping Information.............................................................................................. 345
FCoE Transit Configuration Example............................................................................................... 351
17 Enabling FIPS Cryptography.........................................................................353
Configuration Tasks..........................................................................................................................353
Preparing the System........................................................................................................................353
Enabling FIPS Mode.......................................................................................................................... 354
Generating Host-Keys...................................................................................................................... 354
Monitoring FIPS Mode Status........................................................................................................... 355
Disabling FIPS Mode......................................................................................................................... 355
18 Force10 Resilient Ring Protocol (FRRP)..................................................... 357
Protocol Overview............................................................................................................................ 357
Ring Status...................................................................................................................................358
Multiple FRRP Rings.................................................................................................................... 359
Important FRRP Points................................................................................................................359
Important FRRP Concepts..........................................................................................................359
Implementing FRRP...........................................................................................................................361
FRRP Configuration...........................................................................................................................361
Creating the FRRP Group............................................................................................................361
Configuring the Control VLAN................................................................................................... 362
Configuring and Adding the Member VLANs.............................................................................363
Setting the FRRP Timers............................................................................................................. 364
Clearing the FRRP Counters.......................................................................................................365
Viewing the FRRP Configuration................................................................................................365
Viewing the FRRP Information................................................................................................... 365
Troubleshooting FRRP......................................................................................................................366
Configuration Checks.................................................................................................................366
Sample Configuration and Topology...............................................................................................366
19 GARP VLAN Registration Protocol (GVRP)................................................368
Important Points to Remember....................................................................................................... 368
Configure GVRP................................................................................................................................369
Related Configuration Tasks...................................................................................................... 369
Enabling GVRP Globally....................................................................................................................370
Enabling GVRP on a Layer 2 Interface............................................................................................. 370
Configure GVRP Registration........................................................................................................... 370
Configure a GARP Timer................................................................................................................... 371
RPM Redundancy..............................................................................................................................372
20 High Availability (HA).....................................................................................373
Component Redundancy................................................................................................................. 373
RPM Redundancy........................................................................................................................ 373
Automatic and Manual Stack Unit Failover................................................................................ 375
Support for RPM Redundancy by Dell Networking OS Version................................................376
Synchronization between Management and Standby Units..................................................... 376
Configuring RPM Redundancy................................................................................................... 376
Online Insertion and Removal..........................................................................................................378
RPM Online Insertion and Removal........................................................................................... 378
Linecard Online Insertion and Removal.....................................................................................378
Hitless Behavior.................................................................................................................................379
Graceful Restart................................................................................................................................380
Software Resiliency.......................................................................................................................... 380
Software Component Health Monitoring..................................................................................380
System Health Monitoring.......................................................................................................... 381
Failure and Event Logging...........................................................................................................381
Hot-Lock Behavior........................................................................................................................... 382
Process Restartability........................................................................................................................382
Enabling Process Restartability...................................................................................................382
21 Internet Group Management Protocol (IGMP).........................................384
IGMP Implementation Information..................................................................................................384
IGMP Protocol Overview..................................................................................................................384
IGMP Version 2........................................................................................................................... 384
IGMP Version 3............................................................................................................................386
Configure IGMP................................................................................................................................ 389
Related Configuration Tasks...................................................................................................... 389
Viewing IGMP Enabled Interfaces....................................................................................................390
Selecting an IGMP Version...............................................................................................................390
Viewing IGMP Groups.......................................................................................................................391
Adjusting Timers................................................................................................................................391
Adjusting Query and Response Timers...................................................................................... 391
Adjusting the IGMP Querier Timeout Value...............................................................................392
Configuring a Static IGMP Group.....................................................................................................392
Enabling IGMP Immediate-Leave.....................................................................................................393
IGMP Snooping.................................................................................................................................393
IGMP Snooping Implementation Information........................................................................... 393
Configuring IGMP Snooping...................................................................................................... 393
Removing a Group-Port Association.........................................................................................394
Disabling Multicast Flooding...................................................................................................... 394
Specifying a Port as Connected to a Multicast Router..............................................................395
Configuring the Switch as Querier.............................................................................................395
Fast Convergence after MSTP Topology Changes......................................................................... 396
Egress Interface Selection (EIS) for HTTP and IGMP Applications..................................................396
Protocol Separation.................................................................................................................... 397
Enabling and Disabling Management Egress Interface Selection.............................................398
Handling of Management Route Configuration........................................................................399
Handling of Switch-Initiated Traffic...........................................................................................399
Handling of Switch-Destined Traffic......................................................................................... 400
Handling of Transit Traffic (Traffic Separation)..........................................................................401
Mapping of Management Applications and Traffic Type...........................................................401
Behavior of Various Applications for Switch-Initiated Traffic ..................................................402
Behavior of Various Applications for Switch-Destined Traffic .................................................403
Interworking of EIS With Various Applications.......................................................................... 404
Designating a Multicast Router Interface........................................................................................ 405
22 Interfaces.........................................................................................................406
Basic Interface Configuration.......................................................................................................... 406
Advanced Interface Configuration.................................................................................................. 406
Interface Types................................................................................................................................. 407
View Basic Interface Information.....................................................................................................407
Enabling a Physical Interface........................................................................................................... 409
Physical Interfaces............................................................................................................................409
Configuration Task List for Physical Interfaces..........................................................................410
Overview of Layer Modes........................................................................................................... 410
Configuring Layer 2 (Data Link) Mode........................................................................................410
Configuring Layer 2 (Interface) Mode.........................................................................................411
Configuring Layer 3 (Network) Mode......................................................................................... 411
Configuring Layer 3 (Interface) Mode........................................................................................ 412
Egress Interface Selection (EIS)........................................................................................................ 412
Important Points to Remember..................................................................................................413
Configuring EIS............................................................................................................................413
Management Interfaces.................................................................................................................... 413
Configuring Management Interfaces..........................................................................................413
Configuring Management Interfaces on the S-Series............................................................... 414
VLAN Interfaces.................................................................................................................................415
Loopback Interfaces......................................................................................................................... 416
Null Interfaces................................................................................................................................... 416
Port Channel Interfaces....................................................................................................................416
Port Channel Definition and Standards...................................................................................... 417
Port Channel Benefits..................................................................................................................417
Port Channel Implementation.................................................................................................... 417
10/100/1000 Mbps Interfaces in Port Channels........................................................................418
Configuration Tasks for Port Channel Interfaces...................................................................... 418
Creating a Port Channel............................................................................................................. 418
Adding a Physical Interface to a Port Channel...........................................................................419
Reassigning an Interface to a New Port Channel...................................................................... 421
Configuring the Minimum Oper Up Links in a Port Channel....................................................422
..................................................................................................................................................... 422
Assigning an IP Address to a Port Channel................................................................................423
Deleting or Disabling a Port Channel.........................................................................................423
Load Balancing Through Port Channels....................................................................................423
Load-Balancing Method.............................................................................................................423
Changing the Hash Algorithm....................................................................................................424
Bulk Configuration............................................................................................................................425
Interface Range...........................................................................................................................425
Bulk Configuration Examples..................................................................................................... 426
Defining Interface Range Macros.....................................................................................................427
Define the Interface Range.........................................................................................................428
Choosing an Interface-Range Macro........................................................................................ 428
Monitoring and Maintaining Interfaces............................................................................................428
Maintenance Using TDR............................................................................................................. 429
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 430
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................ 431
Important Points to Remember..................................................................................................431
Support for LM4 Optics.............................................................................................................. 432
Example Scenarios......................................................................................................................432
Link Dampening................................................................................................................................436
Important Points to Remember................................................................................................. 436
Enabling Link Dampening...........................................................................................................436
Link Bundle Monitoring.................................................................................................................... 438
Using Ethernet Pause Frames for Flow Control.............................................................................. 438
Enabling Pause Frames...............................................................................................................439
Configure the MTU Size on an Interface.........................................................................................440
Port-Pipes..........................................................................................................................................441
Auto-Negotiation on Ethernet Interfaces........................................................................................ 441
Setting the Speed and Duplex Mode of Ethernet Interfaces.....................................................441
Set Auto-Negotiation Options................................................................................................... 443
View Advanced Interface Information.............................................................................................444
Configuring the Interface Sampling Size...................................................................................444
Dynamic Counters............................................................................................................................446
Clearing Interface Counters.......................................................................................................446
Enhanced Validation of Interface Ranges........................................................................................447
Compressing Configuration Files.....................................................................................................447
23 Internet Protocol Security (IPSec)...............................................................451
Configuring IPSec ............................................................................................................................ 452
24 IPv4 Routing................................................................................................... 453
IP Addresses...................................................................................................................................... 453
Implementation Information...................................................................................................... 453
Configuration Tasks for IP Addresses.............................................................................................. 453
Assigning IP Addresses to an Interface............................................................................................ 454
Configuring Static Routes.................................................................................................................455
Configure Static Routes for the Management Interface.................................................................456
IPv4 Path MTU Discovery Overview.................................................................................................457
Using the Configured Source IP Address in ICMP Messages..........................................................458
Configuring the ICMP Source Interface.....................................................................................458
Configuring the Duration to Establish a TCP Connection..............................................................458
Enabling Directed Broadcast............................................................................................................459
Resolution of Host Names............................................................................................................... 459
Enabling Dynamic Resolution of Host Names................................................................................ 459
Specifying the Local System Domain and a List of Domains......................................................... 460
Configuring DNS with Traceroute...................................................................................................460
ARP.....................................................................................................................................................461
Configuration Tasks for ARP............................................................................................................ 462
Configuring Static ARP Entries.........................................................................................................462
Enabling Proxy ARP...........................................................................................................................463
Clearing ARP Cache..........................................................................................................................463
ARP Learning via Gratuitous ARP..................................................................................................... 463
Enabling ARP Learning via Gratuitous ARP......................................................................................464
ARP Learning via ARP Request.........................................................................................................464
Configuring ARP Retries................................................................................................................... 465
ICMP..................................................................................................................................................466
Configuration Tasks for ICMP..........................................................................................................466
Enabling ICMP Unreachable Messages........................................................................................... 466
UDP Helper....................................................................................................................................... 466
Configure UDP Helper................................................................................................................466
Important Points to Remember................................................................................................. 467
Enabling UDP Helper........................................................................................................................ 467
Configuring a Broadcast Address.....................................................................................................467
Configurations Using UDP Helper................................................................................................... 468
UDP Helper with Broadcast-All Addresses......................................................................................468
UDP Helper with Subnet Broadcast Addresses............................................................................... 469
UDP Helper with Configured Broadcast Addresses........................................................................ 470
UDP Helper with No Configured Broadcast Addresses.................................................................. 470
Troubleshooting UDP Helper...........................................................................................................470
25 IPv6 Routing....................................................................................................472
Protocol Overview............................................................................................................................ 472
Extended Address Space.............................................................................................................472
Stateless Autoconfiguration........................................................................................................472
IPv6 Headers................................................................................................................................473
IPv6 Header Fields.......................................................................................................................474
Extension Header Fields..............................................................................................................475
Addressing...................................................................................................................................476
Implementing IPv6 with Dell Networking OS..................................................................................478
ICMPv6..............................................................................................................................................480
Path MTU Discovery.........................................................................................................................480
IPv6 Neighbor Discovery.................................................................................................................. 481
IPv6 Neighbor Discovery of MTU Packets.................................................................................482
Configuration Task List for IPv6 RDNSS.......................................................................................... 482
Configuring the IPv6 Recursive DNS Server.............................................................................. 482
Debugging IPv6 RDNSS Information Sent to the Host ............................................................ 483
Displaying IPv6 RDNSS Information...........................................................................................484
Secure Shell (SSH) Over an IPv6 Transport......................................................................................485
Configuration Tasks for IPv6............................................................................................................485
Adjusting Your CAM-Profile....................................................................................................... 485
Assigning an IPv6 Address to an Interface.................................................................................486
Assigning a Static IPv6 Route..................................................................................................... 486
Configuring Telnet with IPv6......................................................................................................487
SNMP over IPv6...........................................................................................................................487
Showing IPv6 Information..........................................................................................................488
Showing an IPv6 Interface..........................................................................................................488
Showing IPv6 Routes..................................................................................................................489
Showing the Running-Configuration for an Interface..............................................................490
Clearing IPv6 Routes...................................................................................................................491
26 iSCSI Optimization.........................................................................................492
iSCSI Optimization Overview........................................................................................................... 492
Monitoring iSCSI Traffic Flows................................................................................................... 494
Application of Quality of Service to iSCSI Traffic Flows............................................................494
Information Monitored in iSCSI Traffic Flows............................................................................494
Detection and Auto-Configuration for Dell EqualLogic Arrays................................................ 495
Configuring Detection and Ports for Dell Compellent Arrays..................................................496
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................496
Enable and Disable iSCSI Optimization..................................................................................... 496
Default iSCSI Optimization Values................................................................................................... 497
iSCSI Optimization Prerequisites..................................................................................................... 498
Configuring iSCSI Optimization.......................................................................................................498
Displaying iSCSI Optimization Information.....................................................................................500
27 Intermediate System to Intermediate System.......................................... 502
IS-IS Protocol Overview................................................................................................................... 502
IS-IS Addressing................................................................................................................................502
Multi-Topology IS-IS........................................................................................................................ 503
Transition Mode..........................................................................................................................504
Interface Support........................................................................................................................504
Adjacencies................................................................................................................................. 504
Graceful Restart................................................................................................................................504
Timers..........................................................................................................................................505
Implementation Information............................................................................................................505
Configuration Information............................................................................................................... 506
Configuration Tasks for IS-IS..................................................................................................... 506
Configuring the Distance of a Route..........................................................................................515
Changing the IS-Type................................................................................................................. 515
Redistributing IPv4 Routes..........................................................................................................518
Redistributing IPv6 Routes.......................................................................................................... 519
Configuring Authentication Passwords..................................................................................... 520
Setting the Overload Bit..............................................................................................................520
Debugging IS-IS...........................................................................................................................521
IS-IS Metric Styles............................................................................................................................. 522
Configure Metric Values................................................................................................................... 522
Maximum Values in the Routing Table.......................................................................................523
Change the IS-IS Metric Style in One Level Only...................................................................... 523
Leaks from One Level to Another...............................................................................................525
Sample Configurations..................................................................................................................... 525
28 Link Aggregation Control Protocol (LACP)...............................................528
Introduction to Dynamic LAGs and LACP....................................................................................... 528
Important Points to Remember................................................................................................. 528
LACP Modes................................................................................................................................ 529
Configuring LACP Commands................................................................................................... 529
LACP Configuration Tasks................................................................................................................530
Creating a LAG............................................................................................................................ 530
Configuring the LAG Interfaces as Dynamic.............................................................................. 531
Setting the LACP Long Timeout................................................................................................. 531
Monitoring and Debugging LACP...............................................................................................532
Shared LAG State Tracking............................................................................................................... 532
Configuring Shared LAG State Tracking.....................................................................................533
Important Points about Shared LAG State Tracking..................................................................534
LACP Basic Configuration Example................................................................................................. 535
Configure a LAG on ALPHA........................................................................................................ 535
29 Layer 2..............................................................................................................543
Manage the MAC Address Table...................................................................................................... 543
Clearing the MAC Address Table................................................................................................543
Setting the Aging Time for Dynamic Entries..............................................................................543
Configuring a Static MAC Address............................................................................................. 544
Displaying the MAC Address Table............................................................................................ 544
MAC Learning Limit.......................................................................................................................... 544
Setting the MAC Learning Limit..................................................................................................545
mac learning-limit Dynamic.......................................................................................................545
mac learning-limit mac-address-sticky.....................................................................................546
mac learning-limit station-move............................................................................................... 546
mac learning-limit no-station-move.........................................................................................546
Learning Limit Violation Actions.................................................................................................547
Setting Station Move Violation Actions...................................................................................... 547
Recovering from Learning Limit and Station Move Violations..................................................548
NIC Teaming.....................................................................................................................................548
Configure Redundant Pairs.............................................................................................................. 549
Important Points about Configuring Redundant Pairs...............................................................551
Far-End Failure Detection.................................................................................................................552
FEFD State Changes....................................................................................................................553
Configuring FEFD........................................................................................................................554
Enabling FEFD on an Interface................................................................................................... 555
Debugging FEFD......................................................................................................................... 556
30 Link Layer Discovery Protocol (LLDP)........................................................558
802.1AB (LLDP) Overview.................................................................................................................558
Protocol Data Units.....................................................................................................................558
Optional TLVs....................................................................................................................................559
Management TLVs...................................................................................................................... 559
TIA-1057 (LLDP-MED) Overview...................................................................................................... 561
TIA Organizationally Specific TLVs.............................................................................................562
Configure LLDP.................................................................................................................................566
Related Configuration Tasks...................................................................................................... 566
Important Points to Remember..................................................................................................567
LLDP Compatibility......................................................................................................................567
CONFIGURATION versus INTERFACE Configurations....................................................................567
Enabling LLDP...................................................................................................................................568
Disabling and Undoing LLDP......................................................................................................568
Advertising TLVs................................................................................................................................568
Viewing the LLDP Configuration......................................................................................................569
Viewing Information Advertised by Adjacent LLDP Agents.............................................................570
Configuring LLDPDU Intervals.......................................................................................................... 571
Configuring Transmit and Receive Mode........................................................................................ 572
Configuring a Time to Live............................................................................................................... 573
Debugging LLDP............................................................................................................................... 573
Relevant Management Objects........................................................................................................ 574
31 Microsoft Network Load Balancing............................................................580
NLB Unicast Mode Scenario.............................................................................................................580
NLB Multicast Mode Scenario...........................................................................................................581
Limitations With Enabling NLB on Switches.................................................................................... 581
Benefits and Working of Microsoft Clustering.................................................................................581
Enable and Disable VLAN Flooding .................................................................................................582
Configuring a Switch for NLB ..........................................................................................................582
..................................................................................................................................................... 582
32 Multicast Source Discovery Protocol (MSDP)...........................................583
Protocol Overview............................................................................................................................583
Anycast RP.........................................................................................................................................585
Implementation Information............................................................................................................585
Configure Multicast Source Discovery Protocol............................................................................. 585
Related Configuration Tasks.......................................................................................................585
Enable MSDP.....................................................................................................................................589
Manage the Source-Active Cache...................................................................................................590
Viewing the Source-Active Cache............................................................................................. 590
Limiting the Source-Active Cache..............................................................................................591
Clearing the Source-Active Cache............................................................................................. 591
Enabling the Rejected Source-Active Cache............................................................................. 591
Accept Source-Active Messages that Fail the RFP Check...............................................................591
/