OS9

Dell OS9 Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell OS9 Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Networking OS Configuration
Guide for the S5048F–ON System
9.14.2.2
July 2019
Rev. A00
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2018 - 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
Chapter 1: About this Guide......................................................................................................... 31
Audience...............................................................................................................................................................................31
Conventions.........................................................................................................................................................................31
Related Documents........................................................................................................................................................... 31
Chapter 2: Configuration Fundamentals...................................................................................... 32
Accessing the Command Line........................................................................................................................................ 32
CLI Modes........................................................................................................................................................................... 32
Navigating CLI Modes................................................................................................................................................ 34
The do Command.............................................................................................................................................................. 36
Undoing Commands..........................................................................................................................................................37
Obtaining Help....................................................................................................................................................................37
Entering and Editing Commands................................................................................................................................... 38
Command History..............................................................................................................................................................39
Filtering show Command Outputs.................................................................................................................................39
Multiple Users in Configuration Mode..........................................................................................................................40
Configuring alias command..............................................................................................................................................41
Viewing alias configuration........................................................................................................................................ 41
Chapter 3: Getting Started..........................................................................................................43
Console Access..................................................................................................................................................................43
Serial Console............................................................................................................................................................... 43
Micro USB-B Access.................................................................................................................................................. 44
Default Configuration....................................................................................................................................................... 45
Configuring a Host Name................................................................................................................................................ 45
Accessing the System Remotely................................................................................................................................... 45
Configure the Management Port IP Address....................................................................................................... 45
Configure a Management Route..............................................................................................................................46
Configuring a Username and Password................................................................................................................. 46
Configuring the Enable Password................................................................................................................................. 47
Configuration File Management.....................................................................................................................................47
Copy Files to and from the System.........................................................................................................................47
Mounting an NFS File System.................................................................................................................................. 49
Save the Running-Configuration............................................................................................................................. 50
Configure the Overload Bit for a Startup Scenario............................................................................................. 51
Viewing Files..................................................................................................................................................................51
Managing the File System...............................................................................................................................................52
View Command History................................................................................................................................................... 53
Upgrading Dell EMC Networking OS............................................................................................................................54
Using HTTP for File Transfers....................................................................................................................................... 54
Verify Software Images Before Installation................................................................................................................ 54
Chapter 4: Management.............................................................................................................. 56
Configuring Privilege Levels........................................................................................................................................... 56
Contents
Contents 3
Removing a Command from EXEC Mode..............................................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 57
Allowing Access to CONFIGURATION Mode Commands..................................................................................57
Allowing Access to Different Modes.......................................................................................................................57
Applying a Privilege Level to a Username............................................................................................................. 58
Applying a Privilege Level to a Terminal Line....................................................................................................... 58
Configuring Logging......................................................................................................................................................... 59
Audit and Security Logs.............................................................................................................................................59
Configuring Logging Format ..............................................................................................................................61
Setting Up a Secure Connection to a Syslog Server................................................................................. 61
Log Messages in the Internal Buffer............................................................................................................................ 62
Disabling System Logging............................................................................................................................................... 62
Sending System Messages to a Syslog Server.......................................................................................................... 63
Configuring a UNIX System as a Syslog Server...................................................................................................63
Track Login Activity..........................................................................................................................................................63
Restrictions for Tracking Login Activity................................................................................................................ 63
Configuring Login Activity Tracking........................................................................................................................63
Display Login Statistics.............................................................................................................................................. 64
Limit Concurrent Login Sessions...................................................................................................................................65
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 65
Configuring Concurrent Session Limit................................................................................................................... 66
Enabling the System to Clear Existing Sessions..................................................................................................66
Enabling Secured CLI Mode............................................................................................................................................67
Changing System Logging Settings..............................................................................................................................67
Display the Logging Buffer and the Logging Configuration....................................................................................68
Configuring a UNIX Logging Facility Level..................................................................................................................70
Synchronizing Log Messages.......................................................................................................................................... 71
Enabling Timestamp on Syslog Messages................................................................................................................... 72
File Transfer Services.......................................................................................................................................................73
Enabling the FTP Server............................................................................................................................................ 73
Configuring FTP Server Parameters.......................................................................................................................74
Configuring FTP Client Parameters........................................................................................................................ 74
Terminal Lines.....................................................................................................................................................................74
Denying and Permitting Access to a Terminal Line............................................................................................. 75
Configuring Login Authentication for Terminal Lines......................................................................................... 76
Setting Timeout for EXEC Privilege Mode..................................................................................................................76
Using Telnet to get to Another Network Device....................................................................................................... 77
Lock CONFIGURATION Mode........................................................................................................................................77
Reloading the system....................................................................................................................................................... 78
Restoring the Factory Default Settings....................................................................................................................... 79
Restoring Factory Default Environment Variables.............................................................................................. 79
Chapter 5: 802.1X........................................................................................................................ 81
Port-Authentication Process..........................................................................................................................................82
EAP over RADIUS........................................................................................................................................................83
Configuring 802.1X............................................................................................................................................................84
Important Points to Remember..................................................................................................................................... 84
Enabling 802.1X................................................................................................................................................................. 85
Configuring dot1x Profile ................................................................................................................................................86
Configuring the Static MAB and MAB Profile ...........................................................................................................87
4
Contents
Configuring Critical VLAN .............................................................................................................................................. 87
Configuring MAC addresses for a do1x Profile.......................................................................................................... 88
Configuring Request Identity Re-Transmissions........................................................................................................88
Configuring a Quiet Period after a Failed Authentication..................................................................................89
Forcibly Authorizing or Unauthorizing a Port.............................................................................................................90
Re-Authenticating a Port................................................................................................................................................ 90
Configuring Timeouts........................................................................................................................................................91
Configuring Dynamic VLAN Assignment with Port Authentication...................................................................... 92
Guest and Authentication-Fail VLANs......................................................................................................................... 93
Configuring a Guest VLAN........................................................................................................................................ 94
Configuring an Authentication-Fail VLAN............................................................................................................. 94
Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).... 96
Optimizing CAM Utilization During the Attachment of ACLs to VLANs............................................................. 96
Guidelines for Configuring ACL VLAN Groups........................................................................................................... 97
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.......................................... 97
Configuring ACL VLAN Groups................................................................................................................................ 97
Configuring FP Blocks for VLAN Parameters.......................................................................................................98
Viewing CAM Usage......................................................................................................................................................... 99
Allocating FP Blocks for VLAN Processes................................................................................................................. 101
ACL Optimization to Increase Number of Supported IPv4 ACLs........................................................................ 102
Optimizing ACL for More Number of IPv4 ACL Rules...................................................................................... 102
Chapter 7: Access Control Lists (ACLs)..................................................................................... 103
IP Access Control Lists (ACLs)....................................................................................................................................104
CAM Usage................................................................................................................................................................. 104
Implementing ACLs on Dell EMC Networking OS..............................................................................................105
Configure ACL Range Profiles...................................................................................................................................... 107
Important Points to Remember....................................................................................................................................107
Configuration Task List for Route Maps.............................................................................................................. 108
Configuring Match Routes....................................................................................................................................... 110
Configuring Set Conditions....................................................................................................................................... 111
Configure a Route Map for Route Redistribution............................................................................................... 112
Configure a Route Map for Route Tagging.......................................................................................................... 112
Continue Clause.......................................................................................................................................................... 112
IP Fragment Handling...................................................................................................................................................... 113
IP Fragments ACL Examples....................................................................................................................................113
Layer 4 ACL Rules Examples....................................................................................................................................113
Configure a Standard IP ACL........................................................................................................................................ 114
Configuring a Standard IP ACL Filter.................................................................................................................... 115
Configure an Extended IP ACL..................................................................................................................................... 116
Configuring Filters with a Sequence Number......................................................................................................116
Configuring Filters Without a Sequence Number............................................................................................... 119
Configure Layer 2 and Layer 3 ACLs.......................................................................................................................... 120
Assign an IP ACL to an Interface.................................................................................................................................120
Applying an IP ACL...........................................................................................................................................................121
Counting ACL Hits......................................................................................................................................................121
Configure Ingress ACLs..................................................................................................................................................122
Configure Egress ACLs.................................................................................................................................................. 122
Contents
5
Applying Egress Layer 3 ACLs (Control-Plane)..................................................................................................123
Configuring UDF ACL..................................................................................................................................................... 123
IP Prefix Lists....................................................................................................................................................................127
Configuration Task List for Prefix Lists................................................................................................................127
ACL Resequencing.......................................................................................................................................................... 130
Resequencing an ACL or Prefix List.......................................................................................................................131
Route Maps.......................................................................................................................................................................132
Chapter 8: Bidirectional Forwarding Detection (BFD)................................................................ 133
How BFD Works...............................................................................................................................................................133
BFD Packet Format...................................................................................................................................................134
BFD Sessions.............................................................................................................................................................. 135
BFD Three-Way Handshake.................................................................................................................................... 136
Session State Changes............................................................................................................................................. 137
Important Points to Remember.................................................................................................................................... 137
Configure BFD.................................................................................................................................................................. 137
Configure BFD for Physical Ports..........................................................................................................................138
Configure BFD for Static Routes........................................................................................................................... 139
Configure BFD for OSPF..........................................................................................................................................142
Configure BFD for OSPFv3.....................................................................................................................................146
Configure BFD for IS-IS........................................................................................................................................... 149
Configure BFD for BGP.............................................................................................................................................151
Configure BFD for VRRP......................................................................................................................................... 157
Configuring Protocol Liveness................................................................................................................................160
Troubleshooting BFD................................................................................................................................................ 160
Chapter 9: Border Gateway Protocol (BGP)............................................................................... 162
BGP IP version 4 (BGPv4) Overview......................................................................................................................... 162
BGP Autonomous Systems......................................................................................................................................162
AS4 Number Representation.................................................................................................................................. 164
Four-Byte AS Numbers............................................................................................................................................ 166
BGP router ID............................................................................................................................................................. 166
Sessions and Peers....................................................................................................................................................166
Establish a Session.................................................................................................................................................... 166
BGP Attributes for selecting Best Path............................................................................................................... 167
Multiprotocol BGP..................................................................................................................................................... 172
BGP global and address family configuration......................................................................................................173
Implement BGP with Dell EMC Networking OS................................................................................................. 174
Configuration Information........................................................................................................................................ 177
Basic BGP configuration tasks......................................................................................................................................177
Prerequisite for configuring a BGP network....................................................................................................... 177
Restrictions..................................................................................................................................................................178
Enabling BGP.............................................................................................................................................................. 178
Enabling four-byte autonomous system numbers............................................................................................. 180
Changing a BGP router ID....................................................................................................................................... 180
Configuring AS4 Number Representations.......................................................................................................... 181
Configuring a BGP peer............................................................................................................................................182
Example-Configuring BGP routing between peers............................................................................................183
BGP peer group..........................................................................................................................................................184
6
Contents
Advanced BGP configuration tasks............................................................................................................................ 190
Route-refresh and Soft-reconfiguration..............................................................................................................190
Aggregating Routes...................................................................................................................................................193
Filtering BGP...............................................................................................................................................................195
Configuring BGP Fast Fall-Over............................................................................................................................200
Configuring Passive Peering................................................................................................................................... 201
Enabling Graceful Restart....................................................................................................................................... 202
Redistributing Routes...............................................................................................................................................203
Enabling Additional Paths........................................................................................................................................204
Configuring IP Community Lists............................................................................................................................204
Configuring an IP Extended Community List..................................................................................................... 205
Configure BGP attributes....................................................................................................................................... 206
Enabling Multipath.....................................................................................................................................................210
Route Reflectors........................................................................................................................................................210
Enabling Route Flap Dampening.............................................................................................................................212
Changing BGP keepalive and hold timers............................................................................................................ 214
Setting the extended timer..................................................................................................................................... 214
Enabling or disabling BGP neighbors.....................................................................................................................215
Route Map Continue................................................................................................................................................. 216
Configuring BGP Confederations...........................................................................................................................217
Configuring a BGP VRF address family................................................................................................................ 217
Maintaining Existing AS Numbers During an AS Migration..............................................................................218
Allowing an AS Number to Appear in its Own AS Path.................................................................................... 219
Enabling MBGP Configurations............................................................................................................................. 220
MBGP support for IPv6...........................................................................................................................................220
Configuring IPv6 MBGP between peers............................................................................................................. 220
Example-Configuring IPv4 and IPv6 neighbors.................................................................................................. 221
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor...................................223
BGP Regular Expression Optimization.................................................................................................................225
Debugging BGP......................................................................................................................................................... 225
Chapter 10: Content Addressable Memory (CAM)......................................................................227
CAM Allocation................................................................................................................................................................ 227
Test CAM Usage............................................................................................................................................................. 229
View CAM-ACL Settings...............................................................................................................................................229
View CAM Usage............................................................................................................................................................ 230
CAM Optimization........................................................................................................................................................... 231
Troubleshoot CAM Profiling..........................................................................................................................................231
QoS CAM Region Limitation....................................................................................................................................231
Syslog Error When the Table is Full......................................................................................................................232
Syslog Warning Upon 90 Percent Utilization of CAM......................................................................................232
Syslog Warning for Discrepancies Between Configured Extended Prefixes.............................................. 232
Unified Forwarding Table (UFT) Modes....................................................................................................................232
Configuring UFT Modes.......................................................................................................................................... 232
Chapter 11: Control Plane Policing (CoPP)................................................................................ 234
Configure Control Plane Policing................................................................................................................................ 235
Configuring CoPP for Protocols............................................................................................................................236
Configuring CoPP for CPU Queues...................................................................................................................... 237
Contents
7
Protocol to CPU Queue Mapping..........................................................................................................................238
Configuring Protocol to CPU Queue Mapping...................................................................................................239
Displaying CoPP Configuration .............................................................................................................................240
Chapter 12: Data Center Bridging (DCB)....................................................................................242
Ethernet Enhancements in Data Center Bridging...................................................................................................242
Priority-Based Flow Control................................................................................................................................... 243
Enhanced Transmission Selection.........................................................................................................................244
Data Center Bridging Exchange Protocol (DCBx)............................................................................................245
Data Center Bridging in a Traffic Flow................................................................................................................ 246
Buffer Organization.................................................................................................................................................. 246
Enabling Data Center Bridging.....................................................................................................................................249
DCB Maps and its Attributes................................................................................................................................. 249
Data Center Bridging: Default Configuration...........................................................................................................250
Configuring Priority-Based Flow Control.................................................................................................................. 250
Configuring Lossless Queues.................................................................................................................................. 251
Configuring PFC in a DCB Map................................................................................................................................... 252
Applying a DCB Map on a Port....................................................................................................................................253
Configuring PFC without a DCB Map........................................................................................................................254
Priority-Based Flow Control Using Dynamic Buffer Method............................................................................... 256
Shared headroom for lossless or PFC packets........................................................................................................257
Configuring Shared Head Room Buffer...............................................................................................................258
Viewing Shared Head Room Usage...................................................................................................................... 258
Monitoring Buffer Statistics for Tracking Purposes.........................................................................................259
Behavior of Tagged Packets........................................................................................................................................259
Configuration Example for DSCP and PFC Priorities.............................................................................................259
SNMP Support for PFC and Buffer Statistics Tracking....................................................................................... 260
Performing PFC Using DSCP Bits Instead of 802.1p Bits..................................................................................... 261
PFC and ETS Configuration Examples.......................................................................................................................263
Using PFC to Manage Converged Ethernet Traffic...............................................................................................263
Operations on Untagged Packets...............................................................................................................................263
Generation of PFC for a Priority for Untagged Packets.......................................................................................264
Configure Enhanced Transmission Selection........................................................................................................... 264
Creating an ETS Priority Group............................................................................................................................. 264
ETS Operation with DCBx...................................................................................................................................... 265
Configuring ETS in a DCB Map............................................................................................................................. 265
Hierarchical Scheduling in ETS Output Policies...................................................................................................... 266
Using ETS to Manage Converged Ethernet Traffic................................................................................................267
Applying DCB Policies in a Switch Stack...................................................................................................................267
Configure a DCBx Operation........................................................................................................................................267
DCBx Operation.........................................................................................................................................................268
DCBx Port Roles........................................................................................................................................................268
DCB Configuration Exchange................................................................................................................................ 269
Configuration Source Election............................................................................................................................... 269
Propagation of DCB Information........................................................................................................................... 270
Auto-Detection and Manual Configuration of the DCBx Version..................................................................270
DCBx Example............................................................................................................................................................270
DCBx Prerequisites and Restrictions.................................................................................................................... 271
Configuring DCBx.......................................................................................................................................................271
Verifying the DCB Configuration.................................................................................................................................275
8
Contents
QoS dot1p Traffic Classification and Queue Assignment......................................................................................282
Configuring the Dynamic Buffer Method..................................................................................................................282
Sample DCB Configuration...........................................................................................................................................283
Chapter 13: Dynamic Host Configuration Protocol (DHCP)........................................................ 286
DHCP Packet Format and Options.............................................................................................................................286
Assign an IP Address using DHCP.............................................................................................................................. 287
Implementation Information......................................................................................................................................... 288
Configure the System to be a DHCP Server........................................................................................................... 289
Configuring the Server for Automatic Address Allocation..............................................................................289
Specifying a Default Gateway................................................................................................................................290
Configure a Method of Hostname Resolution.................................................................................................... 291
Using DNS for Address Resolution........................................................................................................................291
Using NetBIOS WINS for Address Resolution.................................................................................................... 291
Creating Manual Binding Entries............................................................................................................................291
Debugging the DHCP Server................................................................................................................................. 292
Using DHCP Clear Commands...............................................................................................................................292
Configure the System to be a DHCP Client............................................................................................................. 292
Configuring the DHCP Client System.................................................................................................................. 292
DHCP Client on a Management Interface...........................................................................................................294
DHCP Client Operation with Other Features.....................................................................................................294
Configuring DHCP relay source interface.................................................................................................................295
Global DHCP relay source IPv4 or IPv6 configuration ....................................................................................295
Interface level DHCP relay source IPv4 or IPv6 configuration .....................................................................295
Configure Secure DHCP............................................................................................................................................... 296
Option 82 (DHCPv4 relay options).......................................................................................................................297
DHCPv6 relay agent options.................................................................................................................................. 297
DHCP Snooping.........................................................................................................................................................298
Drop DHCP Packets on Snooped VLANs Only.................................................................................................. 302
Dynamic ARP Inspection......................................................................................................................................... 302
Configuring Dynamic ARP Inspection.................................................................................................................. 303
Source Address Validation............................................................................................................................................304
Enabling IP Source Address Validation................................................................................................................ 304
DHCP MAC Source Address Validation...............................................................................................................305
Enabling IP+MAC Source Address Validation.................................................................................................... 305
Viewing the Number of SAV Dropped Packets................................................................................................. 306
Clearing the Number of SAV Dropped Packets.................................................................................................306
Chapter 14: Equal Cost Multi-Path (ECMP)............................................................................... 307
ECMP for Flow-Based Affinity.................................................................................................................................... 307
Configuring the Hash Algorithm............................................................................................................................ 307
Enabling Deterministic ECMP Next Hop............................................................................................................. 307
Configuring the Hash Algorithm Seed................................................................................................................. 308
Link Bundle Monitoring..................................................................................................................................................308
Managing ECMP Group Paths...............................................................................................................................309
Creating an ECMP Group Bundle..........................................................................................................................309
Modifying the ECMP Group Threshold................................................................................................................309
Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table...............................310
Support for ECMP in host table.............................................................................................................................310
Contents
9
Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes .................................................................... 310
Chapter 15: FIP Snooping........................................................................................................... 311
Fibre Channel over Ethernet..........................................................................................................................................311
Ensure Robustness in a Converged Ethernet Network.......................................................................................... 311
FIP Snooping on Ethernet Bridges.............................................................................................................................. 312
Using FIP Snooping......................................................................................................................................................... 314
FIP Snooping Prerequisites......................................................................................................................................314
Important Points to Remember..............................................................................................................................314
Enabling the FCoE Transit Feature....................................................................................................................... 316
Enable FIP Snooping on VLANs..............................................................................................................................316
Configure the FC-MAP Value................................................................................................................................. 316
Configure a Port for a Bridge-to-Bridge Link..................................................................................................... 316
Configure a Port for a Bridge-to-FCF Link..........................................................................................................316
Impact on Other Software Features..................................................................................................................... 317
FIP Snooping Restrictions........................................................................................................................................317
Configuring FIP Snooping........................................................................................................................................ 317
Displaying FIP Snooping Information.......................................................................................................................... 318
FCoE Transit Configuration Example......................................................................................................................... 323
Chapter 16: Flex Hash and Optimized Boot-Up...........................................................................325
Flex Hash Capability Overview.................................................................................................................................... 325
Configuring the Flex Hash Mechanism......................................................................................................................325
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................. 326
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces................................................................................. 326
Chapter 17: Force10 Resilient Ring Protocol (FRRP)..................................................................328
Protocol Overview.......................................................................................................................................................... 328
Ring Status................................................................................................................................................................. 329
Multiple FRRP Rings.................................................................................................................................................329
Important FRRP Points............................................................................................................................................330
Important FRRP Concepts...................................................................................................................................... 331
Implementing FRRP.........................................................................................................................................................331
FRRP Configuration........................................................................................................................................................332
Creating the FRRP Group....................................................................................................................................... 332
Configuring the Control VLAN...............................................................................................................................332
Configuring and Adding the Member VLANs..................................................................................................... 333
Setting the FRRP Timers........................................................................................................................................ 334
Clearing the FRRP Counters.................................................................................................................................. 334
Viewing the FRRP Configuration...........................................................................................................................334
Viewing the FRRP Information.............................................................................................................................. 335
Troubleshooting FRRP...................................................................................................................................................335
Sample Configuration and Topology.......................................................................................................................... 335
FRRP Support on VLT................................................................................................................................................... 336
Chapter 18: GARP VLAN Registration Protocol (GVRP)............................................................. 339
Configure GVRP..............................................................................................................................................................340
Enabling GVRP Globally.................................................................................................................................................340
Enabling GVRP on a Layer 2 Interface....................................................................................................................... 341
10
Contents
Configure GVRP Registration.......................................................................................................................................341
Configure a GARP Timer...............................................................................................................................................342
Chapter 19: Internet Group Management Protocol (IGMP)........................................................ 343
IGMP Protocol Overview.............................................................................................................................................. 343
IGMP Version 2..........................................................................................................................................................343
IGMP Version 3..........................................................................................................................................................345
Configure IGMP...............................................................................................................................................................347
Viewing IGMP Enabled Interfaces.............................................................................................................................. 348
Selecting an IGMP Version........................................................................................................................................... 348
Viewing IGMP Groups....................................................................................................................................................349
Adjusting Timers..............................................................................................................................................................349
Adjusting Query and Response Timers................................................................................................................ 349
Enabling IGMP Immediate-Leave................................................................................................................................350
IGMP Snooping............................................................................................................................................................... 350
Configuring IGMP Snooping...................................................................................................................................350
Removing a Group-Port Association.....................................................................................................................351
Disabling Multicast Flooding....................................................................................................................................351
Specifying a Port as Connected to a Multicast Router....................................................................................351
Configuring the Switch as Querier........................................................................................................................352
Fast Convergence after MSTP Topology Changes................................................................................................352
Egress Interface Selection (EIS) for HTTP and IGMP Applications...................................................................352
Designating a Multicast Router Interface................................................................................................................. 359
Chapter 20: Interfaces.............................................................................................................. 360
Interface Types................................................................................................................................................................ 361
View Basic Interface Information.................................................................................................................................361
Resetting an Interface to its Factory Default State...............................................................................................363
Enabling a Physical Interface....................................................................................................................................... 363
Physical Interfaces..........................................................................................................................................................364
Configuration Task List for Physical Interfaces.................................................................................................364
Overview of Layer Modes.......................................................................................................................................364
Configuring Layer 2 (Data Link) Mode................................................................................................................ 365
Configuring Layer 2 (Interface) Mode.................................................................................................................365
Configuring Layer 3 (Network) Mode..................................................................................................................365
Configuring Layer 3 (Interface) Mode.................................................................................................................366
Egress Interface Selection (EIS).................................................................................................................................366
Configuring EIS.......................................................................................................................................................... 367
Management Interfaces................................................................................................................................................ 367
Configuring Management Interfaces....................................................................................................................367
Configuring a Management Interface on an Ethernet Port............................................................................368
VLAN Interfaces..............................................................................................................................................................368
Loopback Interfaces.......................................................................................................................................................369
Null Interfaces..................................................................................................................................................................369
Port Channel Interfaces................................................................................................................................................ 370
Port Channel Definition and Standards................................................................................................................370
Port Channel Benefits..............................................................................................................................................370
Port Channel Implementation.................................................................................................................................370
Interfaces in Port Channels..................................................................................................................................... 371
Contents
11
Configuration Tasks for Port Channel Interfaces.............................................................................................. 371
Creating a Port Channel...........................................................................................................................................371
Adding a Physical Interface to a Port Channel................................................................................................... 371
Reassigning an Interface to a New Port Channel..............................................................................................373
Configuring the Minimum Oper Up Links in a Port Channel........................................................................... 374
Adding or Removing a Port Channel from a VLAN........................................................................................... 374
Assigning an IP Address to a Port Channel.........................................................................................................375
Deleting or Disabling a Port Channel.................................................................................................................... 375
Load Balancing Through Port Channels.............................................................................................................. 375
Load-Balancing Method...........................................................................................................................................376
Changing the Hash Algorithm................................................................................................................................ 376
Bulk Configuration...........................................................................................................................................................377
Interface Range......................................................................................................................................................... 377
Bulk Configuration Examples..................................................................................................................................378
Defining Interface Range Macros............................................................................................................................... 379
Define the Interface Range.....................................................................................................................................379
Choosing an Interface-Range Macro................................................................................................................... 379
Monitoring and Maintaining Interfaces......................................................................................................................380
Maintenance Using TDR...........................................................................................................................................381
Non Dell-Qualified Transceivers...................................................................................................................................381
Splitting 100G Ports....................................................................................................................................................... 382
Link Dampening............................................................................................................................................................... 382
Enabling Link Dampening........................................................................................................................................ 385
Link Bundle Monitoring..................................................................................................................................................386
Using Ethernet Pause Frames for Flow Control......................................................................................................386
Enabling Pause Frames............................................................................................................................................ 387
Configure the MTU Size on an Interface.................................................................................................................. 387
Configuring wavelength for 10–Gigabit SFP+ optics.............................................................................................388
Port-Pipes.........................................................................................................................................................................389
CR4 Auto-Negotiation................................................................................................................................................... 389
Setting the Speed of Ethernet Interfaces................................................................................................................ 389
Speed Setting on 25G Interfaces............................................................................................................................... 390
Configuring 10G speed on 25G ports..........................................................................................................................391
FEC Configuration.......................................................................................................................................................... 392
View Advanced Interface Information....................................................................................................................... 394
Configuring the Interface Sampling Size.............................................................................................................395
Configuring the Traffic Sampling Size Globally....................................................................................................... 396
Dynamic Counters...........................................................................................................................................................397
Clearing Interface Counters....................................................................................................................................397
Enhanced Validation of Interface Ranges.................................................................................................................398
Compressing Configuration Files................................................................................................................................ 398
OUI on 25G and 50G Interfaces................................................................................................................................. 400
Configuring OUI on 25G and 50G Interfaces.....................................................................................................400
Chapter 21: IPv4 Routing...........................................................................................................402
IP Addresses.....................................................................................................................................................................403
Configuration Tasks for IP Addresses........................................................................................................................403
Assigning IP Addresses to an Interface.....................................................................................................................403
Configuring Static Routes............................................................................................................................................ 404
Adding description for IPv4 and IPv6 static routes..........................................................................................405
12
Contents
Configure Static Routes for the Management Interface...................................................................................... 406
Using the Configured Source IP Address in ICMP Messages..............................................................................406
Configuring the Duration to Establish a TCP Connection.................................................................................... 406
Enabling Directed Broadcast........................................................................................................................................ 407
Resolution of Host Names............................................................................................................................................ 407
Enabling Dynamic Resolution of Host Names.......................................................................................................... 407
Specifying the Local System Domain and a List of Domains............................................................................... 408
Configuring DNS with Traceroute.............................................................................................................................. 408
ARP.................................................................................................................................................................................... 409
Configuration Tasks for ARP....................................................................................................................................... 409
Configuring Static ARP Entries................................................................................................................................... 409
Enabling Proxy ARP........................................................................................................................................................ 410
Clearing ARP Cache........................................................................................................................................................410
ARP Learning via Gratuitous ARP............................................................................................................................... 410
Enabling ARP Learning via Gratuitous ARP............................................................................................................... 411
ARP Learning via ARP Request.....................................................................................................................................411
Configuring ARP Retries................................................................................................................................................ 412
ICMP................................................................................................................................................................................... 412
Configuration Tasks for ICMP...................................................................................................................................... 412
Enabling ICMP Unreachable Messages...................................................................................................................... 412
ICMP Redirects................................................................................................................................................................ 413
UDP Helper........................................................................................................................................................................414
Enabling UDP Helper.......................................................................................................................................................414
Configuring a Broadcast Address................................................................................................................................ 414
Configurations Using UDP Helper............................................................................................................................... 415
UDP Helper with Broadcast-All Addresses................................................................................................................415
UDP Helper with Subnet Broadcast Addresses....................................................................................................... 416
UDP Helper with Configured Broadcast Addresses................................................................................................416
UDP Helper with No Configured Broadcast Addresses..........................................................................................417
Troubleshooting UDP Helper.........................................................................................................................................417
Chapter 22: IPv6 Routing...........................................................................................................418
Protocol Overview...........................................................................................................................................................418
Extended Address Space......................................................................................................................................... 418
Path MTU discovery................................................................................................................................................. 418
Stateless Autoconfiguration....................................................................................................................................419
IPv6 Headers..............................................................................................................................................................420
Longest Prefix Match (LPM) Table and IPv6 /65 – /128 support.............................................................. 420
IPv6 Header Fields....................................................................................................................................................420
Extension Header Fields.......................................................................................................................................... 422
Addressing.................................................................................................................................................................. 423
Implementing IPv6 with Dell EMC Networking OS.................................................................................................423
ICMPv6..............................................................................................................................................................................423
Path MTU discovery.......................................................................................................................................................424
IPv6 Neighbor Discovery...............................................................................................................................................424
IPv6 Neighbor Discovery of MTU Packets......................................................................................................... 425
Configuring the IPv6 Recursive DNS Server..................................................................................................... 425
Debugging IPv6 RDNSS Information Sent to the Host .................................................................................. 426
Displaying IPv6 RDNSS Information..................................................................................................................... 426
Secure Shell (SSH) Over an IPv6 Transport............................................................................................................427
Contents
13
Configuration Tasks for IPv6........................................................................................................................................427
Adjusting Your CAM-Profile....................................................................................................................................427
Assigning an IPv6 Address to an Interface......................................................................................................... 428
Assigning a Static IPv6 Route................................................................................................................................428
Configuring Telnet with IPv6................................................................................................................................. 429
SNMP over IPv6........................................................................................................................................................429
Displaying IPv6 Information.................................................................................................................................... 429
Displaying an IPv6 Interface Information............................................................................................................ 430
Showing IPv6 Routes................................................................................................................................................431
Showing the Running-Configuration for an Interface...................................................................................... 432
Clearing IPv6 Routes................................................................................................................................................432
Configuring IPv6 RA Guard.......................................................................................................................................... 432
Chapter 23: iSCSI Optimization.................................................................................................435
iSCSI Optimization Overview....................................................................................................................................... 435
Monitoring iSCSI Traffic Flows..............................................................................................................................436
Application of Quality of Service to iSCSI Traffic Flows................................................................................. 437
Information Monitored in iSCSI Traffic Flows.................................................................................................... 437
Detection and Auto-Configuration for Dell EqualLogic Arrays.......................................................................438
Configuring Detection and Ports for Dell Compellent Arrays.........................................................................438
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.......................................................... 438
Enable and Disable iSCSI Optimization................................................................................................................ 439
Default iSCSI Optimization Values..............................................................................................................................439
iSCSI Optimization Prerequisites................................................................................................................................ 440
Configuring iSCSI Optimization................................................................................................................................... 440
Displaying iSCSI Optimization Information................................................................................................................442
Chapter 24: Intermediate System to Intermediate System.........................................................444
IS-IS Protocol Overview................................................................................................................................................444
IS-IS Addressing.............................................................................................................................................................. 444
Multi-Topology IS-IS...................................................................................................................................................... 445
Transition Mode.........................................................................................................................................................445
Interface Support......................................................................................................................................................445
Adjacencies.................................................................................................................................................................445
Graceful Restart..............................................................................................................................................................446
Timers.......................................................................................................................................................................... 446
Implementation Information......................................................................................................................................... 446
Configuration Information............................................................................................................................................. 447
Configuration Tasks for IS-IS................................................................................................................................. 447
Configuring the Distance of a Route....................................................................................................................454
Changing the IS-Type.............................................................................................................................................. 454
Redistributing IPv4 Routes..................................................................................................................................... 457
Redistributing IPv6 Routes..................................................................................................................................... 457
Configuring Authentication Passwords............................................................................................................... 458
Setting the Overload Bit......................................................................................................................................... 458
Debugging IS-IS.........................................................................................................................................................459
IS-IS Metric Styles..........................................................................................................................................................460
Configure Metric Values............................................................................................................................................... 460
Maximum Values in the Routing Table.................................................................................................................460
14
Contents
Change the IS-IS Metric Style in One Level Only............................................................................................. 460
Leaks from One Level to Another.........................................................................................................................462
Sample Configurations...................................................................................................................................................462
Chapter 25: Link Aggregation Control Protocol (LACP).............................................................465
Introduction to Dynamic LAGs and LACP.................................................................................................................465
Important Points to Remember............................................................................................................................. 465
LACP Modes.............................................................................................................................................................. 466
Configuring LACP Commands............................................................................................................................... 466
LACP Configuration Tasks............................................................................................................................................466
Creating a LAG...........................................................................................................................................................467
Configuring the LAG Interfaces as Dynamic.......................................................................................................467
Setting the LACP Long Timeout........................................................................................................................... 467
Monitoring and Debugging LACP.......................................................................................................................... 468
Shared LAG State Tracking..........................................................................................................................................468
Configuring Shared LAG State Tracking............................................................................................................. 469
Important Points about Shared LAG State Tracking........................................................................................470
LACP Basic Configuration Example.............................................................................................................................471
Configure a LAG on ALPHA.....................................................................................................................................471
Chapter 26: Layer 2................................................................................................................... 479
Manage the MAC Address Table.................................................................................................................................479
Clearing the MAC Address Table.......................................................................................................................... 479
Setting the Aging Time for Dynamic Entries...................................................................................................... 479
Configuring a Static MAC Address.......................................................................................................................480
Displaying the MAC Address Table.......................................................................................................................480
MAC Learning Limit........................................................................................................................................................480
Setting the MAC Learning Limit.............................................................................................................................481
mac learning-limit Dynamic......................................................................................................................................481
mac learning-limit mac-address-sticky................................................................................................................. 481
mac learning-limit station-move.............................................................................................................................481
mac learning-limit no-station-move......................................................................................................................482
Learning Limit Violation Actions............................................................................................................................ 482
Setting Station Move Violation Actions...............................................................................................................482
Recovering from Learning Limit and Station Move Violations.......................................................................483
Disabling MAC Address Learning on the System.................................................................................................... 483
Enabling port security.................................................................................................................................................... 483
NIC Teaming.....................................................................................................................................................................484
Configure Redundant Pairs.......................................................................................................................................... 485
Far-End Failure Detection.............................................................................................................................................488
FEFD State Changes................................................................................................................................................488
Configuring FEFD......................................................................................................................................................489
Enabling FEFD on an Interface.............................................................................................................................. 490
Debugging FEFD........................................................................................................................................................ 491
Chapter 27: Link Layer Discovery Protocol (LLDP).................................................................... 492
802.1AB (LLDP) Overview............................................................................................................................................492
Protocol Data Units.................................................................................................................................................. 492
Optional TLVs.................................................................................................................................................................. 493
Contents
15
Management TLVs....................................................................................................................................................493
TIA-1057 (LLDP-MED) Overview............................................................................................................................... 495
TIA Organizationally Specific TLVs.......................................................................................................................495
Configure LLDP............................................................................................................................................................... 498
CONFIGURATION versus INTERFACE Configurations......................................................................................... 499
Enabling LLDP..................................................................................................................................................................499
Disabling and Undoing LLDP.................................................................................................................................. 500
Enabling LLDP on Management Ports.......................................................................................................................500
Disabling and Undoing LLDP on Management Ports....................................................................................... 500
Advertising TLVs.............................................................................................................................................................500
Viewing the LLDP Configuration................................................................................................................................. 501
Viewing Information Advertised by Adjacent LLDP Neighbors........................................................................... 502
Examples of Viewing Information Advertised by Neighbors...........................................................................502
Configuring LLDPDU Intervals.....................................................................................................................................504
Configuring Transmit and Receive Mode..................................................................................................................504
Configuring the Time to Live Value............................................................................................................................505
Debugging LLDP............................................................................................................................................................. 506
Relevant Management Objects................................................................................................................................... 507
Chapter 28: Microsoft Network Load Balancing.......................................................................... 511
Configuring a Switch for NLB ..................................................................................................................................... 512
Enabling a Switch for Multicast NLB.................................................................................................................... 513
Chapter 29: Multicast Source Discovery Protocol (MSDP).........................................................514
Anycast RP........................................................................................................................................................................515
Implementation Information.......................................................................................................................................... 516
Configure Multicast Source Discovery Protocol......................................................................................................516
Related Configuration Tasks................................................................................................................................... 516
Enable MSDP................................................................................................................................................................... 520
Manage the Source-Active Cache.............................................................................................................................. 521
Viewing the Source-Active Cache.........................................................................................................................521
Limiting the Source-Active Cache.........................................................................................................................521
Clearing the Source-Active Cache........................................................................................................................ 521
Enabling the Rejected Source-Active Cache..................................................................................................... 522
Accept Source-Active Messages that Fail the RFP Check.................................................................................. 522
Specifying Source-Active Messages..........................................................................................................................525
Limiting the Source-Active Messages from a Peer................................................................................................526
Preventing MSDP from Caching a Local Source.................................................................................................... 526
Preventing MSDP from Caching a Remote Source................................................................................................527
Preventing MSDP from Advertising a Local Source...............................................................................................527
Logging Changes in Peership States......................................................................................................................... 528
Terminating a Peership..................................................................................................................................................528
Clearing Peer Statistics.................................................................................................................................................528
Debugging MSDP............................................................................................................................................................529
MSDP with Anycast RP.................................................................................................................................................529
Configuring Anycast RP................................................................................................................................................ 530
Reducing Source-Active Message Flooding........................................................................................................531
Specifying the RP Address Used in SA Messages.............................................................................................531
MSDP Sample Configurations......................................................................................................................................533
16
Contents
Chapter 30: Multicast Listener Discovery Protocol....................................................................536
MLD timers.......................................................................................................................................................................539
Reducing Host Response Burstiness....................................................................................................................539
Configuring MLD Version..............................................................................................................................................540
Clearing MLD groups..................................................................................................................................................... 540
Debugging MLD...............................................................................................................................................................540
Explicit Tracking..............................................................................................................................................................540
Reducing Leave Latency...............................................................................................................................................540
Displaying MLD groups table........................................................................................................................................ 541
Displaying MLD Interfaces.............................................................................................................................................541
MLD Snooping.................................................................................................................................................................. 541
Enable MLD Snooping..............................................................................................................................................542
Disable MLD Snooping............................................................................................................................................. 542
Configure the switch as a querier.........................................................................................................................542
Specify port as connected to multicast router..................................................................................................542
Enable Snooping Explicit Tracking........................................................................................................................ 542
Display the MLD Snooping Table.......................................................................................................................... 543
Chapter 31: Multiple Spanning Tree Protocol (MSTP)................................................................544
Spanning Tree Variations..............................................................................................................................................545
Implementation Information................................................................................................................................... 545
Configure Multiple Spanning Tree Protocol............................................................................................................. 545
Related Configuration Tasks.................................................................................................................................. 545
Enable Multiple Spanning Tree Globally.................................................................................................................... 546
Adding and Removing Interfaces................................................................................................................................ 546
Creating Multiple Spanning Tree Instances..............................................................................................................546
Influencing MSTP Root Selection...............................................................................................................................548
Interoperate with Non-Dell Bridges............................................................................................................................548
Changing the Region Name or Revision....................................................................................................................548
Modifying Global Parameters.......................................................................................................................................549
Modifying the Interface Parameters..........................................................................................................................550
Setting STP path cost as constant.............................................................................................................................551
Configuring an EdgePort............................................................................................................................................... 551
Flush MAC Addresses after a Topology Change.................................................................................................... 552
MSTP Sample Configurations......................................................................................................................................552
Debugging and Verifying MSTP Configurations......................................................................................................556
Chapter 32: Multicast Features................................................................................................. 558
Enabling IP Multicast..................................................................................................................................................... 558
Implementation Information......................................................................................................................................... 558
Multicast Policies............................................................................................................................................................559
IPv4 Multicast Policies.............................................................................................................................................559
Understanding Multicast Traceroute (mtrace)....................................................................................................... 566
Printing Multicast Traceroute (mtrace) Paths........................................................................................................566
Supported Error Codes................................................................................................................................................. 568
mtrace Scenarios............................................................................................................................................................ 569
Chapter 33: Object Tracking......................................................................................................575
Contents
17
Object Tracking Overview............................................................................................................................................ 575
Track Layer 2 Interfaces......................................................................................................................................... 576
Track Layer 3 Interfaces......................................................................................................................................... 576
Track IPv4 and IPv6 Routes...................................................................................................................................576
Set Tracking Delays.................................................................................................................................................. 577
VRRP Object Tracking............................................................................................................................................. 578
Object Tracking Configuration.....................................................................................................................................578
Tracking a Layer 2 Interface...................................................................................................................................578
Tracking a Layer 3 Interface...................................................................................................................................579
Track an IPv4/IPv6 Route...................................................................................................................................... 580
Displaying Tracked Objects.......................................................................................................................................... 583
Chapter 34: Open Shortest Path First (OSPFv2 and OSPFv3)................................................... 586
Protocol Overview..........................................................................................................................................................586
Autonomous System (AS) Areas...........................................................................................................................586
Area Types.................................................................................................................................................................. 587
Networks and Neighbors.........................................................................................................................................588
Router Types..............................................................................................................................................................588
Designated and Backup Designated Routers..................................................................................................... 589
Link-State Advertisements (LSAs).......................................................................................................................589
Router Priority and Cost......................................................................................................................................... 590
OSPF with Dell EMC Networking OS......................................................................................................................... 591
Graceful Restart.........................................................................................................................................................591
Fast Convergence (OSPFv2, IPv4 Only)............................................................................................................ 592
Multi-Process OSPFv2 with VRF..........................................................................................................................593
OSPF ACK Packing...................................................................................................................................................593
Setting OSPF Adjacency with Cisco Routers.................................................................................................... 593
Configuration Information.............................................................................................................................................594
Configuration Task List for OSPFv2 (OSPF for IPv4).....................................................................................594
Configuration Task List for OSPFv3 (OSPF for IPv6).......................................................................................... 606
Enabling IPv6 Unicast Routing...............................................................................................................................607
Assigning IPv6 Addresses on an Interface..........................................................................................................607
Assigning Area ID on an Interface......................................................................................................................... 607
Assigning OSPFv3 Process ID and Router ID Globally.....................................................................................607
Assigning OSPFv3 Process ID and Router ID to a VRF...................................................................................608
Configuring Stub Areas........................................................................................................................................... 608
Configuring Passive-Interface............................................................................................................................... 609
Redistributing Routes.............................................................................................................................................. 609
Configuring a Default Route...................................................................................................................................609
Applying cost for OSPFv3....................................................................................................................................... 610
Enabling OSPFv3 Graceful Restart....................................................................................................................... 610
OSPFv3 Authentication Using IPsec.....................................................................................................................612
Troubleshooting OSPFv3.........................................................................................................................................618
MIB Support for OSPFv3.............................................................................................................................................. 619
Viewing the OSPFv3 MIB........................................................................................................................................ 619
Chapter 35: Policy-based Routing (PBR)...................................................................................620
Overview...........................................................................................................................................................................620
Implementing PBR........................................................................................................................................................... 621
18
Contents
Configuration Task List for Policy-based Routing................................................................................................... 621
Create a Redirect List.............................................................................................................................................. 622
Create a Rule for a Redirect-list............................................................................................................................622
Apply a Redirect-list to an Interface using a Redirect-group.........................................................................624
Sample Configuration.....................................................................................................................................................626
Chapter 36: PIM Sparse-Mode (PIM-SM)..................................................................................630
Implementation Information......................................................................................................................................... 630
Protocol Overview..........................................................................................................................................................630
Requesting Multicast Traffic..................................................................................................................................630
Refuse Multicast Traffic.......................................................................................................................................... 631
Send Multicast Traffic..............................................................................................................................................631
Configuring PIM-SM....................................................................................................................................................... 631
Related Configuration Tasks.................................................................................................................................. 632
Enable PIM-SM................................................................................................................................................................632
Configuring S,G Expiry Timers.....................................................................................................................................633
Configuring a Static Rendezvous Point.....................................................................................................................633
Overriding Bootstrap Router Updates................................................................................................................. 633
Configuring a Designated Router................................................................................................................................634
Creating Multicast Boundaries and Domains........................................................................................................... 635
Electing an RP using the BSR Mechanism............................................................................................................... 635
Chapter 37: PIM Source-Specific Mode (PIM-SSM).................................................................. 637
Implementation Information..........................................................................................................................................637
Configure PIM-SSM....................................................................................................................................................... 637
Enabling PIM-SSM..........................................................................................................................................................638
Use PIM-SSM with IGMP Version 2 Hosts.............................................................................................................. 638
Electing an RP using the BSR Mechanism............................................................................................................... 639
Enabling RP to Server Specific Multicast Groups............................................................................................. 641
Chapter 38: Port Monitoring......................................................................................................642
Important Points to Remember...................................................................................................................................642
Port Monitoring............................................................................................................................................................... 643
Configuring Port Monitoring........................................................................................................................................ 644
Configuring Monitor Multicast Queue....................................................................................................................... 646
Flow-Based Monitoring................................................................................................................................................. 646
Enabling Flow-Based Monitoring...........................................................................................................................647
Remote Port Mirroring.................................................................................................................................................. 649
Remote Port Mirroring Example............................................................................................................................649
Configuring Remote Port Mirroring......................................................................................................................650
Displaying Remote-Port Mirroring Configurations.............................................................................................651
Configuration procedure for Remote Port Mirroring....................................................................................... 652
Encapsulated Remote Port Monitoring..................................................................................................................... 656
ERPM Behavior on a typical Dell EMC Networking OS ....................................................................................... 658
Port Monitoring on VLT................................................................................................................................................ 659
Chapter 39: Private VLANs (PVLAN)......................................................................................... 662
Private VLAN Concepts................................................................................................................................................ 662
Using the Private VLAN Commands.......................................................................................................................... 663
Contents
19
Configuration Task List................................................................................................................................................. 664
Creating PVLAN ports............................................................................................................................................. 664
Creating a Primary VLAN........................................................................................................................................664
Creating a Community VLAN................................................................................................................................. 665
Creating an Isolated VLAN..................................................................................................................................... 666
Private VLAN Configuration Example........................................................................................................................ 667
Inspecting the Private VLAN Configuration............................................................................................................. 668
Chapter 40: Per-VLAN Spanning Tree Plus (PVST+)..................................................................670
Protocol Overview.......................................................................................................................................................... 670
Implementation Information.......................................................................................................................................... 671
Configure Per-VLAN Spanning Tree Plus................................................................................................................. 672
Enabling PVST+...............................................................................................................................................................672
Disabling PVST+.............................................................................................................................................................. 672
Influencing PVST+ Root Selection..............................................................................................................................673
Modifying Global PVST+ Parameters.........................................................................................................................674
Modifying Interface PVST+ Parameters................................................................................................................... 674
Configuring an EdgePort...............................................................................................................................................675
PVST+ in Multi-Vendor Networks.............................................................................................................................. 676
Enabling PVST+ Extend System ID............................................................................................................................ 676
PVST+ Sample Configurations.....................................................................................................................................677
Chapter 41: Quality of Service (QoS)......................................................................................... 679
Implementation Information.......................................................................................................................................... 681
Port-Based QoS Configurations.................................................................................................................................. 681
Setting dot1p Priorities for Incoming Traffic.......................................................................................................681
Honoring dot1p Priorities on Ingress Traffic.......................................................................................................682
Configuring Port-Based Rate Policing................................................................................................................. 682
Configuring Port-Based Rate Shaping.................................................................................................................682
Policy-Based QoS Configurations...............................................................................................................................683
Classify Traffic...........................................................................................................................................................684
Dot1p to Queue Mapping Requirement............................................................................................................... 686
Create a QoS Policy..................................................................................................................................................687
DSCP Color Maps..................................................................................................................................................... 689
Create Policy Maps................................................................................................................................................... 691
Enabling QoS Rate Adjustment................................................................................................................................... 694
Enabling Strict-Priority Queueing............................................................................................................................... 694
Queue Classification Requirements for PFC Functionality...................................................................................695
Support for marking dot1p value in L3 Input Qos Policy.......................................................................................695
Weighted Random Early Detection............................................................................................................................ 696
Enabling and Disabling WRED Globally................................................................................................................ 696
Creating WRED Profiles.......................................................................................................................................... 697
Applying a WRED Profile to Traffic...................................................................................................................... 697
Displaying Default and Configured WRED Profiles........................................................................................... 697
Displaying WRED Drop Statistics.......................................................................................................................... 697
Displaying egress–queue Statistics...................................................................................................................... 698
Pre-Calculating Available QoS CAM Space..............................................................................................................698
Specifying Policy-Based Rate Shaping in Packets Per Second.......................................................................... 699
Configuring Policy-Based Rate Shaping....................................................................................................................700
20
Contents
/