PowerSwitch S5048F-ON

Dell PowerSwitch S5048F-ON Administrator Guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S5048F-ON Administrator Guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Networking OS Conguration Guide for
the S5048F–ON System
9.14.0.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 06
Rev. A00
Contents
1 About this Guide...........................................................................................................................................35
Audience........................................................................................................................................................................... 35
Conventions......................................................................................................................................................................35
Related Documents......................................................................................................................................................... 35
2 Conguration Fundamentals........................................................................................................................ 36
Accessing the Command Line........................................................................................................................................36
CLI Modes.........................................................................................................................................................................37
Navigating CLI Modes............................................................................................................................................... 38
The do Command............................................................................................................................................................. 41
Undoing Commands.........................................................................................................................................................41
Obtaining Help..................................................................................................................................................................42
Entering and Editing Commands....................................................................................................................................42
Command History............................................................................................................................................................ 43
Filtering show Command Outputs................................................................................................................................. 43
Example of the grep Keyword.................................................................................................................................. 44
Multiple Users in Conguration Mode...........................................................................................................................45
Conguring alias command.............................................................................................................................................45
Viewing alias conguration....................................................................................................................................... 45
3 Getting Started............................................................................................................................................47
Console Access................................................................................................................................................................48
Serial Console.............................................................................................................................................................48
Micro USB-B Access.................................................................................................................................................49
Default Conguration...................................................................................................................................................... 50
Conguring a Host Name............................................................................................................................................... 50
Accessing the System Remotely................................................................................................................................... 50
Accessing the System Remotely............................................................................................................................. 50
Congure the Management Port IP Address.........................................................................................................50
Congure a Management Route...............................................................................................................................51
Conguring a Username and Password...................................................................................................................51
Conguring the Enable Password..................................................................................................................................52
Conguration File Management.....................................................................................................................................52
Copy Files to and from the System......................................................................................................................... 52
Mounting an NFS File System..................................................................................................................................54
Save the Running-Conguration............................................................................................................................. 55
Congure the Overload Bit for a Startup Scenario............................................................................................... 56
Viewing Files...............................................................................................................................................................56
Managing the File System...............................................................................................................................................57
View Command History.................................................................................................................................................. 58
Upgrading Dell EMC Networking OS............................................................................................................................ 59
Using HTTP for File Transfers........................................................................................................................................ 59
Contents
3
Verify Software Images Before Installation...................................................................................................................59
4 Management................................................................................................................................................ 61
Conguring Privilege Levels............................................................................................................................................ 61
Creating a Custom Privilege Level...........................................................................................................................62
Removing a Command from EXEC Mode.............................................................................................................. 62
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................62
Allowing Access to CONFIGURATION Mode Commands....................................................................................62
Allowing Access to Dierent Modes........................................................................................................................62
Applying a Privilege Level to a Username............................................................................................................... 64
Applying a Privilege Level to a Terminal Line.......................................................................................................... 64
Conguring Logging........................................................................................................................................................ 64
Audit and Security Logs............................................................................................................................................ 65
Conguring Logging Format ...................................................................................................................................66
Setting Up a Secure Connection to a Syslog Server.............................................................................................66
Log Messages in the Internal Buer..............................................................................................................................68
Conguration Task List for System Log Management.......................................................................................... 68
Disabling System Logging............................................................................................................................................... 68
Sending System Messages to a Syslog Server............................................................................................................68
Conguring a UNIX System as a Syslog Server.....................................................................................................68
Track Login Activity......................................................................................................................................................... 69
Restrictions for Tracking Login Activity.................................................................................................................. 69
Conguring Login Activity Tracking.........................................................................................................................69
Display Login Statistics..............................................................................................................................................70
Limit Concurrent Login Sessions.....................................................................................................................................71
Restrictions for Limiting the Number of Concurrent Sessions............................................................................. 71
Conguring Concurrent Session Limit......................................................................................................................71
Enabling the System to Clear Existing Sessions.................................................................................................... 72
Enabling Secured CLI Mode............................................................................................................................................73
Changing System Logging Settings...............................................................................................................................73
Display the Logging Buer and the Logging Conguration........................................................................................ 74
Conguring a UNIX Logging Facility Level....................................................................................................................76
Synchronizing Log Messages......................................................................................................................................... 77
Enabling Timestamp on Syslog Messages.................................................................................................................... 78
File Transfer Services.......................................................................................................................................................78
Conguration Task List for File Transfer Services..................................................................................................78
Enabling the FTP Server........................................................................................................................................... 78
Conguring FTP Server Parameters........................................................................................................................79
Conguring FTP Client Parameters......................................................................................................................... 79
Terminal Lines...................................................................................................................................................................80
Denying and Permitting Access to a Terminal Line................................................................................................80
Conguring Login Authentication for Terminal Lines..............................................................................................81
Setting Timeout for EXEC Privilege Mode................................................................................................................... 82
Using Telnet to get to Another Network Device..........................................................................................................82
Lock CONFIGURATION Mode....................................................................................................................................... 83
Viewing the Conguration Lock Status...................................................................................................................83
4
Contents
Reloading the system...................................................................................................................................................... 84
Restoring the Factory Default Settings.........................................................................................................................84
Important Points to Remember................................................................................................................................85
Restoring Factory Default Environment Variables................................................................................................. 85
5 802.1X......................................................................................................................................................... 86
Port-Authentication Process..........................................................................................................................................88
EAP over RADIUS......................................................................................................................................................88
Conguring 802.1X...........................................................................................................................................................89
Related Conguration Tasks..................................................................................................................................... 89
Important Points to Remember......................................................................................................................................89
Enabling 802.1X................................................................................................................................................................ 90
Conguring dot1x Prole .................................................................................................................................................91
Conguring the Static MAB and MAB Prole .............................................................................................................92
Conguring Critical VLAN ..............................................................................................................................................92
Conguring MAC addresses for a do1x Prole.............................................................................................................93
Conguring Request Identity Re-Transmissions...........................................................................................................94
Conguring a Quiet Period after a Failed Authentication..................................................................................... 94
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 95
Re-Authenticating a Port................................................................................................................................................96
Conguring Timeouts...................................................................................................................................................... 97
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................98
Guest and Authentication-Fail VLANs.......................................................................................................................... 99
Conguring a Guest VLAN....................................................................................................................................... 99
Conguring an Authentication-Fail VLAN...............................................................................................................99
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)................................... 101
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................................................................101
Guidelines for Conguring ACL VLAN Groups........................................................................................................... 102
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................102
Conguring ACL VLAN Groups.............................................................................................................................. 102
Conguring FP Blocks for VLAN Parameters.......................................................................................................103
Viewing CAM Usage...................................................................................................................................................... 104
Allocating FP Blocks for VLAN Processes.................................................................................................................. 106
7 Access Control Lists (ACLs)....................................................................................................................... 108
IP Access Control Lists (ACLs).....................................................................................................................................109
CAM Usage................................................................................................................................................................110
Implementing ACLs on Dell EMC Networking OS................................................................................................. 111
Congure ACL Range Proles....................................................................................................................................... 112
Important Points to Remember..................................................................................................................................... 113
Conguration Task List for Route Maps.................................................................................................................114
Conguring Match Routes.......................................................................................................................................116
Conguring Set Conditions...................................................................................................................................... 117
Congure a Route Map for Route Redistribution..................................................................................................118
Congure a Route Map for Route Tagging............................................................................................................ 119
Contents
5
Continue Clause........................................................................................................................................................ 119
IP Fragment Handling..................................................................................................................................................... 119
IP Fragments ACL Examples...................................................................................................................................120
Layer 4 ACL Rules Examples...................................................................................................................................120
Congure a Standard IP ACL.........................................................................................................................................121
Conguring a Standard IP ACL Filter..................................................................................................................... 122
Congure an Extended IP ACL..................................................................................................................................... 123
Conguring Filters with a Sequence Number....................................................................................................... 123
Conguring Filters Without a Sequence Number.................................................................................................126
Congure Layer 2 and Layer 3 ACLs............................................................................................................................127
Assign an IP ACL to an Interface..................................................................................................................................128
Applying an IP ACL.........................................................................................................................................................128
Counting ACL Hits....................................................................................................................................................129
Congure Ingress ACLs................................................................................................................................................. 129
Congure Egress ACLs..................................................................................................................................................129
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 130
Conguring UDF ACL..................................................................................................................................................... 131
IP Prex Lists.................................................................................................................................................................. 134
Implementation Information.................................................................................................................................... 135
Conguration Task List for Prex Lists.................................................................................................................. 135
ACL Resequencing......................................................................................................................................................... 138
Resequencing an ACL or Prex List.......................................................................................................................139
Route Maps.....................................................................................................................................................................140
Implementation Information.................................................................................................................................... 140
8 Bidirectional Forwarding Detection (BFD)...................................................................................................141
How BFD Works.............................................................................................................................................................. 141
BFD Packet Format..................................................................................................................................................142
BFD Sessions............................................................................................................................................................ 143
BFD Three-Way Handshake.................................................................................................................................... 144
Session State Changes............................................................................................................................................146
Important Points to Remember.................................................................................................................................... 146
Congure BFD................................................................................................................................................................ 146
Congure BFD for Physical Ports...........................................................................................................................147
Congure BFD for Static Routes............................................................................................................................148
Congure BFD for OSPF..........................................................................................................................................151
Congure BFD for OSPFv3.....................................................................................................................................156
Congure BFD for IS-IS...........................................................................................................................................159
Congure BFD for BGP........................................................................................................................................... 162
Congure BFD for VRRP.........................................................................................................................................168
Conguring Protocol Liveness................................................................................................................................. 171
Troubleshooting BFD.................................................................................................................................................171
9 Border Gateway Protocol version 4 (BGPv4)..............................................................................................173
Autonomous Systems (AS)........................................................................................................................................... 173
Sessions and Peers.........................................................................................................................................................175
6
Contents
Establish a Session................................................................................................................................................... 175
Route Reectors.............................................................................................................................................................176
BGP Attributes for selecting Best Path....................................................................................................................... 177
Best Path Selection Criteria.................................................................................................................................... 177
Weight........................................................................................................................................................................179
Local Preference.......................................................................................................................................................179
Multi-Exit Discriminators (MEDs)...........................................................................................................................180
Origin...........................................................................................................................................................................181
AS Path......................................................................................................................................................................182
Next Hop................................................................................................................................................................... 182
Multiprotocol BGP..........................................................................................................................................................182
MBGP for IPv4 MulticastBGP Address Family modelIPv4 and IPv6 address family....................................... 183
Implement BGP with Dell EMC Networking OS.........................................................................................................183
Additional Path (Add-Path) Support......................................................................................................................183
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 184
Ignore Router-ID in Best-Path Calculation............................................................................................................ 184
Four-Byte AS Numbers............................................................................................................................................184
AS4 Number Representation.................................................................................................................................. 185
AS Number Migration.............................................................................................................................................. 186
BGP4 Management Information Base (MIB)........................................................................................................ 187
Important Points to Remember...............................................................................................................................187
Conguration Information..............................................................................................................................................188
Enabling BGP.................................................................................................................................................................. 189
Enabling BGP............................................................................................................................................................ 190
Conguring AS4 Number Representations........................................................................................................... 192
Conguring Peer Groups.........................................................................................................................................194
Conguring BGP Fast Fall-Over.............................................................................................................................196
Conguring Passive Peering....................................................................................................................................197
Maintaining Existing AS Numbers During an AS Migration................................................................................. 198
Allowing an AS Number to Appear in its Own AS Path....................................................................................... 199
Enabling Graceful Restart.......................................................................................................................................200
Enabling Neighbor Graceful Restart...................................................................................................................... 201
Filtering on an AS-Path Attribute........................................................................................................................... 201
Regular Expressions as Filters................................................................................................................................203
Redistributing Routes..............................................................................................................................................204
Enabling Additional Paths....................................................................................................................................... 205
Conguring IP Community Lists............................................................................................................................ 205
Conguring an IP Extended Community List....................................................................................................... 206
Filtering Routes with Community Lists................................................................................................................. 207
Manipulating the COMMUNITY Attribute............................................................................................................208
Changing MED Attributes.......................................................................................................................................209
Changing the LOCAL_PREFERENCE Attribute..................................................................................................209
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............. 210
Changing the WEIGHT Attribute.............................................................................................................................211
Enabling Multipath.................................................................................................................................................... 211
Contents
7
Filtering BGP Routes.................................................................................................................................................211
Filtering BGP Routes Using Route Maps...............................................................................................................213
Filtering BGP Routes Using AS-PATH Information.............................................................................................. 213
Conguring BGP Route Reectors........................................................................................................................ 214
Aggregating Routes..................................................................................................................................................215
Conguring BGP Confederations...........................................................................................................................215
Enabling Route Flap Dampening.............................................................................................................................216
Changing BGP Timers..............................................................................................................................................218
Route-refresh and Soft-reconguration................................................................................................................218
Enabling or disabling BGP neighbors.....................................................................................................................220
Route Map Continue................................................................................................................................................221
Enabling MBGP Congurations.................................................................................................................................... 221
BGP Regular Expression Optimization........................................................................................................................222
Debugging BGP..............................................................................................................................................................222
Storing Last and Bad PDUs....................................................................................................................................223
Capturing PDUs....................................................................................................................................................... 224
PDU Counters.......................................................................................................................................................... 225
Example-Conguring BGP peer groups......................................................................................................................225
10 Content Addressable Memory (CAM).......................................................................................................232
CAM Allocation...............................................................................................................................................................232
Test CAM Usage............................................................................................................................................................ 234
View CAM-ACL Settings.............................................................................................................................................. 234
View CAM Usage...........................................................................................................................................................235
CAM Optimization......................................................................................................................................................... 236
Troubleshoot CAM Proling..........................................................................................................................................236
CAM Prole Mismatches........................................................................................................................................ 236
QoS CAM Region Limitation...................................................................................................................................236
Syslog Error When the Table is Full........................................................................................................................237
Syslog Warning Upon 90 Percent Utilization of CAM......................................................................................... 237
Syslog Warning for Discrepancies Between Congured Extended Prexes.................................................... 237
Unied Forwarding Table (UFT) Modes......................................................................................................................237
Conguring UFT Modes..........................................................................................................................................238
11 Control Plane Policing (CoPP).................................................................................................................. 239
Congure Control Plane Policing................................................................................................................................. 240
Conguring CoPP for Protocols............................................................................................................................. 241
Conguring CoPP for CPU Queues...................................................................................................................... 243
Protocol to CPU Queue Mapping.......................................................................................................................... 244
Conguring Protocol to CPU Queue Mapping.....................................................................................................244
Displaying CoPP Conguration ............................................................................................................................. 245
12 Data Center Bridging (DCB)..................................................................................................................... 247
Ethernet Enhancements in Data Center Bridging......................................................................................................247
Priority-Based Flow Control................................................................................................................................... 248
Enhanced Transmission Selection..........................................................................................................................249
8
Contents
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................250
Data Center Bridging in a Trac Flow................................................................................................................... 251
Buer Organization.................................................................................................................................................. 251
Enabling Data Center Bridging.....................................................................................................................................254
DCB Maps and its Attributes................................................................................................................................. 255
Data Center Bridging: Default Conguration............................................................................................................. 255
Conguring Priority-Based Flow Control....................................................................................................................256
Conguring Lossless Queues..................................................................................................................................257
Conguring PFC in a DCB Map................................................................................................................................... 258
PFC Conguration Notes....................................................................................................................................... 258
PFC Prerequisites and Restrictions.......................................................................................................................259
Applying a DCB Map on a Port....................................................................................................................................260
Conguring PFC without a DCB Map.........................................................................................................................260
Conguring Lossless QueuesExample:.................................................................................................................. 261
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................262
Pause and Resume of Trac..................................................................................................................................262
Buer Sizes for Lossless or PFC Packets............................................................................................................ 262
Shared headroom for lossless or PFC packets.......................................................................................................... 263
Example Scenario.................................................................................................................................................... 264
Conguring Shared Head Room Buer................................................................................................................ 265
Viewing Shared Head Room Usage.......................................................................................................................265
Monitoring Buer Statistics for Tracking Purposes............................................................................................ 266
Behavior of Tagged Packets.........................................................................................................................................266
Conguration Example for DSCP and PFC Priorities................................................................................................266
SNMP Support for PFC and Buer Statistics Tracking............................................................................................267
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................268
PFC and ETS Conguration Examples........................................................................................................................268
Using PFC to Manage Converged Ethernet Trac.................................................................................................. 269
Operations on Untagged Packets................................................................................................................................269
Generation of PFC for a Priority for Untagged Packets...........................................................................................269
Congure Enhanced Transmission Selection..............................................................................................................269
Creating an ETS Priority Group............................................................................................................................. 269
ETS Operation with DCBx.......................................................................................................................................271
Conguring ETS in a DCB Map...............................................................................................................................271
Hierarchical Scheduling in ETS Output Policies......................................................................................................... 272
Using ETS to Manage Converged Ethernet Trac................................................................................................... 273
Applying DCB Policies in a Switch Stack.................................................................................................................... 273
Congure a DCBx Operation........................................................................................................................................ 273
DCBx Operation........................................................................................................................................................274
DCBx Port Roles.......................................................................................................................................................274
DCB Conguration Exchange.................................................................................................................................275
Conguration Source Election................................................................................................................................276
Propagation of DCB Information............................................................................................................................276
Auto-Detection and Manual Conguration of the DCBx Version.......................................................................276
DCBx Example..........................................................................................................................................................277
Contents
9
DCBx Prerequisites and Restrictions..................................................................................................................... 277
Conguring DCBx.................................................................................................................................................... 278
Verifying the DCB Conguration.................................................................................................................................. 281
QoS dot1p Trac Classication and Queue Assignment..........................................................................................289
Conguring the Dynamic Buer Method................................................................................................................... 290
Sample DCB Conguration...........................................................................................................................................290
PFC and ETS Conguration Command Examples...............................................................................................292
13 Dynamic Host Conguration Protocol (DHCP).........................................................................................293
DHCP Packet Format and Options............................................................................................................................. 293
Assign an IP Address using DHCP...............................................................................................................................295
Implementation Information......................................................................................................................................... 295
Congure the System to be a DHCP Server............................................................................................................. 296
Conguring the Server for Automatic Address Allocation..................................................................................296
Specifying a Default Gateway................................................................................................................................ 298
Congure a Method of Hostname Resolution..................................................................................................... 298
Using DNS for Address Resolution........................................................................................................................298
Using NetBIOS WINS for Address Resolution..................................................................................................... 298
Creating Manual Binding Entries............................................................................................................................299
Debugging the DHCP Server.................................................................................................................................299
Using DHCP Clear Commands.............................................................................................................................. 299
Congure the System to be a DHCP Client...............................................................................................................300
Conguring the DHCP Client System...................................................................................................................300
DHCP Client on a Management Interface............................................................................................................302
DHCP Client Operation with Other Features.......................................................................................................302
Congure Secure DHCP...............................................................................................................................................303
Option 82..................................................................................................................................................................303
DHCP Snooping.......................................................................................................................................................304
Drop DHCP Packets on Snooped VLANs Only....................................................................................................308
Dynamic ARP Inspection........................................................................................................................................ 309
Conguring Dynamic ARP Inspection....................................................................................................................310
Source Address Validation..............................................................................................................................................311
Enabling IP Source Address Validation....................................................................................................................311
DHCP MAC Source Address Validation................................................................................................................. 312
Enabling IP+MAC Source Address Validation........................................................................................................312
Viewing the Number of SAV Dropped Packets.................................................................................................... 313
Clearing the Number of SAV Dropped Packets....................................................................................................313
14 Equal Cost Multi-Path (ECMP).................................................................................................................314
ECMP for Flow-Based Anity......................................................................................................................................314
Conguring the Hash Algorithm............................................................................................................................. 314
Enabling Deterministic ECMP Next Hop............................................................................................................... 314
Conguring the Hash Algorithm Seed................................................................................................................... 315
Link Bundle Monitoring.................................................................................................................................................. 315
Managing ECMP Group Paths................................................................................................................................316
Creating an ECMP Group Bundle...........................................................................................................................316
10
Contents
Modifying the ECMP Group Threshold................................................................................................................. 316
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table.......................................317
Support for ECMP in host table............................................................................................................................. 318
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes .........................................................................318
15 FIP Snooping............................................................................................................................................ 319
Fibre Channel over Ethernet.........................................................................................................................................319
Ensure Robustness in a Converged Ethernet Network.............................................................................................319
FIP Snooping on Ethernet Bridges...............................................................................................................................321
Using FIP Snooping....................................................................................................................................................... 323
FIP Snooping Prerequisites.....................................................................................................................................323
Important Points to Remember..............................................................................................................................323
Enabling the FCoE Transit Feature........................................................................................................................325
Enable FIP Snooping on VLANs.............................................................................................................................325
Congure the FC-MAP Value................................................................................................................................ 325
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 325
Congure a Port for a Bridge-to-FCF Link...........................................................................................................326
Impact on Other Software Features..................................................................................................................... 326
FIP Snooping Restrictions...................................................................................................................................... 326
Conguring FIP Snooping....................................................................................................................................... 327
Displaying FIP Snooping Information........................................................................................................................... 327
FCoE Transit Conguration Example...........................................................................................................................332
16 Flex Hash and Optimized Boot-Up............................................................................................................334
Flex Hash Capability Overview.....................................................................................................................................334
Conguring the Flex Hash Mechanism.......................................................................................................................334
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 335
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 336
17 Force10 Resilient Ring Protocol (FRRP)....................................................................................................337
Protocol Overview......................................................................................................................................................... 337
Ring Status............................................................................................................................................................... 338
Multiple FRRP Rings................................................................................................................................................338
Important FRRP Points...........................................................................................................................................339
Important FRRP Concepts..................................................................................................................................... 340
Implementing FRRP....................................................................................................................................................... 341
FRRP Conguration....................................................................................................................................................... 341
Creating the FRRP Group....................................................................................................................................... 341
Conguring the Control VLAN............................................................................................................................... 342
Conguring and Adding the Member VLANs.......................................................................................................343
Setting the FRRP Timers........................................................................................................................................344
Clearing the FRRP Counters.................................................................................................................................. 344
Viewing the FRRP Conguration...........................................................................................................................344
Viewing the FRRP Information.............................................................................................................................. 345
Troubleshooting FRRP.................................................................................................................................................. 345
Conguration Checks..............................................................................................................................................345
Contents
11
Sample Conguration and Topology............................................................................................................................345
FRRP Support on VLT...................................................................................................................................................347
Example Scenario.....................................................................................................................................................347
Important Points to Remember............................................................................................................................. 348
18 GARP VLAN Registration Protocol (GVRP)..............................................................................................350
Important Points to Remember................................................................................................................................... 350
Congure GVRP............................................................................................................................................................. 351
Related Conguration Tasks....................................................................................................................................351
Enabling GVRP Globally................................................................................................................................................ 352
Enabling GVRP on a Layer 2 Interface........................................................................................................................352
Congure GVRP Registration...................................................................................................................................... 352
Congure a GARP Timer.............................................................................................................................................. 353
19 Internet Group Management Protocol (IGMP)......................................................................................... 354
IGMP Implementation Information.............................................................................................................................. 354
IGMP Protocol Overview..............................................................................................................................................354
IGMP Version 2........................................................................................................................................................354
IGMP Version 3........................................................................................................................................................356
Congure IGMP............................................................................................................................................................. 359
Related Conguration Tasks...................................................................................................................................359
Viewing IGMP Enabled Interfaces...............................................................................................................................360
Selecting an IGMP Version...........................................................................................................................................360
Viewing IGMP Groups....................................................................................................................................................361
Adjusting Timers............................................................................................................................................................. 361
Adjusting Query and Response Timers..................................................................................................................361
Enabling IGMP Immediate-Leave.................................................................................................................................362
IGMP Snooping..............................................................................................................................................................362
IGMP Snooping Implementation Information.......................................................................................................362
Conguring IGMP Snooping...................................................................................................................................363
Removing a Group-Port Association..................................................................................................................... 363
Disabling Multicast Flooding...................................................................................................................................364
Specifying a Port as Connected to a Multicast Router...................................................................................... 364
Conguring the Switch as Querier........................................................................................................................ 364
Fast Convergence after MSTP Topology Changes...................................................................................................365
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................365
Protocol Separation.................................................................................................................................................366
Enabling and Disabling Management Egress Interface Selection...................................................................... 367
Handling of Management Route Conguration................................................................................................... 367
Handling of Switch-Initiated Trac....................................................................................................................... 368
Handling of Switch-Destined Trac......................................................................................................................369
Handling of Transit Trac (Trac Separation).................................................................................................... 369
Mapping of Management Applications and Trac Type.....................................................................................369
Behavior of Various Applications for Switch-Initiated Trac ............................................................................ 370
Behavior of Various Applications for Switch-Destined Trac ............................................................................371
Interworking of EIS With Various Applications..................................................................................................... 372
12
Contents
Designating a Multicast Router Interface................................................................................................................... 373
20 Interfaces.................................................................................................................................................374
Basic Interface Conguration....................................................................................................................................... 374
Advanced Interface Conguration............................................................................................................................... 374
Interface Types...............................................................................................................................................................375
View Basic Interface Information................................................................................................................................. 375
Resetting an Interface to its Factory Default State................................................................................................... 377
Enabling a Physical Interface........................................................................................................................................378
Physical Interfaces.........................................................................................................................................................378
Conguration Task List for Physical Interfaces.................................................................................................... 378
Overview of Layer Modes.......................................................................................................................................379
Conguring Layer 2 (Data Link) Mode..................................................................................................................379
Conguring Layer 2 (Interface) Mode...................................................................................................................379
Conguring Layer 3 (Network) Mode...................................................................................................................380
Conguring Layer 3 (Interface) Mode.................................................................................................................. 380
Egress Interface Selection (EIS)...................................................................................................................................381
Important Points to Remember.............................................................................................................................. 381
Conguring EIS.........................................................................................................................................................381
Management Interfaces................................................................................................................................................382
Conguring Management Interfaces.....................................................................................................................382
Conguring a Management Interface on an Ethernet Port................................................................................382
VLAN Interfaces.............................................................................................................................................................383
Loopback Interfaces...................................................................................................................................................... 384
Null Interfaces................................................................................................................................................................ 384
Port Channel Interfaces................................................................................................................................................384
Port Channel Denition and Standards.................................................................................................................385
Port Channel Benets.............................................................................................................................................385
Port Channel Implementation.................................................................................................................................385
Interfaces in Port Channels.................................................................................................................................... 386
Conguration Tasks for Port Channel Interfaces.................................................................................................386
Creating a Port Channel......................................................................................................................................... 386
Adding a Physical Interface to a Port Channel.....................................................................................................387
Reassigning an Interface to a New Port Channel................................................................................................388
Conguring the Minimum Oper Up Links in a Port Channel.............................................................................. 389
Adding or Removing a Port Channel from a VLAN............................................................................................. 389
Assigning an IP Address to a Port Channel.......................................................................................................... 390
Deleting or Disabling a Port Channel......................................................................................................................391
Load Balancing Through Port Channels................................................................................................................ 391
Load-Balancing Method.......................................................................................................................................... 391
Changing the Hash Algorithm................................................................................................................................392
Bulk Conguration......................................................................................................................................................... 393
Interface Range........................................................................................................................................................393
Bulk Conguration Examples..................................................................................................................................393
Dening Interface Range Macros................................................................................................................................ 395
Dene the Interface Range.................................................................................................................................... 395
Contents
13
Choosing an Interface-Range Macro.................................................................................................................... 395
Monitoring and Maintaining Interfaces....................................................................................................................... 395
Maintenance Using TDR.........................................................................................................................................396
Non Dell-Qualied Transceivers................................................................................................................................... 397
Splitting 100G Ports...................................................................................................................................................... 398
Link Dampening..............................................................................................................................................................398
Important Points to Remember............................................................................................................................. 399
Conguration Example of Link Dampening.......................................................................................................... 399
Enabling Link Dampening.........................................................................................................................................401
Link Bundle Monitoring................................................................................................................................................. 402
Using Ethernet Pause Frames for Flow Control........................................................................................................ 403
Enabling Pause Frames........................................................................................................................................... 403
Congure the MTU Size on an Interface....................................................................................................................404
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................405
Port-Pipes.......................................................................................................................................................................405
CR4 Auto-Negotiation.................................................................................................................................................. 405
Setting the Speed of Ethernet Interfaces.................................................................................................................. 406
Speed Setting on 25G Interfaces................................................................................................................................ 407
FEC Conguration......................................................................................................................................................... 408
View Advanced Interface Information..........................................................................................................................410
Conguring the Interface Sampling Size................................................................................................................ 411
Conguring the Trac Sampling Size Globally........................................................................................................... 412
Dynamic Counters.......................................................................................................................................................... 413
Clearing Interface Counters.................................................................................................................................... 414
Enhanced Validation of Interface Ranges....................................................................................................................414
Compressing Conguration Files..................................................................................................................................414
OUI on 25G and 50G Interfaces...................................................................................................................................417
Conguring OUI on 25G and 50G Interfaces........................................................................................................417
21 IPv4 Routing............................................................................................................................................. 418
IP Addresses....................................................................................................................................................................419
Implementation Information.................................................................................................................................... 419
Conguration Tasks for IP Addresses.......................................................................................................................... 419
Assigning IP Addresses to an Interface........................................................................................................................419
Conguring Static Routes.............................................................................................................................................420
Congure Static Routes for the Management Interface...........................................................................................421
Using the Congured Source IP Address in ICMP Messages..................................................................................422
Conguring the ICMP Source Interface............................................................................................................... 422
Conguring the Duration to Establish a TCP Connection........................................................................................ 422
Enabling Directed Broadcast........................................................................................................................................ 423
Resolution of Host Names............................................................................................................................................423
Enabling Dynamic Resolution of Host Names............................................................................................................423
Specifying the Local System Domain and a List of Domains....................................................................................424
Conguring DNS with Traceroute................................................................................................................................424
ARP................................................................................................................................................................................. 425
Conguration Tasks for ARP........................................................................................................................................ 425
14
Contents
Conguring Static ARP Entries....................................................................................................................................425
Enabling Proxy ARP.......................................................................................................................................................426
Clearing ARP Cache......................................................................................................................................................426
ARP Learning via Gratuitous ARP................................................................................................................................427
Enabling ARP Learning via Gratuitous ARP................................................................................................................ 427
ARP Learning via ARP Request....................................................................................................................................427
Conguring ARP Retries............................................................................................................................................... 428
ICMP............................................................................................................................................................................... 428
Conguration Tasks for ICMP......................................................................................................................................429
Enabling ICMP Unreachable Messages...................................................................................................................... 429
UDP Helper.....................................................................................................................................................................429
Congure UDP Helper.............................................................................................................................................429
Important Points to Remember............................................................................................................................. 429
Enabling UDP Helper.....................................................................................................................................................429
Conguring a Broadcast Address................................................................................................................................ 430
Congurations Using UDP Helper................................................................................................................................ 431
UDP Helper with Broadcast-All Addresses..................................................................................................................431
UDP Helper with Subnet Broadcast Addresses.........................................................................................................432
UDP Helper with Congured Broadcast Addresses..................................................................................................432
UDP Helper with No Congured Broadcast Addresses............................................................................................433
Troubleshooting UDP Helper........................................................................................................................................ 433
22 IPv6 Routing............................................................................................................................................434
Protocol Overview......................................................................................................................................................... 434
Extended Address Space........................................................................................................................................434
Path MTU discovery................................................................................................................................................434
Stateless Autoconguration................................................................................................................................... 435
IPv6 Headers............................................................................................................................................................436
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support................................................................... 436
IPv6 Header Fields...................................................................................................................................................437
Extension Header Fields..........................................................................................................................................438
Addressing................................................................................................................................................................ 439
Implementing IPv6 with Dell EMC Networking OS................................................................................................... 440
ICMPv6...........................................................................................................................................................................440
Path MTU discovery...................................................................................................................................................... 441
IPv6 Neighbor Discovery...............................................................................................................................................441
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................442
Conguring the IPv6 Recursive DNS Server....................................................................................................... 442
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................443
Displaying IPv6 RDNSS Information......................................................................................................................443
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 444
Conguration Tasks for IPv6........................................................................................................................................ 444
Adjusting Your CAM-Prole....................................................................................................................................444
Assigning an IPv6 Address to an Interface...........................................................................................................445
Assigning a Static IPv6 Route................................................................................................................................446
Conguring Telnet with IPv6..................................................................................................................................446
Contents
15
SNMP over IPv6......................................................................................................................................................447
Displaying IPv6 Information.................................................................................................................................... 447
Displaying an IPv6 Interface Information...............................................................................................................447
Showing IPv6 Routes..............................................................................................................................................448
Showing the Running-Conguration for an Interface......................................................................................... 449
Clearing IPv6 Routes...............................................................................................................................................450
Conguring IPv6 RA Guard.......................................................................................................................................... 450
23 iSCSI Optimization...................................................................................................................................453
iSCSI Optimization Overview....................................................................................................................................... 453
Monitoring iSCSI Trac Flows...............................................................................................................................455
Application of Quality of Service to iSCSI Trac Flows..................................................................................... 455
Information Monitored in iSCSI Trac Flows.......................................................................................................455
Detection and Auto-Conguration for Dell EqualLogic Arrays...........................................................................456
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................456
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................457
Enable and Disable iSCSI Optimization................................................................................................................. 457
Default iSCSI Optimization Values...............................................................................................................................458
iSCSI Optimization Prerequisites................................................................................................................................. 458
Conguring iSCSI Optimization................................................................................................................................... 458
Displaying iSCSI Optimization Information................................................................................................................. 460
24 Intermediate System to Intermediate System.......................................................................................... 462
IS-IS Protocol Overview................................................................................................................................................462
IS-IS Addressing.............................................................................................................................................................462
Multi-Topology IS-IS...................................................................................................................................................... 463
Transition Mode....................................................................................................................................................... 463
Interface Support.....................................................................................................................................................464
Adjacencies...............................................................................................................................................................464
Graceful Restart.............................................................................................................................................................464
Timers........................................................................................................................................................................464
Implementation Information..........................................................................................................................................464
Conguration Information.............................................................................................................................................465
Conguration Tasks for IS-IS..................................................................................................................................466
Conguring the Distance of a Route.....................................................................................................................473
Changing the IS-Type...............................................................................................................................................474
Redistributing IPv4 Routes..................................................................................................................................... 476
Redistributing IPv6 Routes..................................................................................................................................... 477
Conguring Authentication Passwords.................................................................................................................478
Setting the Overload Bit......................................................................................................................................... 478
Debugging IS-IS....................................................................................................................................................... 479
IS-IS Metric Styles.........................................................................................................................................................480
Congure Metric Values............................................................................................................................................... 480
Maximum Values in the Routing Table................................................................................................................... 481
Change the IS-IS Metric Style in One Level Only.................................................................................................481
Leaks from One Level to Another..........................................................................................................................482
16
Contents
Sample Congurations.................................................................................................................................................. 483
25 Link Aggregation Control Protocol (LACP).............................................................................................. 486
Introduction to Dynamic LAGs and LACP.................................................................................................................. 486
Important Points to Remember............................................................................................................................. 486
LACP Modes.............................................................................................................................................................487
Conguring LACP Commands............................................................................................................................... 487
LACP Conguration Tasks............................................................................................................................................488
Creating a LAG.........................................................................................................................................................488
Conguring the LAG Interfaces as Dynamic........................................................................................................ 488
Setting the LACP Long Timeout............................................................................................................................489
Monitoring and Debugging LACP..........................................................................................................................489
Shared LAG State Tracking.......................................................................................................................................... 490
Conguring Shared LAG State Tracking...............................................................................................................490
Important Points about Shared LAG State Tracking........................................................................................... 492
LACP Basic Conguration Example.............................................................................................................................492
Congure a LAG on ALPHA................................................................................................................................... 492
26 Layer 2..................................................................................................................................................... 501
Manage the MAC Address Table..................................................................................................................................501
Clearing the MAC Address Table............................................................................................................................501
Setting the Aging Time for Dynamic Entries.........................................................................................................501
Conguring a Static MAC Address........................................................................................................................502
Displaying the MAC Address Table........................................................................................................................502
MAC Learning Limit.......................................................................................................................................................502
Setting the MAC Learning Limit............................................................................................................................ 503
mac learning-limit Dynamic.................................................................................................................................... 503
mac learning-limit mac-address-sticky................................................................................................................. 503
mac learning-limit station-move............................................................................................................................ 504
mac learning-limit no-station-move...................................................................................................................... 504
Learning Limit Violation Actions.............................................................................................................................504
Setting Station Move Violation Actions................................................................................................................505
Recovering from Learning Limit and Station Move Violations...........................................................................505
Disabling MAC Address Learning on the System...................................................................................................... 506
NIC Teaming...................................................................................................................................................................506
Congure Redundant Pairs...........................................................................................................................................507
Important Points about Conguring Redundant Pairs........................................................................................509
Far-End Failure Detection..............................................................................................................................................510
FEFD State Changes................................................................................................................................................ 511
Conguring FEFD..................................................................................................................................................... 512
Enabling FEFD on an Interface............................................................................................................................... 512
Debugging FEFD.......................................................................................................................................................513
27 Link Layer Discovery Protocol (LLDP)...................................................................................................... 515
802.1AB (LLDP) Overview............................................................................................................................................ 515
Protocol Data Units.................................................................................................................................................. 515
Contents
17
Optional TLVs..................................................................................................................................................................516
Management TLVs................................................................................................................................................... 516
TIA-1057 (LLDP-MED) Overview................................................................................................................................. 518
TIA Organizationally Specic TLVs.........................................................................................................................518
Congure LLDP..............................................................................................................................................................522
Related Conguration Tasks...................................................................................................................................522
Important Points to Remember............................................................................................................................. 522
LLDP Compatibility..................................................................................................................................................522
CONFIGURATION versus INTERFACE Congurations............................................................................................ 522
Enabling LLDP................................................................................................................................................................523
Disabling and Undoing LLDP.................................................................................................................................. 523
Enabling LLDP on Management Ports........................................................................................................................523
Disabling and Undoing LLDP on Management Ports.......................................................................................... 524
Advertising TLVs............................................................................................................................................................ 524
Viewing the LLDP Conguration................................................................................................................................. 525
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................526
Examples of Viewing Information Advertised by Neighbors...............................................................................526
Conguring LLDPDU Intervals..................................................................................................................................... 527
Conguring Transmit and Receive Mode....................................................................................................................527
Conguring the Time to Live Value............................................................................................................................. 528
Debugging LLDP............................................................................................................................................................529
Relevant Management Objects................................................................................................................................... 530
28 Microsoft Network Load Balancing..........................................................................................................535
NLB Unicast Mode Scenario........................................................................................................................................535
NLB Multicast Mode Scenario.....................................................................................................................................535
Limitations of the NLB Feature....................................................................................................................................536
Microsoft Clustering......................................................................................................................................................536
Enable and Disable VLAN Flooding ............................................................................................................................ 536
Conguring a Switch for NLB .....................................................................................................................................536
Enabling a Switch for Multicast NLB.....................................................................................................................537
29 Multicast Source Discovery Protocol (MSDP)......................................................................................... 538
Protocol Overview.........................................................................................................................................................538
Anycast RP.....................................................................................................................................................................539
Implementation Information......................................................................................................................................... 540
Congure Multicast Source Discovery Protocol........................................................................................................540
Related Conguration Tasks...................................................................................................................................540
Enable MSDP................................................................................................................................................................. 544
Manage the Source-Active Cache..............................................................................................................................545
Viewing the Source-Active Cache........................................................................................................................ 545
Limiting the Source-Active Cache.........................................................................................................................545
Clearing the Source-Active Cache........................................................................................................................546
Enabling the Rejected Source-Active Cache....................................................................................................... 546
Accept Source-Active Messages that Fail the RFP Check......................................................................................546
Specifying Source-Active Messages...........................................................................................................................549
18
Contents
Limiting the Source-Active Messages from a Peer...................................................................................................550
Preventing MSDP from Caching a Local Source.......................................................................................................550
Preventing MSDP from Caching a Remote Source...................................................................................................551
Preventing MSDP from Advertising a Local Source.................................................................................................. 551
Logging Changes in Peership States...........................................................................................................................552
Terminating a Peership..................................................................................................................................................552
Clearing Peer Statistics.................................................................................................................................................553
Debugging MSDP..........................................................................................................................................................553
MSDP with Anycast RP................................................................................................................................................554
Conguring Anycast RP............................................................................................................................................... 555
Reducing Source-Active Message Flooding........................................................................................................ 556
Specifying the RP Address Used in SA Messages..............................................................................................556
MSDP Sample Congurations..................................................................................................................................... 558
30 Multicast Listener Discovery Protocol......................................................................................................561
MLD Version 1.................................................................................................................................................................561
MLD Querier Router.......................................................................................................................................................561
Joining a Multicast Group.............................................................................................................................................562
Leaving a Multicast Group............................................................................................................................................562
MLD version 2................................................................................................................................................................562
MLD timers.....................................................................................................................................................................564
Reducing Host Response Burstiness.................................................................................................................... 565
Clearing MLD groups.................................................................................................................................................... 565
Debugging MLD.............................................................................................................................................................565
Explicit Tracking.............................................................................................................................................................565
Reducing Leave Latency...............................................................................................................................................565
Displaying MLD groups table........................................................................................................................................566
Displaying MLD Interfaces............................................................................................................................................566
MLD Snooping............................................................................................................................................................... 566
Enable MLD Snooping............................................................................................................................................ 566
Disable MLD Snooping............................................................................................................................................ 567
Congure the switch as a querier..........................................................................................................................567
Specify port as connected to multicast router.................................................................................................... 567
Enable Snooping Explicit Tracking.........................................................................................................................568
Display the MLD Snooping Table........................................................................................................................... 568
31 Multiple Spanning Tree Protocol (MSTP).................................................................................................569
Protocol Overview.........................................................................................................................................................569
Spanning Tree Variations...............................................................................................................................................570
Implementation Information....................................................................................................................................570
Congure Multiple Spanning Tree Protocol................................................................................................................570
Related Conguration Tasks....................................................................................................................................571
Enable Multiple Spanning Tree Globally....................................................................................................................... 571
Adding and Removing Interfaces..................................................................................................................................571
Creating Multiple Spanning Tree Instances................................................................................................................ 572
Inuencing MSTP Root Selection................................................................................................................................573
Contents
19
Interoperate with Non-Dell Bridges............................................................................................................................. 574
Changing the Region Name or Revision......................................................................................................................574
Modifying Global Parameters........................................................................................................................................574
Modifying the Interface Parameters............................................................................................................................576
Conguring an EdgePort...............................................................................................................................................577
Flush MAC Addresses after a Topology Change........................................................................................................577
MSTP Sample Congurations...................................................................................................................................... 578
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration....................................................................................... 578
Debugging and Verifying MSTP Congurations........................................................................................................ 582
32 Multicast Features...................................................................................................................................584
Enabling IP Multicast.....................................................................................................................................................584
Implementation Information..........................................................................................................................................584
Multicast Policies...........................................................................................................................................................585
IPv4 Multicast Policies............................................................................................................................................585
Understanding Multicast Traceroute (mtrace).......................................................................................................... 592
Important Points to Remember............................................................................................................................. 593
Printing Multicast Traceroute (mtrace) Paths........................................................................................................... 593
Supported Error Codes.................................................................................................................................................594
mtrace Scenarios...........................................................................................................................................................595
33 Object Tracking........................................................................................................................................ 601
Object Tracking Overview............................................................................................................................................. 601
Track Layer 2 Interfaces..........................................................................................................................................602
Track Layer 3 Interfaces..........................................................................................................................................602
Track IPv4 and IPv6 Routes................................................................................................................................... 603
Set Tracking Delays................................................................................................................................................. 604
VRRP Object Tracking............................................................................................................................................ 604
Object Tracking Conguration..................................................................................................................................... 604
Tracking a Layer 2 Interface................................................................................................................................... 604
Tracking a Layer 3 Interface...................................................................................................................................605
Track an IPv4/IPv6 Route...................................................................................................................................... 607
Displaying Tracked Objects........................................................................................................................................... 610
34 Open Shortest Path First (OSPFv2 and OSPFv3).................................................................................... 612
Protocol Overview..........................................................................................................................................................612
Autonomous System (AS) Areas............................................................................................................................ 612
Area Types................................................................................................................................................................. 613
Networks and Neighbors.........................................................................................................................................614
Router Types............................................................................................................................................................. 614
Designated and Backup Designated Routers........................................................................................................616
Link-State Advertisements (LSAs).........................................................................................................................616
Router Priority and Cost..........................................................................................................................................617
OSPF with Dell EMC Networking OS..........................................................................................................................618
Graceful Restart....................................................................................................................................................... 619
20
Contents
/