Force10 Z9000

Dell Force10 Z9000 Administrator Guide

  • Hello! I am an AI chatbot trained to assist you with the Dell Force10 Z9000 Administrator Guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the Z9000
System
9.6(0.0)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 09
Rev. A00
Contents
1 About this Guide..................................................................................................31
Audience.............................................................................................................................................. 31
Conventions.........................................................................................................................................31
Related Documents.............................................................................................................................31
2 Configuration Fundamentals........................................................................... 32
Accessing the Command Line............................................................................................................32
CLI Modes............................................................................................................................................32
Navigating CLI Modes................................................................................................................... 34
The do Command............................................................................................................................... 37
Undoing Commands...........................................................................................................................38
Obtaining Help.................................................................................................................................... 39
Entering and Editing Commands....................................................................................................... 39
Command History.............................................................................................................................. 40
Filtering show Command Outputs.....................................................................................................40
Multiple Users in Configuration Mode............................................................................................... 42
3 Getting Started....................................................................................................43
Console Access...................................................................................................................................43
Serial Console................................................................................................................................43
Accessing the CLI Interface and Running Scripts Using SSH............................................................44
Z9000 ........................................................................................................................................... 44
Entering CLI commands Using an SSH Connection....................................................................45
Executing Local CLI Scripts Using an SSH Connection...............................................................45
Default Configuration......................................................................................................................... 46
Configuring a Host Name...................................................................................................................46
Accessing the System Remotely........................................................................................................ 46
Accessing the System Remotely...................................................................................................46
Configure the Management Port IP Address............................................................................... 46
Configure a Management Route.................................................................................................. 47
Configuring a Username and Password.......................................................................................47
Configuring the Enable Password...................................................................................................... 47
Configuration File Management.........................................................................................................48
Copy Files to and from the System.............................................................................................. 48
Save the Running-Configuration..................................................................................................49
Configure the Overload Bit for a Startup Scenario......................................................................50
Viewing Files..................................................................................................................................50
Managing the File System....................................................................................................................51
Enabling Software Features on Devices Using a Command Option................................................ 52
View Command History......................................................................................................................53
Upgrading Dell Networking OS.......................................................................................................... 53
Using HTTP for File Transfers............................................................................................................. 54
Using Hashes to Validate Software Images........................................................................................54
4 Management........................................................................................................56
Configuring Privilege Levels............................................................................................................... 56
Creating a Custom Privilege Level................................................................................................56
Removing a Command from EXEC Mode................................................................................... 56
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 57
Allowing Access to CONFIGURATION Mode Commands...........................................................57
Allowing Access to the Following Modes.....................................................................................57
Applying a Privilege Level to a Username.................................................................................... 59
Applying a Privilege Level to a Terminal Line...............................................................................59
Configuring Logging...........................................................................................................................59
Audit and Security Logs................................................................................................................ 60
Configuring Logging Format ...................................................................................................... 62
Setting Up a Secure Connection to a Syslog Server....................................................................62
Log Messages in the Internal Buffer...................................................................................................63
Configuration Task List for System Log Management.................................................................63
Disabling System Logging...................................................................................................................63
Sending System Messages to a Syslog Server................................................................................... 64
Configuring a UNIX System as a Syslog Server............................................................................64
Changing System Logging Settings................................................................................................... 64
Display the Logging Buffer and the Logging Configuration............................................................. 65
Configuring a UNIX Logging Facility Level.........................................................................................66
Synchronizing Log Messages..............................................................................................................67
Enabling Timestamp on Syslog Messages..........................................................................................67
File Transfer Services.......................................................................................................................... 68
Configuration Task List for File Transfer Services........................................................................68
Enabling the FTP Server................................................................................................................ 68
Configuring FTP Server Parameters............................................................................................. 69
Configuring FTP Client Parameters..............................................................................................69
Terminal Lines..................................................................................................................................... 70
Denying and Permitting Access to a Terminal Line.....................................................................70
Configuring Login Authentication for Terminal Lines..................................................................71
Setting Time Out of EXEC Privilege Mode..........................................................................................72
Using Telnet to get to Another Network Device................................................................................72
Lock CONFIGURATION Mode............................................................................................................73
Viewing the Configuration Lock Status........................................................................................ 73
Recovering from a Forgotten Password on the Z9000 System........................................................74
Recovering from a Forgotten Enable Password on the Z9000...................................................75
Recovering from a Failed Start on the Z9000 System.......................................................................76
Restoring the Factory Default Settings...............................................................................................77
Z9000MXL Switch..........................................................................................................................77
Important Points to Remember.................................................................................................... 77
Restoring Factory Default Environment Variables........................................................................77
5 802.1X...................................................................................................................80
The Port-Authentication Process....................................................................................................... 81
EAP over RADIUS...........................................................................................................................83
Configuring 802.1X............................................................................................................................. 83
Related Configuration Tasks.........................................................................................................83
Important Points to Remember......................................................................................................... 84
Enabling 802.1X...................................................................................................................................84
Configuring Request Identity Re-Transmissions...............................................................................86
Configuring a Quiet Period after a Failed Authentication........................................................... 86
Forcibly Authorizing or Unauthorizing a Port.................................................................................... 87
Re-Authenticating a Port....................................................................................................................88
Configuring Timeouts.........................................................................................................................89
Configuring Dynamic VLAN Assignment with Port Authentication..................................................90
Guest and Authentication-Fail VLANs................................................................................................ 91
Configuring a Guest VLAN............................................................................................................92
Configuring an Authentication-Fail VLAN....................................................................................92
6 Access Control Lists (ACLs).............................................................................. 94
IP Access Control Lists (ACLs)............................................................................................................ 95
CAM Usage.................................................................................................................................... 95
Implementing ACLs on Dell Networking OS................................................................................97
IP Fragment Handling......................................................................................................................... 98
IP Fragments ACL Examples......................................................................................................... 98
Layer 4 ACL Rules Examples.........................................................................................................99
Configure a Standard IP ACL............................................................................................................100
Configuring a Standard IP ACL Filter.......................................................................................... 101
Configure an Extended IP ACL......................................................................................................... 102
Configuring Filters with a Sequence Number............................................................................102
Configuring Filters Without a Sequence Number......................................................................103
Configure Layer 2 and Layer 3 ACLs................................................................................................104
Assign an IP ACL to an Interface...................................................................................................... 105
Applying an IP ACL............................................................................................................................105
Counting ACL Hits.......................................................................................................................106
Configure Ingress ACLs.................................................................................................................... 106
Configure Egress ACLs......................................................................................................................107
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................... 108
IP Prefix Lists..................................................................................................................................... 108
Implementation Information...................................................................................................... 109
Configuration Task List for Prefix Lists....................................................................................... 109
ACL Resequencing.............................................................................................................................113
Resequencing an ACL or Prefix List............................................................................................ 114
Route Maps........................................................................................................................................ 115
Implementation Information.......................................................................................................115
Important Points to Remember........................................................................................................ 115
Configuration Task List for Route Maps......................................................................................116
Configuring Match Routes.......................................................................................................... 118
Configuring Set Conditions........................................................................................................ 120
Configure a Route Map for Route Redistribution.......................................................................121
Configure a Route Map for Route Tagging................................................................................ 121
Continue Clause..........................................................................................................................122
Logging of ACL Processes................................................................................................................ 122
Guidelines for Configuring ACL Logging......................................................................................... 123
Configuring ACL Logging................................................................................................................. 124
Flow-Based Monitoring Support for ACLs....................................................................................... 124
Behavior of Flow-Based Monitoring...........................................................................................125
Enabling Flow-Based Monitoring..................................................................................................... 126
7 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)......................................................................................................128
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................... 128
Guidelines for Configuring ACL VLAN groups.................................................................................129
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters........................130
Configuring ACL VLAN Groups...................................................................................................130
Configuring FP Blocks for VLAN Parameters..............................................................................131
Viewing CAM Usage.......................................................................................................................... 132
Allocating FP Blocks for VLAN Processes.........................................................................................133
8 Bidirectional Forwarding Detection (BFD)...................................................135
How BFD Works................................................................................................................................ 135
BFD Packet Format......................................................................................................................136
BFD Sessions................................................................................................................................138
BFD Three-Way Handshake........................................................................................................138
Session State Changes................................................................................................................ 139
Important Points to Remember....................................................................................................... 140
Configure BFD...................................................................................................................................140
Configure BFD for Physical Ports................................................................................................141
Configure BFD for Static Routes.................................................................................................144
Configure BFD for OSPF............................................................................................................. 146
Configure BFD for OSPFv3......................................................................................................... 149
Configure BFD for IS-IS...............................................................................................................150
Configure BFD for BGP............................................................................................................... 153
Configure BFD for VRRP............................................................................................................. 160
Configuring Protocol Liveness....................................................................................................163
Troubleshooting BFD.................................................................................................................. 163
9 Border Gateway Protocol IPv4 (BGPv4).......................................................165
Autonomous Systems (AS)................................................................................................................165
Sessions and Peers............................................................................................................................ 167
Establish a Session.......................................................................................................................168
Route Reflectors................................................................................................................................168
BGP Attributes................................................................................................................................... 169
Best Path Selection Criteria.........................................................................................................170
Weight.......................................................................................................................................... 172
Local Preference..........................................................................................................................172
Multi-Exit Discriminators (MEDs)................................................................................................ 173
Origin........................................................................................................................................... 174
AS Path......................................................................................................................................... 175
Next Hop......................................................................................................................................175
Multiprotocol BGP.............................................................................................................................176
Implement BGP with Dell Networking OS....................................................................................... 176
Additional Path (Add-Path) Support............................................................................................176
Advertise IGP Cost as MED for Redistributed Routes................................................................ 176
Ignore Router-ID for Some Best-Path Calculations.................................................................. 177
Four-Byte AS Numbers................................................................................................................177
AS4 Number Representation.......................................................................................................178
AS Number Migration.................................................................................................................. 179
BGP4 Management Information Base (MIB)...............................................................................181
Important Points to Remember.................................................................................................. 181
Configuration Information................................................................................................................182
BGP Configuration............................................................................................................................ 182
Enabling BGP...............................................................................................................................183
Configuring AS4 Number Representations................................................................................ 187
Configuring Peer Groups............................................................................................................189
Configuring BGP Fast Fall-Over..................................................................................................191
Configuring Passive Peering....................................................................................................... 193
Maintaining Existing AS Numbers During an AS Migration........................................................194
Allowing an AS Number to Appear in its Own AS Path..............................................................195
Enabling Graceful Restart........................................................................................................... 196
Enabling Neighbor Graceful Restart........................................................................................... 197
Filtering on an AS-Path Attribute................................................................................................ 197
Regular Expressions as Filters..................................................................................................... 199
Redistributing Routes................................................................................................................. 200
Enabling Additional Paths........................................................................................................... 201
Configuring IP Community Lists.................................................................................................201
Configuring an IP Extended Community List............................................................................ 203
Filtering Routes with Community Lists......................................................................................204
Manipulating the COMMUNITY Attribute.................................................................................. 204
Changing MED Attributes...........................................................................................................206
Changing the LOCAL_PREFERENCE Attribute..........................................................................206
Changing the NEXT_HOP Attribute........................................................................................... 207
Changing the WEIGHT Attribute................................................................................................208
Enabling Multipath......................................................................................................................208
Filtering BGP Routes...................................................................................................................208
Filtering BGP Routes Using Route Maps.................................................................................... 210
Filtering BGP Routes Using AS-PATH Information.....................................................................211
Configuring BGP Route Reflectors............................................................................................. 211
Aggregating Routes.....................................................................................................................212
Configuring BGP Confederations...............................................................................................213
Enabling Route Flap Dampening................................................................................................ 213
Changing BGP Timers.................................................................................................................216
Enabling BGP Neighbor Soft-Reconfiguration.......................................................................... 216
Route Map Continue...................................................................................................................218
Enabling MBGP Configurations........................................................................................................ 218
BGP Regular Expression Optimization............................................................................................. 219
Debugging BGP.................................................................................................................................219
Storing Last and Bad PDUs.........................................................................................................220
Capturing PDUs........................................................................................................................... 221
PDU Counters............................................................................................................................. 222
Sample Configurations..................................................................................................................... 223
10 Content Addressable Memory (CAM).........................................................229
CAM Allocation................................................................................................................................. 229
Test CAM Usage................................................................................................................................ 231
View CAM Profiles............................................................................................................................. 231
View CAM-ACL Settings................................................................................................................... 232
View CAM Usage...............................................................................................................................234
CAM Optimization.............................................................................................................................235
Troubleshoot CAM Profiling.............................................................................................................235
CAM Profile Mismatches.............................................................................................................235
QoS CAM Region Limitation.......................................................................................................235
11 Control Plane Policing (CoPP)......................................................................237
Configure Control Plane Policing.................................................................................................... 238
Configuring CoPP for Protocols................................................................................................ 239
Configuring CoPP for CPU Queues........................................................................................... 241
CoPP for OSPFv3 Packets...........................................................................................................242
Configuring CoPP for OSPFv3....................................................................................................245
Show Commands....................................................................................................................... 246
12 Dynamic Host Configuration Protocol (DHCP)........................................248
DHCP Packet Format and Options.................................................................................................. 248
Assign an IP Address using DHCP....................................................................................................250
Implementation Information............................................................................................................ 251
Configure the System to be a DHCP Server.................................................................................... 252
Configuring the Server for Automatic Address Allocation........................................................ 252
Specifying a Default Gateway.....................................................................................................254
Configure a Method of Hostname Resolution.......................................................................... 254
Using DNS for Address Resolution.............................................................................................254
Using NetBIOS WINS for Address Resolution............................................................................ 254
Creating Manual Binding Entries................................................................................................ 255
Debugging the DHCP Server......................................................................................................255
Using DHCP Clear Commands...................................................................................................255
Configure the System to be a Relay Agent......................................................................................256
Configure the System to be a DHCP Client.................................................................................... 258
DHCP Client on a Management Interface................................................................................. 258
DHCP Client Operation with Other Features............................................................................ 259
Configure the System for User Port Stacking (Option 230)........................................................... 260
Configure Secure DHCP.................................................................................................................. 260
Option 82....................................................................................................................................260
DHCP Snooping.......................................................................................................................... 261
Drop DHCP Packets on Snooped VLANs Only..........................................................................263
Dynamic ARP Inspection............................................................................................................ 263
Configuring Dynamic ARP Inspection........................................................................................265
Source Address Validation................................................................................................................266
Enabling IP Source Address Validation...................................................................................... 266
DHCP MAC Source Address Validation......................................................................................267
Enabling IP+MAC Source Address Validation............................................................................ 267
Viewing the Number of SAV Dropped Packets..........................................................................268
Clearing the Number of SAV Dropped Packets.........................................................................268
13 Equal Cost Multi-Path (ECMP)..................................................................... 269
ECMP for Flow-Based Affinity..........................................................................................................269
Configuring the Hash Algorithm................................................................................................ 269
Enabling Deterministic ECMP Next Hop....................................................................................269
Configuring the Hash Algorithm Seed....................................................................................... 270
Link Bundle Monitoring.................................................................................................................... 270
Managing ECMP Group Paths.....................................................................................................271
Creating an ECMP Group Bundle...............................................................................................272
Modifying the ECMP Group Threshold...................................................................................... 272
14 Enabling FIPS Cryptography........................................................................ 274
Configuration Tasks..........................................................................................................................274
Preparing the System........................................................................................................................274
Enabling FIPS Mode.......................................................................................................................... 275
Generating Host-Keys.......................................................................................................................275
Monitoring FIPS Mode Status........................................................................................................... 276
Disabling FIPS Mode......................................................................................................................... 276
15 Force10 Resilient Ring Protocol (FRRP)..................................................... 278
Protocol Overview............................................................................................................................ 278
Ring Status...................................................................................................................................279
Multiple FRRP Rings....................................................................................................................280
Important FRRP Points............................................................................................................... 280
Important FRRP Concepts..........................................................................................................280
Implementing FRRP.......................................................................................................................... 282
FRRP Configuration.......................................................................................................................... 282
Creating the FRRP Group........................................................................................................... 282
Configuring the Control VLAN................................................................................................... 283
Configuring and Adding the Member VLANs............................................................................ 284
Setting the FRRP Timers............................................................................................................. 285
Clearing the FRRP Counters.......................................................................................................286
Viewing the FRRP Configuration................................................................................................286
Viewing the FRRP Information................................................................................................... 286
Troubleshooting FRRP......................................................................................................................287
Configuration Checks.................................................................................................................287
Sample Configuration and Topology...............................................................................................287
16 GARP VLAN Registration Protocol (GVRP)................................................289
Important Points to Remember....................................................................................................... 289
Configure GVRP................................................................................................................................290
Related Configuration Tasks...................................................................................................... 290
Enabling GVRP Globally....................................................................................................................291
Enabling GVRP on a Layer 2 Interface..............................................................................................291
Configure GVRP Registration........................................................................................................... 291
Configure a GARP Timer.................................................................................................................. 292
17 Internet Group Management Protocol (IGMP).........................................294
IGMP Implementation Information..................................................................................................294
IGMP Protocol Overview..................................................................................................................294
IGMP Version 2............................................................................................................................294
IGMP Version 3............................................................................................................................296
Configure IGMP................................................................................................................................ 299
Related Configuration Tasks...................................................................................................... 299
Viewing IGMP Enabled Interfaces....................................................................................................300
Selecting an IGMP Version...............................................................................................................300
Viewing IGMP Groups.......................................................................................................................301
Adjusting Timers................................................................................................................................301
Adjusting Query and Response Timers...................................................................................... 301
Adjusting the IGMP Querier Timeout Value...............................................................................302
Configuring a Static IGMP Group.................................................................................................... 302
Enabling IGMP Immediate-Leave.................................................................................................... 303
IGMP Snooping.................................................................................................................................303
IGMP Snooping Implementation Information...........................................................................303
Configuring IGMP Snooping...................................................................................................... 303
Removing a Group-Port Association.........................................................................................304
Disabling Multicast Flooding...................................................................................................... 304
Specifying a Port as Connected to a Multicast Router..............................................................305
Configuring the Switch as Querier.............................................................................................305
Fast Convergence after MSTP Topology Changes......................................................................... 306
Egress Interface Selection (EIS) for HTTP and IGMP Applications................................................. 306
Protocol Separation.................................................................................................................... 307
Enabling and Disabling Management Egress Interface Selection............................................ 308
Handling of Management Route Configuration........................................................................309
Handling of Switch-Initiated Traffic...........................................................................................309
Handling of Switch-Destined Traffic..........................................................................................310
Handling of Transit Traffic (Traffic Separation)...........................................................................311
Mapping of Management Applications and Traffic Type........................................................... 311
Behavior of Various Applications for Switch-Initiated Traffic ...................................................312
Behavior of Various Applications for Switch-Destined Traffic ................................................. 313
Interworking of EIS With Various Applications...........................................................................314
Designating a Multicast Router Interface......................................................................................... 315
18 Interfaces......................................................................................................... 316
Basic Interface Configuration...........................................................................................................316
Advanced Interface Configuration................................................................................................... 316
Interface Types.................................................................................................................................. 317
View Basic Interface Information......................................................................................................317
Enabling a Physical Interface............................................................................................................ 319
Physical Interfaces.............................................................................................................................319
Configuration Task List for Physical Interfaces..........................................................................320
Overview of Layer Modes...........................................................................................................320
Configuring Layer 2 (Data Link) Mode....................................................................................... 320
Configuring Layer 2 (Interface) Mode.........................................................................................321
Configuring Layer 3 (Network) Mode......................................................................................... 321
Configuring Layer 3 (Interface) Mode........................................................................................ 322
Egress Interface Selection (EIS)........................................................................................................ 322
Important Points to Remember..................................................................................................323
Configuring EIS........................................................................................................................... 323
Management Interfaces....................................................................................................................323
Configuring Management Interfaces......................................................................................... 323
Configuring Management Interfaces on the S-Series...............................................................324
VLAN Interfaces.................................................................................................................................325
Loopback Interfaces......................................................................................................................... 326
Null Interfaces...................................................................................................................................326
Port Channel Interfaces....................................................................................................................326
Port Channel Definition and Standards......................................................................................327
Port Channel Benefits................................................................................................................. 327
Port Channel Implementation.................................................................................................... 327
10/100/1000 Mbps Interfaces in Port Channels........................................................................328
Configuration Tasks for Port Channel Interfaces...................................................................... 328
Creating a Port Channel............................................................................................................. 329
Adding a Physical Interface to a Port Channel.......................................................................... 329
Reassigning an Interface to a New Port Channel...................................................................... 331
Configuring the Minimum Oper Up Links in a Port Channel.................................................... 332
..................................................................................................................................................... 332
Assigning an IP Address to a Port Channel................................................................................ 333
Deleting or Disabling a Port Channel.........................................................................................333
Load Balancing Through Port Channels.................................................................................... 333
Load-Balancing Method.............................................................................................................334
Changing the Hash Algorithm....................................................................................................334
Bulk Configuration............................................................................................................................336
Interface Range...........................................................................................................................336
Bulk Configuration Examples..................................................................................................... 336
Defining Interface Range Macros.....................................................................................................338
Define the Interface Range.........................................................................................................338
Choosing an Interface-Range Macro........................................................................................ 338
Monitoring and Maintaining Interfaces............................................................................................339
Maintenance Using TDR.............................................................................................................340
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 340
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................ 341
Important Points to Remember................................................................................................. 342
Support for LM4 Optics.............................................................................................................. 342
Example Scenarios......................................................................................................................342
Link Dampening................................................................................................................................346
Important Points to Remember..................................................................................................347
Enabling Link Dampening...........................................................................................................347
Link Bundle Monitoring.................................................................................................................... 348
Using Ethernet Pause Frames for Flow Control.............................................................................. 349
Enabling Pause Frames...............................................................................................................350
Configure the MTU Size on an Interface......................................................................................... 350
Port-Pipes..........................................................................................................................................351
Auto-Negotiation on Ethernet Interfaces........................................................................................ 351
Setting the Speed and Duplex Mode of Ethernet Interfaces.....................................................352
Set Auto-Negotiation Options....................................................................................................353
View Advanced Interface Information............................................................................................. 354
Configuring the Interface Sampling Size................................................................................... 355
Dynamic Counters............................................................................................................................356
Clearing Interface Counters....................................................................................................... 356
Enhanced Validation of Interface Ranges........................................................................................ 357
19 Internet Protocol Security (IPSec)...............................................................358
Configuring IPSec ............................................................................................................................ 359
20 IPv4 Routing................................................................................................... 360
IP Addresses......................................................................................................................................360
Implementation Information......................................................................................................360
Configuration Tasks for IP Addresses.............................................................................................. 360
Assigning IP Addresses to an Interface.............................................................................................361
Configuring Static Routes.................................................................................................................362
Configure Static Routes for the Management Interface.................................................................363
IPv4 Path MTU Discovery Overview.................................................................................................364
Using the Configured Source IP Address in ICMP Messages..........................................................365
Configuring the ICMP Source Interface.....................................................................................365
Configuring the Duration to Establish a TCP Connection..............................................................365
Enabling Directed Broadcast............................................................................................................366
Resolution of Host Names............................................................................................................... 366
Enabling Dynamic Resolution of Host Names................................................................................ 366
Specifying the Local System Domain and a List of Domains..........................................................367
Configuring DNS with Traceroute....................................................................................................367
ARP.................................................................................................................................................... 368
Configuration Tasks for ARP............................................................................................................ 369
Configuring Static ARP Entries......................................................................................................... 369
Enabling Proxy ARP...........................................................................................................................369
Clearing ARP Cache..........................................................................................................................370
ARP Learning via Gratuitous ARP..................................................................................................... 370
Enabling ARP Learning via Gratuitous ARP.......................................................................................371
ARP Learning via ARP Request..........................................................................................................371
Configuring ARP Retries....................................................................................................................372
ICMP.................................................................................................................................................. 373
Configuration Tasks for ICMP...........................................................................................................373
Enabling ICMP Unreachable Messages............................................................................................373
UDP Helper........................................................................................................................................373
Configure UDP Helper................................................................................................................ 373
Important Points to Remember..................................................................................................374
Enabling UDP Helper........................................................................................................................ 374
Configuring a Broadcast Address.....................................................................................................374
Configurations Using UDP Helper....................................................................................................375
UDP Helper with Broadcast-All Addresses...................................................................................... 375
UDP Helper with Subnet Broadcast Addresses................................................................................376
UDP Helper with Configured Broadcast Addresses.........................................................................377
UDP Helper with No Configured Broadcast Addresses...................................................................377
Troubleshooting UDP Helper........................................................................................................... 377
21 IPv6 Routing.................................................................................................... 379
Protocol Overview............................................................................................................................ 379
Extended Address Space.............................................................................................................379
Stateless Autoconfiguration........................................................................................................379
IPv6 Headers............................................................................................................................... 380
IPv6 Header Fields.......................................................................................................................381
Extension Header Fields..............................................................................................................382
Addressing...................................................................................................................................383
Implementing IPv6 with Dell Networking OS..................................................................................385
ICMPv6.............................................................................................................................................. 387
Path MTU Discovery..........................................................................................................................387
IPv6 Neighbor Discovery..................................................................................................................388
IPv6 Neighbor Discovery of MTU Packets.................................................................................389
Configuration Task List for IPv6 RDNSS.......................................................................................... 389
Configuring the IPv6 Recursive DNS Server.............................................................................. 389
Debugging IPv6 RDNSS Information Sent to the Host ............................................................ 390
Displaying IPv6 RDNSS Information........................................................................................... 391
Secure Shell (SSH) Over an IPv6 Transport......................................................................................392
Configuration Tasks for IPv6............................................................................................................ 392
Adjusting Your CAM-Profile........................................................................................................392
Assigning an IPv6 Address to an Interface.................................................................................393
Assigning a Static IPv6 Route..................................................................................................... 393
Configuring Telnet with IPv6......................................................................................................394
SNMP over IPv6...........................................................................................................................394
Showing IPv6 Information.......................................................................................................... 395
Showing an IPv6 Interface..........................................................................................................395
Showing IPv6 Routes..................................................................................................................396
Showing the Running-Configuration for an Interface.............................................................. 397
Clearing IPv6 Routes...................................................................................................................398
22 Intermediate System to Intermediate System..........................................399
IS-IS Protocol Overview................................................................................................................... 399
IS-IS Addressing................................................................................................................................399
Multi-Topology IS-IS........................................................................................................................400
Transition Mode.......................................................................................................................... 401
Interface Support........................................................................................................................ 401
Adjacencies..................................................................................................................................401
Graceful Restart................................................................................................................................ 401
Timers..........................................................................................................................................402
Implementation Information............................................................................................................402
Configuration Information............................................................................................................... 403
Configuration Tasks for IS-IS..................................................................................................... 403
Configuring the Distance of a Route..........................................................................................412
Changing the IS-Type................................................................................................................. 412
Redistributing IPv4 Routes..........................................................................................................415
Redistributing IPv6 Routes..........................................................................................................416
Configuring Authentication Passwords......................................................................................417
Setting the Overload Bit.............................................................................................................. 417
Debugging IS-IS.......................................................................................................................... 418
IS-IS Metric Styles..............................................................................................................................419
Configure Metric Values................................................................................................................... 419
Maximum Values in the Routing Table...................................................................................... 420
Change the IS-IS Metric Style in One Level Only......................................................................420
Leaks from One Level to Another.............................................................................................. 422
Sample Configurations..................................................................................................................... 422
23 Link Aggregation Control Protocol (LACP)...............................................425
Introduction to Dynamic LAGs and LACP....................................................................................... 425
Important Points to Remember................................................................................................. 425
LACP Modes................................................................................................................................426
Configuring LACP Commands...................................................................................................426
LACP Configuration Tasks................................................................................................................ 427
Creating a LAG............................................................................................................................ 427
Configuring the LAG Interfaces as Dynamic............................................................................. 428
Setting the LACP Long Timeout.................................................................................................428
Monitoring and Debugging LACP.............................................................................................. 429
Shared LAG State Tracking...............................................................................................................429
Configuring Shared LAG State Tracking.................................................................................... 430
Important Points about Shared LAG State Tracking.................................................................. 431
LACP Basic Configuration Example................................................................................................. 432
Configure a LAG on ALPHA........................................................................................................ 432
Setting Up a Threshold for Utilization of High-Gigabit Port Channels.......................................... 439
Guidelines for Monitoring High-Gigabit Port Channels............................................................441
Enabling the Verification of Member Links Utilization in a High-Gigabit Port Channel................442
Viewing Buffer Utilization and Queue Statistics on High-Gigabit Ethernet Backplane Ports....... 442
24 Layer 2............................................................................................................. 444
Manage the MAC Address Table......................................................................................................444
Clearing the MAC Address Table............................................................................................... 444
Setting the Aging Time for Dynamic Entries..............................................................................444
Configuring a Static MAC Address............................................................................................. 445
Displaying the MAC Address Table............................................................................................ 445
MAC Learning Limit.......................................................................................................................... 445
Setting the MAC Learning Limit................................................................................................. 446
mac learning-limit Dynamic.......................................................................................................446
mac learning-limit mac-address-sticky.....................................................................................447
mac learning-limit station-move............................................................................................... 447
mac learning-limit no-station-move.........................................................................................447
Learning Limit Violation Actions................................................................................................ 448
Setting Station Move Violation Actions......................................................................................448
Recovering from Learning Limit and Station Move Violations................................................. 449
NIC Teaming.....................................................................................................................................449
Configure Redundant Pairs...............................................................................................................451
Important Points about Configuring Redundant Pairs..............................................................453
Far-End Failure Detection................................................................................................................ 454
FEFD State Changes....................................................................................................................455
Configuring FEFD........................................................................................................................456
Enabling FEFD on an Interface................................................................................................... 457
Debugging FEFD......................................................................................................................... 458
25 Link Layer Discovery Protocol (LLDP)........................................................460
802.1AB (LLDP) Overview.................................................................................................................460
Protocol Data Units.................................................................................................................... 460
Optional TLVs....................................................................................................................................461
Management TLVs.......................................................................................................................461
TIA-1057 (LLDP-MED) Overview......................................................................................................463
TIA Organizationally Specific TLVs.............................................................................................464
Configure LLDP................................................................................................................................ 468
Related Configuration Tasks...................................................................................................... 468
Important Points to Remember................................................................................................. 469
LLDP Compatibility..................................................................................................................... 469
CONFIGURATION versus INTERFACE Configurations....................................................................469
Enabling LLDP...................................................................................................................................470
Disabling and Undoing LLDP......................................................................................................470
Enabling LLDP on Management Ports............................................................................................. 470
Disabling and Undoing LLDP on Management Ports................................................................470
Advertising TLVs................................................................................................................................ 471
Viewing the LLDP Configuration......................................................................................................472
Viewing Information Advertised by Adjacent LLDP Agents.............................................................473
Configuring LLDPDU Intervals......................................................................................................... 474
Configuring Transmit and Receive Mode........................................................................................ 474
Configuring a Time to Live............................................................................................................... 475
Debugging LLDP...............................................................................................................................476
Relevant Management Objects........................................................................................................ 477
26 Microsoft Network Load Balancing............................................................483
NLB Unicast Mode Scenario.............................................................................................................483
NLB Multicast Mode Scenario..........................................................................................................484
Limitations With Enabling NLB on Switches....................................................................................484
Benefits and Working of Microsoft Clustering................................................................................ 484
Enable and Disable VLAN Flooding .................................................................................................485
Configuring a Switch for NLB ..........................................................................................................485
.....................................................................................................................................................485
27 Multicast Source Discovery Protocol (MSDP)...........................................486
Protocol Overview............................................................................................................................486
Anycast RP........................................................................................................................................ 488
Implementation Information............................................................................................................488
Configure Multicast Source Discovery Protocol.............................................................................488
Related Configuration Tasks...................................................................................................... 488
Enable MSDP.....................................................................................................................................492
Manage the Source-Active Cache...................................................................................................493
Viewing the Source-Active Cache............................................................................................. 493
Limiting the Source-Active Cache.............................................................................................494
Clearing the Source-Active Cache............................................................................................ 494
Enabling the Rejected Source-Active Cache............................................................................ 494
Accept Source-Active Messages that Fail the RFP Check.............................................................. 494
Specifying Source-Active Messages................................................................................................ 498
Limiting the Source-Active Messages from a Peer......................................................................... 499
Preventing MSDP from Caching a Local Source.............................................................................499
Preventing MSDP from Caching a Remote Source........................................................................ 500
Preventing MSDP from Advertising a Local Source.........................................................................501
Logging Changes in Peership States................................................................................................502
Terminating a Peership.....................................................................................................................502
Clearing Peer Statistics..................................................................................................................... 502
Debugging MSDP..............................................................................................................................503
MSDP with Anycast RP..................................................................................................................... 503
Configuring Anycast RP....................................................................................................................505
Reducing Source-Active Message Flooding..............................................................................505
Specifying the RP Address Used in SA Messages.......................................................................505
MSDP Sample Configurations..........................................................................................................508
28 Multiple Spanning Tree Protocol (MSTP)...................................................511
Protocol Overview.............................................................................................................................511
Spanning Tree Variations.................................................................................................................. 512
Implementation Information.......................................................................................................512
Configure Multiple Spanning Tree Protocol.................................................................................... 512
Related Configuration Tasks....................................................................................................... 512
Enable Multiple Spanning Tree Globally...........................................................................................513
Adding and Removing Interfaces......................................................................................................513
Creating Multiple Spanning Tree Instances......................................................................................513
Influencing MSTP Root Selection..................................................................................................... 515
Interoperate with Non-Dell Networking OS Bridges.......................................................................515
Changing the Region Name or Revision..........................................................................................516
Modifying Global Parameters........................................................................................................... 516
Modifying the Interface Parameters................................................................................................. 517
Configuring an EdgePort.................................................................................................................. 518
Flush MAC Addresses after a Topology Change..............................................................................519
MSTP Sample Configurations........................................................................................................... 519
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration............................................................ 520
Debugging and Verifying MSTP Configurations.............................................................................. 523
29 Multicast Features..........................................................................................526
Enabling IP Multicast.........................................................................................................................526
Multicast with ECMP.........................................................................................................................526
Implementation Information............................................................................................................ 527
First Packet Forwarding for Lossless Multicast................................................................................ 528
Multicast Policies.............................................................................................................................. 528
IPv4 Multicast Policies................................................................................................................ 528
30 Open Shortest Path First (OSPFv2 and OSPFv3)...................................... 536
Protocol Overview............................................................................................................................536
Autonomous System (AS) Areas................................................................................................. 536
Area Types................................................................................................................................... 537
Networks and Neighbors............................................................................................................538
Router Types............................................................................................................................... 538
Designated and Backup Designated Routers............................................................................ 540
Link-State Advertisements (LSAs)...............................................................................................540
Router Priority and Cost............................................................................................................. 542
OSPF with Dell Networking OS........................................................................................................542
Graceful Restart.......................................................................................................................... 543
Fast Convergence (OSPFv2, IPv4 Only)..................................................................................... 544
Multi-Process OSPFv2 (IPv4 only)..............................................................................................544
RFC-2328 Compliant OSPF Flooding........................................................................................ 545
OSPF ACK Packing......................................................................................................................546
Setting OSPF Adjacency with Cisco Routers............................................................................. 546
Configuration Information................................................................................................................547
Configuration Task List for OSPFv2 (OSPF for IPv4)..................................................................547
Sample Configurations for OSPFv2..................................................................................................562
Basic OSPFv2 Router Topology..................................................................................................562
OSPF Area 0 — Gl 1/1 and 1/2.................................................................................................... 562
OSPF Area 0 — Gl 3/1 and 3/2....................................................................................................563
OSPF Area 0 — Gl 2/1 and 2/2....................................................................................................563
Configuration Task List for OSPFv3 (OSPF for IPv6)........................................................................563
Enabling IPv6 Unicast Routing................................................................................................... 564
Assigning IPv6 Addresses on an Interface................................................................................. 564
Assigning Area ID on an Interface..............................................................................................564
Assigning OSPFv3 Process ID and Router ID Globally.............................................................. 565
Configuring Stub Areas...............................................................................................................565
Configuring Passive-Interface....................................................................................................566
Redistributing Routes..................................................................................................................566
Configuring a Default Route.......................................................................................................567
Enabling OSPFv3 Graceful Restart..............................................................................................567
OSPFv3 Authentication Using IPsec...........................................................................................569
Troubleshooting OSPFv3............................................................................................................ 577
31 Policy-based Routing (PBR)..........................................................................579
Overview............................................................................................................................................579
Implementing Policy-based Routing with Dell Networking OS......................................................581
Configuration Task List for Policy-based Routing...........................................................................581
PBR Exceptions (Permit)............................................................................................................. 584
Sample Configuration.......................................................................................................................586
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View
Redirect-List GOLD.....................................................................................................................587
32 PIM Sparse-Mode (PIM-SM)......................................................................... 589
Implementation Information............................................................................................................589
Protocol Overview............................................................................................................................589
Requesting Multicast Traffic.......................................................................................................589
Refuse Multicast Traffic.............................................................................................................. 590
Send Multicast Traffic................................................................................................................. 590
Configuring PIM-SM..........................................................................................................................591
Related Configuration Tasks.......................................................................................................591
Enable PIM-SM.................................................................................................................................. 591
Configuring S,G Expiry Timers......................................................................................................... 592
Configuring a Static Rendezvous Point........................................................................................... 593
Overriding Bootstrap Router Updates....................................................................................... 594
Configuring a Designated Router.................................................................................................... 594
Creating Multicast Boundaries and Domains.................................................................................. 595
Enabling PIM-SM Graceful Restart...................................................................................................595
33 PIM Source-Specific Mode (PIM-SSM)....................................................... 596
Implementation Information............................................................................................................596
Important Points to Remember................................................................................................. 596
Configure PIM-SMM......................................................................................................................... 597
Related Configuration Tasks.......................................................................................................597
Enabling PIM-SSM.............................................................................................................................597
Use PIM-SSM with IGMP Version 2 Hosts........................................................................................597
Configuring PIM-SSM with IGMPv2........................................................................................... 598
34 Port Monitoring............................................................................................. 600
Important Points to Remember.......................................................................................................600
Port Monitoring.................................................................................................................................601
Configuring Port Monitoring............................................................................................................602
Enabling Flow-Based Monitoring.................................................................................................... 604
Remote Port Mirroring..................................................................................................................... 605
Remote Port Mirroring Example................................................................................................ 605
Configuring Remote Port Mirroring...........................................................................................606
Displaying Remote-Port Mirroring Configurations...................................................................608
Configuring the Sample Remote Port Mirroring....................................................................... 608
/