Dell Networking S3100 Series User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell Networking S3100 Series User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Conguration Guide for the S3100
Series
9.14.2.1
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2019 - 06
Rev. A00
Contents
1 About this Guide...........................................................................................................................................35
Audience........................................................................................................................................................................... 35
Conventions......................................................................................................................................................................35
Related Documents......................................................................................................................................................... 35
2 Conguration Fundamentals........................................................................................................................ 36
Accessing the Command Line........................................................................................................................................36
CLI Modes.........................................................................................................................................................................36
Navigating CLI Modes............................................................................................................................................... 38
The do Command............................................................................................................................................................. 41
Undoing Commands.........................................................................................................................................................41
Obtaining Help..................................................................................................................................................................42
Entering and Editing Commands....................................................................................................................................42
Command History............................................................................................................................................................ 43
Filtering show Command Outputs.................................................................................................................................43
Example of the grep Keyword.................................................................................................................................. 43
Multiple Users in Conguration Mode...........................................................................................................................44
3 Getting Started............................................................................................................................................46
Console Access................................................................................................................................................................ 47
Serial Console............................................................................................................................................................. 47
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................48
Entering CLI commands Using an SSH Connection..............................................................................................48
Executing Local CLI Scripts Using an SSH Connection........................................................................................48
Default Conguration...................................................................................................................................................... 49
Conguring a Host Name............................................................................................................................................... 49
Accessing the System Remotely....................................................................................................................................49
Accessing the System Remotely..............................................................................................................................49
Congure the Management Port IP Address......................................................................................................... 49
Congure a Management Route..............................................................................................................................50
Conguring a Username and Password..................................................................................................................50
Conguring the Enable Password...................................................................................................................................51
Conguration File Management......................................................................................................................................51
Copy Files to and from the System......................................................................................................................... 52
Mounting an NFS File System..................................................................................................................................52
Save the Running-Conguration..............................................................................................................................54
Congure the Overload Bit for a Startup Scenario............................................................................................... 55
Viewing Files...............................................................................................................................................................55
Compressing Conguration Files............................................................................................................................. 56
Managing the File System.............................................................................................................................................. 58
Enabling Software Features on Devices Using a Command Option..........................................................................59
View Command History.................................................................................................................................................. 59
Contents
3
Upgrading Dell EMC Networking OS............................................................................................................................ 60
Verify Software Images Before Installation...................................................................................................................60
Using HTTP for File Transfers.........................................................................................................................................61
4 Management................................................................................................................................................62
Conguring Privilege Levels............................................................................................................................................62
Creating a Custom Privilege Level...........................................................................................................................62
Removing a Command from EXEC Mode.............................................................................................................. 63
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................63
Allowing Access to CONFIGURATION Mode Commands....................................................................................63
Allowing Access to Dierent Modes........................................................................................................................63
Applying a Privilege Level to a Username...............................................................................................................65
Applying a Privilege Level to a Terminal Line.......................................................................................................... 65
Conguring Logging........................................................................................................................................................ 65
Audit and Security Logs............................................................................................................................................ 66
Conguring Logging Format ...................................................................................................................................67
Display the Logging Buer and the Logging Conguration..................................................................................68
Setting Up a Secure Connection to a Syslog Server.............................................................................................68
Sending System Messages to a Syslog Server...................................................................................................... 70
Track Login Activity..........................................................................................................................................................70
Restrictions for Tracking Login Activity...................................................................................................................70
Conguring Login Activity Tracking......................................................................................................................... 70
Display Login Statistics...............................................................................................................................................71
Limit Concurrent Login Sessions....................................................................................................................................72
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................72
Conguring Concurrent Session Limit.....................................................................................................................72
Enabling the System to Clear Existing Sessions.................................................................................................... 73
Enabling Secured CLI Mode............................................................................................................................................74
Log Messages in the Internal Buer.............................................................................................................................. 74
Conguration Task List for System Log Management...........................................................................................74
Disabling System Logging................................................................................................................................................74
Sending System Messages to a Syslog Server............................................................................................................ 75
Conguring a UNIX System as a Syslog Server.....................................................................................................75
Changing System Logging Settings...............................................................................................................................75
Display the Logging Buer and the Logging Conguration........................................................................................ 76
Conguring a UNIX Logging Facility Level....................................................................................................................76
Synchronizing Log Messages......................................................................................................................................... 77
Enabling Timestamp on Syslog Messages.................................................................................................................... 78
File Transfer Services.......................................................................................................................................................78
Conguration Task List for File Transfer Services..................................................................................................79
Enabling the FTP Server........................................................................................................................................... 79
Conguring FTP Server Parameters........................................................................................................................79
Conguring FTP Client Parameters.........................................................................................................................80
Terminal Lines...................................................................................................................................................................80
Denying and Permitting Access to a Terminal Line................................................................................................80
Conguring Login Authentication for Terminal Lines..............................................................................................81
4
Contents
Setting Timeout for EXEC Privilege Mode................................................................................................................... 82
Using Telnet to get to Another Network Device..........................................................................................................83
Lock CONFIGURATION Mode....................................................................................................................................... 83
Viewing the Conguration Lock Status...................................................................................................................83
Viewing the Reason for Last System Reboot...............................................................................................................84
5 802.1X......................................................................................................................................................... 85
Port-Authentication Process.......................................................................................................................................... 87
EAP over RADIUS...................................................................................................................................................... 87
Conguring 802.1X...........................................................................................................................................................88
Related Conguration Tasks..................................................................................................................................... 88
Important Points to Remember......................................................................................................................................88
Enabling 802.1X................................................................................................................................................................ 89
Conguring dot1x Prole ................................................................................................................................................90
Conguring MAC addresses for a do1x Prole..............................................................................................................91
Conguring the Static MAB and MAB Prole ..............................................................................................................91
Conguring Critical VLAN ..............................................................................................................................................92
Conguring Request Identity Re-Transmissions...........................................................................................................93
Conguring a Quiet Period after a Failed Authentication..................................................................................... 93
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 94
Re-Authenticating a Port................................................................................................................................................95
Conguring Timeouts......................................................................................................................................................96
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................97
Guest and Authentication-Fail VLANs.......................................................................................................................... 98
Conguring a Guest VLAN....................................................................................................................................... 98
Conguring an Authentication-Fail VLAN...............................................................................................................98
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 100
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 100
Guidelines for Conguring ACL VLAN Groups............................................................................................................ 101
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters............................................... 101
Conguring ACL VLAN Groups...............................................................................................................................101
Conguring FP Blocks for VLAN Parameters.......................................................................................................102
Viewing CAM Usage...................................................................................................................................................... 103
Allocating FP Blocks for VLAN Processes.................................................................................................................. 104
7 Access Control Lists (ACLs)....................................................................................................................... 106
IP Access Control Lists (ACLs)..................................................................................................................................... 107
CAM Usage...............................................................................................................................................................108
Implementing ACLs on Dell EMC Networking OS................................................................................................108
Important Points to Remember.....................................................................................................................................110
Conguration Task List for Route Maps.................................................................................................................110
Conguring Match Routes.......................................................................................................................................112
Conguring Set Conditions......................................................................................................................................114
Congure a Route Map for Route Redistribution..................................................................................................115
Congure a Route Map for Route Tagging............................................................................................................ 115
Contents
5
Continue Clause........................................................................................................................................................ 116
IP Fragment Handling..................................................................................................................................................... 116
IP Fragments ACL Examples................................................................................................................................... 116
Layer 4 ACL Rules Examples....................................................................................................................................117
Congure a Standard IP ACL.........................................................................................................................................117
Conguring a Standard IP ACL Filter......................................................................................................................118
Congure an Extended IP ACL......................................................................................................................................119
Conguring Filters with a Sequence Number........................................................................................................119
Conguring Filters Without a Sequence Number................................................................................................. 121
Congure Layer 2 and Layer 3 ACLs............................................................................................................................ 121
Assign an IP ACL to an Interface..................................................................................................................................122
Applying an IP ACL.........................................................................................................................................................122
Counting ACL Hits....................................................................................................................................................123
Congure Ingress ACLs................................................................................................................................................. 123
Congure Egress ACLs.................................................................................................................................................. 124
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 125
IP Prex Lists.................................................................................................................................................................. 125
Implementation Information.................................................................................................................................... 126
Conguration Task List for Prex Lists.................................................................................................................. 126
ACL Remarks.................................................................................................................................................................. 129
Conguring a Remark.............................................................................................................................................. 129
Deleting a Remark.................................................................................................................................................... 130
ACL Resequencing..........................................................................................................................................................131
Resequencing an ACL or Prex List........................................................................................................................131
Route Maps.....................................................................................................................................................................132
Implementation Information.................................................................................................................................... 132
Logging of ACL Processes............................................................................................................................................ 133
Guidelines for Conguring ACL Logging................................................................................................................134
Conguring ACL Logging.........................................................................................................................................134
Flow-Based Monitoring..................................................................................................................................................135
Behavior of Flow-Based Monitoring.......................................................................................................................135
Enabling Flow-Based Monitoring............................................................................................................................136
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 138
How BFD Works............................................................................................................................................................. 138
BFD Packet Format..................................................................................................................................................139
BFD Sessions............................................................................................................................................................ 140
BFD Three-Way Handshake.....................................................................................................................................141
Session State Changes............................................................................................................................................143
Important Points to Remember.................................................................................................................................... 143
Congure BFD................................................................................................................................................................ 143
Congure BFD for Physical Ports...........................................................................................................................144
Congure BFD for Static Routes............................................................................................................................145
Congure BFD for IPv6 Static Routes...................................................................................................................149
Congure BFD for OSPF..........................................................................................................................................151
Congure BFD for OSPFv3.....................................................................................................................................155
6
Contents
Congure BFD for IS-IS...........................................................................................................................................158
Congure BFD for BGP...........................................................................................................................................160
Congure BFD for VRRP.........................................................................................................................................168
Conguring Protocol Liveness................................................................................................................................ 170
9 Border Gateway Protocol (BGP)................................................................................................................. 171
Border Gateway Protocol version 4 (BGPv4)..............................................................................................................171
Autonomous Systems (AS)......................................................................................................................................171
AS4 Number Representation.................................................................................................................................. 173
Four-Byte AS Numbers............................................................................................................................................175
BGP router ID............................................................................................................................................................175
Sessions and Peers...................................................................................................................................................175
Establish a Session................................................................................................................................................... 176
BGP Attributes for selecting Best Path.................................................................................................................176
Multiprotocol BGP.....................................................................................................................................................181
Implementing BGP global and address family....................................................................................................... 183
Implement BGP with Dell EMC Networking OS...................................................................................................184
Conguration Information........................................................................................................................................187
Conguring a basic BGP network.................................................................................................................................187
Prerequisite for conguring a BGP network..........................................................................................................187
Restrictions............................................................................................................................................................... 188
Enabling BGP............................................................................................................................................................ 188
Enabling four-byte autonomous system numbers................................................................................................190
Changing a BGP router ID........................................................................................................................................191
Conguring AS4 Number Representations........................................................................................................... 192
Conguring a BGP peer...........................................................................................................................................193
Example-Conguring BGP routing between peers.............................................................................................. 194
BGP peer group........................................................................................................................................................195
Advanced BGP conguration tasks.............................................................................................................................204
Route-refresh and Soft-reconguration............................................................................................................... 204
Aggregating Routes................................................................................................................................................. 207
Filtering BGP............................................................................................................................................................ 209
Conguring BGP Fast Fall-Over.............................................................................................................................215
Conguring Passive Peering....................................................................................................................................217
Enabling Graceful Restart........................................................................................................................................218
Redistributing Routes...............................................................................................................................................219
Redistributing iBGP Routes into IGP......................................................................................................................219
Enabling Additional Paths........................................................................................................................................ 221
Conguring IP Community Lists............................................................................................................................ 222
Conguring an IP Extended Community List....................................................................................................... 223
Congure BGP attributes....................................................................................................................................... 224
Enabling Multipath...................................................................................................................................................228
Route Reectors......................................................................................................................................................229
Enabling Route Flap Dampening............................................................................................................................ 230
Changing BGP Timers.............................................................................................................................................232
Setting the extended timer.....................................................................................................................................233
Contents
7
Enabling or disabling BGP neighbors.....................................................................................................................233
Route Map Continue............................................................................................................................................... 234
Conguring BGP Confederations.......................................................................................................................... 235
Conguring a BGP VRF address family................................................................................................................ 236
Maintaining Existing AS Numbers During an AS Migration.................................................................................237
Allowing an AS Number to Appear in its Own AS Path...................................................................................... 238
Enabling MBGP Congurations............................................................................................................................. 239
MBGP support for IPv6..........................................................................................................................................239
Conguring IPv6 MBGP between peers.............................................................................................................. 239
Example-Conguring IPv4 and IPv6 neighbors................................................................................................... 240
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor......................................... 242
BGP Regular Expression Optimization.................................................................................................................. 244
Debugging BGP........................................................................................................................................................244
10 Content Addressable Memory (CAM).......................................................................................................247
CAM Allocation...............................................................................................................................................................247
Test CAM Usage............................................................................................................................................................249
View CAM-ACL Settings.............................................................................................................................................. 249
View CAM Usage............................................................................................................................................................251
Conguring CAM Threshold and Silence Period.........................................................................................................251
Setting CAM Threshold and Silence Period.......................................................................................................... 251
CAM Optimization......................................................................................................................................................... 252
Troubleshoot CAM Proling..........................................................................................................................................253
CAM Prole Mismatches........................................................................................................................................253
QoS CAM Region Limitation...................................................................................................................................253
11 Control Plane Policing (CoPP).................................................................................................................. 254
Congure Control Plane Policing................................................................................................................................. 255
Conguring CoPP for Protocols............................................................................................................................ 256
Conguring CoPP for CPU Queues...................................................................................................................... 258
CoPP for OSPFv3 Packets.....................................................................................................................................259
Conguring CoPP for OSPFv3.............................................................................................................................. 262
Displaying CoPP Conguration ............................................................................................................................. 262
12 Dynamic Host Conguration Protocol (DHCP).........................................................................................265
DHCP Packet Format and Options............................................................................................................................. 265
Assign an IP Address using DHCP............................................................................................................................... 267
Implementation Information..........................................................................................................................................268
Congure the System to be a DHCP Server..............................................................................................................268
Conguring the Server for Automatic Address Allocation..................................................................................269
Specifying a Default Gateway................................................................................................................................ 270
Congure a Method of Hostname Resolution...................................................................................................... 271
Using DNS for Address Resolution.........................................................................................................................271
Using NetBIOS WINS for Address Resolution...................................................................................................... 271
Creating Manual Binding Entries.............................................................................................................................271
Debugging the DHCP Server................................................................................................................................. 272
8
Contents
Using DHCP Clear Commands...............................................................................................................................272
Congure the System to be a Relay Agent.................................................................................................................272
Congure the System to be a DHCP Client................................................................................................................274
Conguring the DHCP Client System....................................................................................................................274
DHCP Client on a Management Interface............................................................................................................ 275
DHCP Client Operation with Other Features....................................................................................................... 276
DHCP Relay When DHCP Server and Client are in Dierent VRFs.........................................................................277
Conguring Route Leaking between VRFs on DHCP Relay Agent....................................................................277
Non-default VRF conguration for DHCPv6 helper address................................................................................... 278
Conguring DHCP relay source interface................................................................................................................... 279
Global DHCP relay source IPv4 or IPv6 conguration ....................................................................................... 279
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................279
Congure the System for User Port Stacking (Option 230).................................................................................... 281
Congure Secure DHCP................................................................................................................................................281
Option 82...................................................................................................................................................................281
DHCPv6 relay agent options.................................................................................................................................. 282
DHCP Snooping....................................................................................................................................................... 282
Drop DHCP Packets on Snooped VLANs Only.................................................................................................... 287
Dynamic ARP Inspection.........................................................................................................................................287
Conguring Dynamic ARP Inspection................................................................................................................... 288
Source Address Validation............................................................................................................................................ 289
Enabling IP Source Address Validation..................................................................................................................289
DHCP MAC Source Address Validation................................................................................................................ 290
Enabling IP+MAC Source Address Validation.......................................................................................................290
Viewing the Number of SAV Dropped Packets.................................................................................................... 291
Clearing the Number of SAV Dropped Packets....................................................................................................291
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 292
ECMP for Flow-Based Anity.....................................................................................................................................292
Conguring the Hash Algorithm............................................................................................................................ 292
Enabling Deterministic ECMP Next Hop.............................................................................................................. 292
Conguring the Hash Algorithm Seed.................................................................................................................. 293
Link Bundle Monitoring................................................................................................................................................. 293
Managing ECMP Group Paths...............................................................................................................................294
Creating an ECMP Group Bundle..........................................................................................................................294
Modifying the ECMP Group Threshold.................................................................................................................294
14 FIPS Cryptography...................................................................................................................................296
Conguration Tasks....................................................................................................................................................... 296
Preparing the System....................................................................................................................................................296
Enabling FIPS Mode...................................................................................................................................................... 297
Generating Host-Keys................................................................................................................................................... 297
Monitoring FIPS Mode Status......................................................................................................................................297
Disabling FIPS Mode..................................................................................................................................................... 298
15 Force10 Resilient Ring Protocol (FRRP)...................................................................................................299
Contents
9
Protocol Overview.........................................................................................................................................................299
Ring Status...............................................................................................................................................................300
Multiple FRRP Rings............................................................................................................................................... 300
Important FRRP Points............................................................................................................................................301
Important FRRP Concepts..................................................................................................................................... 302
Implementing FRRP.......................................................................................................................................................303
FRRP Conguration...................................................................................................................................................... 303
Creating the FRRP Group.......................................................................................................................................303
Conguring the Control VLAN...............................................................................................................................304
Conguring and Adding the Member VLANs...................................................................................................... 305
Setting the FRRP Timers........................................................................................................................................306
Clearing the FRRP Counters..................................................................................................................................306
Viewing the FRRP Conguration...........................................................................................................................306
Viewing the FRRP Information.............................................................................................................................. 306
Troubleshooting FRRP...................................................................................................................................................307
Conguration Checks..............................................................................................................................................307
Sample Conguration and Topology............................................................................................................................ 307
16 GARP VLAN Registration Protocol (GVRP)..............................................................................................309
Important Points to Remember................................................................................................................................... 309
Congure GVRP............................................................................................................................................................. 310
Related Conguration Tasks....................................................................................................................................310
Enabling GVRP Globally..................................................................................................................................................311
Enabling GVRP on a Layer 2 Interface......................................................................................................................... 311
Congure GVRP Registration........................................................................................................................................311
Congure a GARP Timer............................................................................................................................................... 312
RPM Redundancy...........................................................................................................................................................312
17 High Availability (HA)................................................................................................................................ 314
Component Redundancy...............................................................................................................................................314
Automatic and Manual Stack Unit Failover........................................................................................................... 314
Synchronization between Management and Standby Units...............................................................................315
Forcing a Stack Unit Failover.................................................................................................................................. 315
Disabling Auto-Reboot.............................................................................................................................................316
Pre-Conguring a Stack Unit Slot................................................................................................................................316
Removing a Provisioned Logical Stack Unit................................................................................................................316
Hitless Behavior.............................................................................................................................................................. 317
Graceful Restart..............................................................................................................................................................317
Software Resiliency........................................................................................................................................................ 317
Software Component Health Monitoring.............................................................................................................. 317
System Health Monitoring.......................................................................................................................................318
Failure and Event Logging....................................................................................................................................... 318
Hot-Lock Behavior......................................................................................................................................................... 319
18 Internet Group Management Protocol (IGMP)......................................................................................... 320
IGMP Implementation Information.............................................................................................................................. 320
10
Contents
IGMP Protocol Overview..............................................................................................................................................320
IGMP Version 2........................................................................................................................................................ 320
IGMP Version 3........................................................................................................................................................ 322
Congure IGMP............................................................................................................................................................. 325
Related Conguration Tasks...................................................................................................................................325
Viewing IGMP Enabled Interfaces............................................................................................................................... 326
Selecting an IGMP Version...........................................................................................................................................326
Viewing IGMP Groups................................................................................................................................................... 327
Adjusting Timers.............................................................................................................................................................327
Adjusting Query and Response Timers..................................................................................................................327
Preventing a Host from Joining a Group.................................................................................................................... 328
Enabling IGMP Immediate-Leave................................................................................................................................. 331
IGMP Snooping...............................................................................................................................................................331
IGMP Snooping Implementation Information........................................................................................................331
Conguring IGMP Snooping................................................................................................................................... 331
Removing a Group-Port Association.....................................................................................................................332
Disabling Multicast Flooding...................................................................................................................................332
Specifying a Port as Connected to a Multicast Router...................................................................................... 333
Conguring the Switch as Querier........................................................................................................................ 333
Fast Convergence after MSTP Topology Changes...................................................................................................334
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................334
Protocol Separation.................................................................................................................................................334
Enabling and Disabling Management Egress Interface Selection...................................................................... 335
Handling of Management Route Conguration................................................................................................... 336
Handling of Switch-Initiated Trac........................................................................................................................337
Handling of Switch-Destined Trac......................................................................................................................337
Handling of Transit Trac (Trac Separation).................................................................................................... 338
Mapping of Management Applications and Trac Type.....................................................................................338
Behavior of Various Applications for Switch-Initiated Trac ............................................................................ 339
Behavior of Various Applications for Switch-Destined Trac ...........................................................................340
Interworking of EIS With Various Applications......................................................................................................341
Designating a Multicast Router Interface....................................................................................................................341
19 Interfaces................................................................................................................................................. 343
Basic Interface Conguration.......................................................................................................................................343
Advanced Interface Conguration...............................................................................................................................343
Interface Types...............................................................................................................................................................344
Optional Modules...........................................................................................................................................................344
View Basic Interface Information.................................................................................................................................345
Resetting an Interface to its Factory Default State...................................................................................................346
Enabling Energy Ecient Ethernet..............................................................................................................................347
View EEE Information....................................................................................................................................................347
Clear EEE Counters........................................................................................................................................................351
Enabling a Physical Interface........................................................................................................................................352
Physical Interfaces.........................................................................................................................................................352
Conguration Task List for Physical Interfaces....................................................................................................353
Contents
11
Overview of Layer Modes...................................................................................................................................... 353
Conguring Layer 2 (Data Link) Mode..................................................................................................................353
Conguring Layer 2 (Interface) Mode.................................................................................................................. 354
Conguring Layer 3 (Network) Mode...................................................................................................................354
Conguring Layer 3 (Interface) Mode.................................................................................................................. 355
Automatic recovery of an Err-disabled interface.......................................................................................................355
Conguring an automatic recovery for an Err-disabled interface......................................................................356
Egress Interface Selection (EIS)..................................................................................................................................356
Important Points to Remember..............................................................................................................................357
Conguring EIS........................................................................................................................................................ 357
Management Interfaces................................................................................................................................................357
Conguring Management Interfaces.....................................................................................................................357
Conguring a Management Interface on an Ethernet Port............................................................................... 359
VLAN Interfaces............................................................................................................................................................ 359
Loopback Interfaces......................................................................................................................................................360
Null Interfaces................................................................................................................................................................ 360
Port Channel Interfaces.................................................................................................................................................361
Port Channel Denition and Standards..................................................................................................................361
Port Channel Benets..............................................................................................................................................361
Port Channel Implementation................................................................................................................................. 361
Interfaces in Port Channels.................................................................................................................................... 362
Conguration Tasks for Port Channel Interfaces.................................................................................................362
Creating a Port Channel..........................................................................................................................................362
Adding a Physical Interface to a Port Channel.....................................................................................................363
Reassigning an Interface to a New Port Channel................................................................................................364
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 365
Adding or Removing a Port Channel from a VLAN............................................................................................. 365
Assigning an IP Address to a Port Channel...........................................................................................................367
Deleting or Disabling a Port Channel..................................................................................................................... 367
Load Balancing Through Port Channels................................................................................................................367
Load-Balancing Method..........................................................................................................................................367
Changing the Hash Algorithm................................................................................................................................368
Bulk Conguration......................................................................................................................................................... 369
Interface Range....................................................................................................................................................... 369
Bulk Conguration Examples..................................................................................................................................370
Dening Interface Range Macros................................................................................................................................. 371
Dene the Interface Range..................................................................................................................................... 371
Choosing an Interface-Range Macro..................................................................................................................... 371
Monitoring and Maintaining Interfaces........................................................................................................................372
Maintenance Using TDR......................................................................................................................................... 373
Link Dampening..............................................................................................................................................................373
Important Points to Remember..............................................................................................................................374
Conguration Example of Link Dampening...........................................................................................................374
Enabling Link Dampening........................................................................................................................................ 376
Link Bundle Monitoring..................................................................................................................................................377
12
Contents
Using Ethernet Pause Frames for Flow Control.........................................................................................................378
Enabling Pause Frames........................................................................................................................................... 378
Congure the MTU Size on an Interface.................................................................................................................... 379
Port-Pipes.......................................................................................................................................................................380
Auto-Negotiation on Ethernet Interfaces...................................................................................................................380
Setting the Speed of Ethernet Interfaces............................................................................................................380
Set Auto-Negotiation Options................................................................................................................................382
Provisioning Combo Ports............................................................................................................................................ 383
View Advanced Interface Information.........................................................................................................................383
Conguring the Interface Sampling Size.............................................................................................................. 384
Conguring the Trac Sampling Size Globally.......................................................................................................... 385
Dynamic Counters......................................................................................................................................................... 386
Clearing Interface Counters....................................................................................................................................387
20 Internet Protocol Security (IPSec).......................................................................................................... 388
Conguring IPSec .........................................................................................................................................................388
21 IPv4 Routing............................................................................................................................................ 390
IP Addresses....................................................................................................................................................................391
Implementation Information.................................................................................................................................... 391
Conguration Tasks for IP Addresses.......................................................................................................................... 391
Assigning IP Addresses to an Interface........................................................................................................................391
Conguring Static Routes.............................................................................................................................................392
Congure Static Routes for the Management Interface.......................................................................................... 393
IPv4 Path MTU Discovery Overview.......................................................................................................................... 394
Packet handling during MTU mismatch................................................................................................................394
Using the Congured Source IP Address in ICMP Messages..................................................................................394
Conguring the ICMP Source Interface............................................................................................................... 394
Conguring the Duration to Establish a TCP Connection........................................................................................ 395
Enabling Directed Broadcast........................................................................................................................................ 395
Resolution of Host Names............................................................................................................................................396
Enabling Dynamic Resolution of Host Names............................................................................................................396
Specifying the Local System Domain and a List of Domains................................................................................... 396
Conguring DNS with Traceroute................................................................................................................................397
ARP................................................................................................................................................................................. 398
Conguration Tasks for ARP........................................................................................................................................ 398
Conguring Static ARP Entries....................................................................................................................................398
Enabling Proxy ARP.......................................................................................................................................................399
Clearing ARP Cache......................................................................................................................................................399
ARP Learning via Gratuitous ARP............................................................................................................................... 399
Enabling ARP Learning via Gratuitous ARP................................................................................................................399
ARP Learning via ARP Request...................................................................................................................................400
Conguring ARP Retries...............................................................................................................................................400
ICMP................................................................................................................................................................................ 401
Conguration Tasks for ICMP.......................................................................................................................................401
Enabling ICMP Unreachable Messages.......................................................................................................................401
Contents
13
ICMP Redirects...............................................................................................................................................................401
UDP Helper.....................................................................................................................................................................403
Congure UDP Helper.............................................................................................................................................403
Important Points to Remember............................................................................................................................. 403
Enabling UDP Helper.....................................................................................................................................................403
Conguring a Broadcast Address................................................................................................................................ 403
Congurations Using UDP Helper............................................................................................................................... 404
UDP Helper with Broadcast-All Addresses.................................................................................................................404
UDP Helper with Subnet Broadcast Addresses.........................................................................................................405
UDP Helper with Congured Broadcast Addresses..................................................................................................405
UDP Helper with No Congured Broadcast Addresses............................................................................................406
Troubleshooting UDP Helper........................................................................................................................................406
22 IPv6 Routing............................................................................................................................................ 407
Protocol Overview......................................................................................................................................................... 407
Extended Address Space........................................................................................................................................408
Stateless Autoconguration................................................................................................................................... 408
IPv6 Headers............................................................................................................................................................408
IPv6 Header Fields.................................................................................................................................................. 409
Extension Header Fields........................................................................................................................................... 411
Addressing.................................................................................................................................................................412
Implementing IPv6 with Dell EMC Networking OS....................................................................................................413
ICMPv6............................................................................................................................................................................414
Path MTU discovery...................................................................................................................................................... 415
IPv6 Neighbor Discovery...............................................................................................................................................415
IPv6 Neighbor Discovery of MTU Packets........................................................................................................... 416
Conguration Task List for IPv6 RDNSS.....................................................................................................................416
Conguring the IPv6 Recursive DNS Server........................................................................................................416
Debugging IPv6 RDNSS Information Sent to the Host ......................................................................................417
Displaying IPv6 RDNSS Information.......................................................................................................................418
Secure Shell (SSH) Over an IPv6 Transport...............................................................................................................418
Conguration Tasks for IPv6.........................................................................................................................................419
Adjusting Your CAM-Prole.....................................................................................................................................419
Assigning an IPv6 Address to an Interface...........................................................................................................420
Assigning a Static IPv6 Route................................................................................................................................420
Conguring Telnet with IPv6...................................................................................................................................421
SNMP over IPv6.......................................................................................................................................................421
Displaying IPv6 Information.....................................................................................................................................421
Displaying an IPv6 Interface Information.............................................................................................................. 422
Showing IPv6 Routes..............................................................................................................................................422
Showing the Running-Conguration for an Interface......................................................................................... 424
Clearing IPv6 Routes...............................................................................................................................................424
Disabling ND Entry Timeout................................................................................................................................... 424
Conguring IPv6 RA Guard.......................................................................................................................................... 425
Conguring IPv6 RA Guard on an Interface.........................................................................................................426
Monitoring IPv6 RA Guard......................................................................................................................................427
14
Contents
23 iSCSI Optimization...................................................................................................................................428
iSCSI Optimization Overview....................................................................................................................................... 428
Monitoring iSCSI Trac Flows...............................................................................................................................430
Application of Quality of Service to iSCSI Trac Flows..................................................................................... 430
Information Monitored in iSCSI Trac Flows.......................................................................................................430
Detection and Auto-Conguration for Dell EqualLogic Arrays............................................................................431
Conguring Detection and Ports for Dell Compellent Arrays..............................................................................431
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................432
Enable and Disable iSCSI Optimization................................................................................................................. 432
Default iSCSI Optimization Values...............................................................................................................................433
iSCSI Optimization Prerequisites................................................................................................................................. 433
Conguring iSCSI Optimization....................................................................................................................................433
Displaying iSCSI Optimization Information................................................................................................................. 435
24 Intermediate System to Intermediate System...........................................................................................437
IS-IS Protocol Overview................................................................................................................................................437
IS-IS Addressing............................................................................................................................................................. 437
Multi-Topology IS-IS...................................................................................................................................................... 438
Transition Mode....................................................................................................................................................... 438
Interface Support.....................................................................................................................................................439
Adjacencies...............................................................................................................................................................439
Graceful Restart.............................................................................................................................................................439
Timers........................................................................................................................................................................439
Implementation Information..........................................................................................................................................439
Conguration Information.............................................................................................................................................440
Conguration Tasks for IS-IS.................................................................................................................................. 441
Conguring the Distance of a Route.....................................................................................................................448
Changing the IS-Type.............................................................................................................................................. 449
Redistributing IPv4 Routes......................................................................................................................................451
Redistributing IPv6 Routes.....................................................................................................................................452
Conguring Authentication Passwords.................................................................................................................453
Setting the Overload Bit......................................................................................................................................... 453
Debugging IS-IS....................................................................................................................................................... 454
IS-IS Metric Styles.........................................................................................................................................................455
Congure Metric Values............................................................................................................................................... 455
Maximum Values in the Routing Table.................................................................................................................. 455
Change the IS-IS Metric Style in One Level Only................................................................................................455
Leaks from One Level to Another.......................................................................................................................... 457
Sample Congurations..................................................................................................................................................458
25 Link Aggregation Control Protocol (LACP).............................................................................................. 460
Introduction to Dynamic LAGs and LACP.................................................................................................................. 460
Important Points to Remember............................................................................................................................. 460
LACP Modes.............................................................................................................................................................461
Conguring LACP Commands................................................................................................................................461
Contents
15
LACP Conguration Tasks............................................................................................................................................ 462
Creating a LAG.........................................................................................................................................................462
Conguring the LAG Interfaces as Dynamic........................................................................................................ 462
Setting the LACP Long Timeout............................................................................................................................463
Monitoring and Debugging LACP..........................................................................................................................463
Shared LAG State Tracking.......................................................................................................................................... 464
Conguring Shared LAG State Tracking............................................................................................................... 464
Important Points about Shared LAG State Tracking...........................................................................................466
LACP Basic Conguration Example............................................................................................................................ 466
Congure a LAG on ALPHA................................................................................................................................... 466
26 Layer 2.....................................................................................................................................................475
Manage the MAC Address Table................................................................................................................................. 475
Clearing the MAC Address Table........................................................................................................................... 475
Setting the Aging Time for Dynamic Entries........................................................................................................475
Conguring a Static MAC Address........................................................................................................................476
Displaying the MAC Address Table........................................................................................................................ 476
MAC Learning Limit....................................................................................................................................................... 476
Setting the MAC Learning Limit.............................................................................................................................477
mac learning-limit Dynamic.....................................................................................................................................477
mac learning-limit mac-address-sticky..................................................................................................................477
mac learning-limit station-move.............................................................................................................................478
mac learning-limit no-station-move.......................................................................................................................478
Learning Limit Violation Actions............................................................................................................................. 478
Setting Station Move Violation Actions................................................................................................................ 479
Recovering from Learning Limit and Station Move Violations........................................................................... 479
Disabling MAC Address Learning on the System.................................................................................................480
Enabling port security............................................................................................................................................. 480
NIC Teaming................................................................................................................................................................... 480
Congure Redundant Pairs........................................................................................................................................... 481
Important Points about Conguring Redundant Pairs........................................................................................ 483
Far-End Failure Detection.............................................................................................................................................484
FEFD State Changes...............................................................................................................................................485
Conguring FEFD.................................................................................................................................................... 486
Enabling FEFD on an Interface...............................................................................................................................486
Debugging FEFD...................................................................................................................................................... 487
27 Link Layer Discovery Protocol (LLDP)......................................................................................................489
802.1AB (LLDP) Overview............................................................................................................................................489
Protocol Data Units................................................................................................................................................. 489
Optional TLVs.................................................................................................................................................................490
Management TLVs.................................................................................................................................................. 490
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 492
TIA Organizationally Specic TLVs........................................................................................................................ 492
Congure LLDP............................................................................................................................................................. 496
Related Conguration Tasks...................................................................................................................................496
16
Contents
Important Points to Remember............................................................................................................................. 496
LLDP Compatibility.................................................................................................................................................. 497
CONFIGURATION versus INTERFACE Congurations.............................................................................................497
Enabling LLDP................................................................................................................................................................ 497
Disabling and Undoing LLDP.................................................................................................................................. 498
Enabling LLDP on Management Ports........................................................................................................................498
Disabling and Undoing LLDP on Management Ports.......................................................................................... 498
Advertising TLVs............................................................................................................................................................ 498
Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................500
Reserved Unrecognized LLDP TLVs..................................................................................................................... 500
Organizational Specic Unrecognized LLDP TLVs..............................................................................................500
Viewing Unrecognized LLDP TLVs........................................................................................................................500
Viewing the LLDP Conguration..................................................................................................................................501
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................ 501
Examples of Viewing Information Advertised by Neighbors............................................................................... 501
Conguring LLDPDU Intervals.....................................................................................................................................503
Conguring LLDP Notication Interval....................................................................................................................... 504
Conguring Transmit and Receive Mode................................................................................................................... 504
Conguring the Time to Live Value............................................................................................................................. 505
Debugging LLDP............................................................................................................................................................505
Relevant Management Objects....................................................................................................................................507
28 Microsoft Network Load Balancing...........................................................................................................512
NLB Unicast Mode Scenario.........................................................................................................................................512
NLB Multicast Mode Scenario......................................................................................................................................512
Limitations of the NLB Feature.....................................................................................................................................513
Microsoft Clustering.......................................................................................................................................................513
Enable and Disable VLAN Flooding ............................................................................................................................. 513
Conguring a Switch for NLB ......................................................................................................................................513
Enabling a Switch for Multicast NLB..................................................................................................................... 514
29 Multicast Source Discovery Protocol (MSDP)..........................................................................................515
Protocol Overview..........................................................................................................................................................515
Anycast RP......................................................................................................................................................................516
Implementation Information...........................................................................................................................................517
Congure Multicast Source Discovery Protocol.........................................................................................................517
Related Conguration Tasks....................................................................................................................................517
Enable MSDP..................................................................................................................................................................521
Manage the Source-Active Cache.............................................................................................................................. 522
Viewing the Source-Active Cache.........................................................................................................................522
Limiting the Source-Active Cache.........................................................................................................................522
Clearing the Source-Active Cache........................................................................................................................ 523
Enabling the Rejected Source-Active Cache....................................................................................................... 523
Accept Source-Active Messages that Fail the RFP Check......................................................................................523
Specifying Source-Active Messages...........................................................................................................................526
Limiting the Source-Active Messages from a Peer................................................................................................... 527
Contents
17
Preventing MSDP from Caching a Local Source....................................................................................................... 527
Preventing MSDP from Caching a Remote Source.................................................................................................. 528
Preventing MSDP from Advertising a Local Source..................................................................................................528
Logging Changes in Peership States...........................................................................................................................529
Terminating a Peership..................................................................................................................................................529
Clearing Peer Statistics.................................................................................................................................................530
Debugging MSDP..........................................................................................................................................................530
MSDP with Anycast RP.................................................................................................................................................531
Conguring Anycast RP................................................................................................................................................532
Reducing Source-Active Message Flooding.........................................................................................................533
Specifying the RP Address Used in SA Messages.............................................................................................. 533
MSDP Sample Congurations..................................................................................................................................... 535
33 Multicast Listener Discovery Protocol..................................................................................................... 538
MLD Version 1................................................................................................................................................................ 538
MLD Querier Router......................................................................................................................................................538
Joining a Multicast Group.............................................................................................................................................539
Leaving a Multicast Group............................................................................................................................................539
MLD version 2................................................................................................................................................................539
MLD timers......................................................................................................................................................................541
Reducing Host Response Burstiness.................................................................................................................... 542
Conguring MLD Version..............................................................................................................................................542
Clearing MLD groups.....................................................................................................................................................542
Debugging MLD.............................................................................................................................................................542
Explicit Tracking............................................................................................................................................................. 542
Reducing Leave Latency...............................................................................................................................................543
Displaying MLD groups table........................................................................................................................................543
Displaying MLD Interfaces............................................................................................................................................543
31 Multiple Spanning Tree Protocol (MSTP)................................................................................................. 544
Protocol Overview.........................................................................................................................................................544
Spanning Tree Variations.............................................................................................................................................. 545
Implementation Information................................................................................................................................... 545
Congure Multiple Spanning Tree Protocol................................................................................................................545
Related Conguration Tasks...................................................................................................................................546
Enable Multiple Spanning Tree Globally...................................................................................................................... 546
Adding and Removing Interfaces.................................................................................................................................546
Creating Multiple Spanning Tree Instances................................................................................................................ 547
Inuencing MSTP Root Selection................................................................................................................................548
Interoperate with Non-Dell Bridges.............................................................................................................................548
Changing the Region Name or Revision..................................................................................................................... 549
Modifying Global Parameters.......................................................................................................................................549
Modifying the Interface Parameters........................................................................................................................... 550
Setting STP path cost as constant..............................................................................................................................551
Conguring an EdgePort.............................................................................................................................................. 552
Flush MAC Addresses after a Topology Change....................................................................................................... 552
18
Contents
MSTP Sample Congurations......................................................................................................................................553
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................553
Debugging and Verifying MSTP Congurations........................................................................................................ 556
32 Multicast Features...................................................................................................................................558
Enabling IP Multicast.....................................................................................................................................................558
Implementation Information......................................................................................................................................... 558
Multicast Policies...........................................................................................................................................................559
IPv4 Multicast Policies............................................................................................................................................559
Understanding Multicast Traceroute (mtrace).................................................................................................... 566
Printing Multicast Traceroute (mtrace) Paths......................................................................................................567
Supported Error Codes...........................................................................................................................................568
mtrace Scenarios.....................................................................................................................................................569
33 Multicast Listener Discovery Protocol......................................................................................................575
MLD Version 1................................................................................................................................................................ 575
MLD Querier Router......................................................................................................................................................575
Joining a Multicast Group............................................................................................................................................. 576
Leaving a Multicast Group............................................................................................................................................576
MLD version 2................................................................................................................................................................576
MLD timers.....................................................................................................................................................................578
Reducing Host Response Burstiness.................................................................................................................... 579
Clearing MLD groups.....................................................................................................................................................579
Debugging MLD............................................................................................................................................................. 579
Explicit Tracking............................................................................................................................................................. 579
Reducing Leave Latency...............................................................................................................................................579
Displaying MLD groups table........................................................................................................................................580
Displaying MLD Interfaces............................................................................................................................................580
MLD Snooping............................................................................................................................................................... 580
Enable MLD Snooping............................................................................................................................................ 580
Disable MLD Snooping.............................................................................................................................................581
Congure the switch as a querier.......................................................................................................................... 581
Specify port as connected to multicast router..................................................................................................... 581
Enable Snooping Explicit Tracking......................................................................................................................... 582
Display the MLD Snooping Table........................................................................................................................... 582
34 Object Tracking........................................................................................................................................583
Object Tracking Overview............................................................................................................................................ 583
Track Layer 2 Interfaces..........................................................................................................................................584
Track Layer 3 Interfaces..........................................................................................................................................584
Track IPv4 and IPv6 Routes...................................................................................................................................585
Set Tracking Delays................................................................................................................................................. 586
VRRP Object Tracking............................................................................................................................................ 586
Object Tracking Conguration..................................................................................................................................... 586
Tracking a Layer 2 Interface................................................................................................................................... 586
Contents
19
Tracking a Layer 3 Interface................................................................................................................................... 587
Track an IPv4/IPv6 Route......................................................................................................................................589
Displaying Tracked Objects...........................................................................................................................................593
35 Open Shortest Path First (OSPFv2 and OSPFv3)................................................................................... 595
Protocol Overview.........................................................................................................................................................595
Autonomous System (AS) Areas........................................................................................................................... 595
Area Types................................................................................................................................................................ 596
Networks and Neighbors........................................................................................................................................ 597
Router Types.............................................................................................................................................................597
Designated and Backup Designated Routers.......................................................................................................599
Link-State Advertisements (LSAs)........................................................................................................................599
Router Priority and Cost.........................................................................................................................................600
OSPF with Dell EMC Networking OS..........................................................................................................................601
Graceful Restart...................................................................................................................................................... 602
Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................603
Multi-Process OSPFv2 with VRF..........................................................................................................................603
OSPF ACK Packing................................................................................................................................................. 603
Setting OSPF Adjacency with Cisco Routers...................................................................................................... 603
Conguration Information.............................................................................................................................................604
Conguration Task List for OSPFv2 (OSPF for IPv4)........................................................................................ 604
OSPFv3 NSSA................................................................................................................................................................618
NSSA Options...........................................................................................................................................................618
Conguration Task List for OSPFv3 (OSPF for IPv6)............................................................................................... 619
Enabling IPv6 Unicast Routing............................................................................................................................... 619
Applying cost for OSPFv3......................................................................................................................................620
Assigning IPv6 Addresses on an Interface............................................................................................................620
Assigning Area ID on an Interface..........................................................................................................................620
Assigning OSPFv3 Process ID and Router ID Globally.........................................................................................621
Assigning OSPFv3 Process ID and Router ID to a VRF.......................................................................................621
Conguring Stub Areas...........................................................................................................................................622
Conguring Passive-Interface................................................................................................................................622
Redistributing Routes..............................................................................................................................................622
Conguring a Default Route...................................................................................................................................623
Enabling OSPFv3 Graceful Restart....................................................................................................................... 623
OSPFv3 Authentication Using IPsec.....................................................................................................................625
Troubleshooting OSPFv3.........................................................................................................................................631
MIB Support for OSPFv3............................................................................................................................................. 632
Viewing the OSPFv3 MIB.......................................................................................................................................633
36 Policy-based Routing (PBR).................................................................................................................... 634
Overview.........................................................................................................................................................................634
Implementing PBR.........................................................................................................................................................635
Conguration Task List for Policy-based Routing......................................................................................................635
PBR Exceptions (Permit)....................................................................................................................................... 635
Create a Redirect List..............................................................................................................................................636
20
Contents
/