PowerSwitch S4048-ON

Dell PowerSwitch S4048-ON User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4048-ON User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S4048–ON
System
9.14.0.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2018 - 07
Rev. A00
Contents
1 About this Guide...........................................................................................................................................38
Audience............................................................................................................................................................................38
Conventions......................................................................................................................................................................38
Related Documents......................................................................................................................................................... 38
2 Conguration Fundamentals........................................................................................................................ 39
Accessing the Command Line........................................................................................................................................39
CLI Modes.........................................................................................................................................................................39
Navigating CLI Modes................................................................................................................................................41
The do Command............................................................................................................................................................ 44
Undoing Commands........................................................................................................................................................ 44
Obtaining Help..................................................................................................................................................................45
Entering and Editing Commands................................................................................................................................... 45
Command History............................................................................................................................................................46
Filtering show Command Outputs.................................................................................................................................46
Example of the grep Keyword.................................................................................................................................. 46
Multiple Users in Conguration Mode........................................................................................................................... 47
3 Getting Started............................................................................................................................................48
Console Access................................................................................................................................................................49
Serial Console.............................................................................................................................................................49
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................50
Entering CLI commands Using an SSH Connection..............................................................................................50
Executing Local CLI Scripts Using an SSH Connection........................................................................................50
Default Conguration....................................................................................................................................................... 51
Conguring a Host Name................................................................................................................................................ 51
Accessing the System Remotely.................................................................................................................................... 51
Accessing the System Remotely.............................................................................................................................. 51
Congure the Management Port IP Address..........................................................................................................51
Congure a Management Route..............................................................................................................................52
Conguring a Username and Password..................................................................................................................52
Conguring the Enable Password..................................................................................................................................53
Conguration File Management.....................................................................................................................................53
Copy Files to and from the System......................................................................................................................... 54
Mounting an NFS File System..................................................................................................................................54
Save the Running-Conguration..............................................................................................................................56
Congure the Overload Bit for a Startup Scenario................................................................................................57
Viewing Files............................................................................................................................................................... 57
Compressing Conguration Files............................................................................................................................. 58
Managing the File System.............................................................................................................................................. 60
Enabling Software Features on Devices Using a Command Option.......................................................................... 61
View Command History.................................................................................................................................................. 62
Contents
3
Upgrading Dell EMC Networking OS............................................................................................................................ 62
Verify Software Images Before Installation...................................................................................................................62
Using HTTP for File Transfers........................................................................................................................................ 63
4 Management............................................................................................................................................... 65
Conguring Privilege Levels........................................................................................................................................... 65
Creating a Custom Privilege Level...........................................................................................................................66
Removing a Command from EXEC Mode.............................................................................................................. 66
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................66
Allowing Access to CONFIGURATION Mode Commands....................................................................................66
Allowing Access to Dierent Modes........................................................................................................................66
Applying a Privilege Level to a Username............................................................................................................... 68
Applying a Privilege Level to a Terminal Line.......................................................................................................... 68
Conguring Logging........................................................................................................................................................ 68
Audit and Security Logs............................................................................................................................................ 69
Conguring Logging Format ....................................................................................................................................71
Display the Logging Buer and the Logging Conguration...................................................................................71
Setting Up a Secure Connection to a Syslog Server.............................................................................................72
Sending System Messages to a Syslog Server...................................................................................................... 73
Track Login Activity..........................................................................................................................................................73
Restrictions for Tracking Login Activity...................................................................................................................73
Conguring Login Activity Tracking......................................................................................................................... 73
Display Login Statistics.............................................................................................................................................. 74
Limit Concurrent Login Sessions....................................................................................................................................75
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................75
Conguring Concurrent Session Limit.....................................................................................................................76
Enabling the System to Clear Existing Sessions.................................................................................................... 76
Enabling Secured CLI Mode............................................................................................................................................77
Log Messages in the Internal Buer.............................................................................................................................. 77
Conguration Task List for System Log Management...........................................................................................77
Disabling System Logging................................................................................................................................................77
Sending System Messages to a Syslog Server............................................................................................................ 78
Conguring a UNIX System as a Syslog Server.....................................................................................................78
Changing System Logging Settings...............................................................................................................................78
Display the Logging Buer and the Logging Conguration........................................................................................ 79
Conguring a UNIX Logging Facility Level....................................................................................................................80
Synchronizing Log Messages..........................................................................................................................................81
Enabling Timestamp on Syslog Messages.....................................................................................................................81
File Transfer Services...................................................................................................................................................... 82
Conguration Task List for File Transfer Services..................................................................................................82
Enabling the FTP Server...........................................................................................................................................82
Conguring FTP Server Parameters....................................................................................................................... 82
Conguring FTP Client Parameters.........................................................................................................................83
Terminal Lines...................................................................................................................................................................83
Denying and Permitting Access to a Terminal Line................................................................................................84
Conguring Login Authentication for Terminal Lines.............................................................................................85
4
Contents
Setting Timeout for EXEC Privilege Mode................................................................................................................... 86
Using Telnet to get to Another Network Device..........................................................................................................86
Lock CONFIGURATION Mode....................................................................................................................................... 87
Viewing the Conguration Lock Status...................................................................................................................87
Reloading the system.......................................................................................................................................................87
Restoring the Factory Default Settings.........................................................................................................................88
Important Points to Remember................................................................................................................................88
Restoring Factory Default Environment Variables................................................................................................. 89
Viewing the Reason for Last System Reboot.............................................................................................................. 90
5 802.1X.......................................................................................................................................................... 91
Port-Authentication Process.......................................................................................................................................... 93
EAP over RADIUS......................................................................................................................................................93
Conguring 802.1X...........................................................................................................................................................94
Related Conguration Tasks..................................................................................................................................... 94
Important Points to Remember......................................................................................................................................94
Enabling 802.1X................................................................................................................................................................ 95
Conguring dot1x Prole ................................................................................................................................................96
Conguring MAC addresses for a do1x Prole............................................................................................................. 97
Conguring the Static MAB and MAB Prole ............................................................................................................. 97
Conguring Critical VLAN ..............................................................................................................................................98
Conguring Request Identity Re-Transmissions...........................................................................................................99
Conguring a Quiet Period after a Failed Authentication..................................................................................... 99
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................100
Re-Authenticating a Port............................................................................................................................................... 101
Conguring Timeouts.....................................................................................................................................................102
Conguring Dynamic VLAN Assignment with Port Authentication......................................................................... 103
Guest and Authentication-Fail VLANs.........................................................................................................................104
Conguring a Guest VLAN......................................................................................................................................104
Conguring an Authentication-Fail VLAN............................................................................................................. 104
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 106
Optimizing CAM Utilization During the Attachment of ACLs to VLANs................................................................. 106
Guidelines for Conguring ACL VLAN Groups............................................................................................................107
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters...............................................107
Conguring ACL VLAN Groups.............................................................................................................................. 107
Conguring FP Blocks for VLAN Parameters.......................................................................................................108
Viewing CAM Usage...................................................................................................................................................... 109
Allocating FP Blocks for VLAN Processes................................................................................................................... 110
Unied Forwarding Table (UFT) Modes........................................................................................................................111
Conguring UFT Modes............................................................................................................................................111
7 Access Control Lists (ACLs)........................................................................................................................112
IP Access Control Lists (ACLs)......................................................................................................................................113
CAM Usage................................................................................................................................................................114
Implementing ACLs on Dell EMC Networking OS.................................................................................................114
Contents
5
Important Points to Remember.....................................................................................................................................116
Conguration Task List for Route Maps.................................................................................................................116
Conguring Match Routes.......................................................................................................................................118
Conguring Set Conditions..................................................................................................................................... 120
Congure a Route Map for Route Redistribution..................................................................................................121
Congure a Route Map for Route Tagging............................................................................................................ 121
Continue Clause........................................................................................................................................................122
IP Fragment Handling.................................................................................................................................................... 122
IP Fragments ACL Examples...................................................................................................................................122
Layer 4 ACL Rules Examples...................................................................................................................................123
Congure a Standard IP ACL........................................................................................................................................ 123
Conguring a Standard IP ACL Filter..................................................................................................................... 124
Congure an Extended IP ACL.....................................................................................................................................125
Conguring Filters with a Sequence Number.......................................................................................................125
Conguring Filters Without a Sequence Number.................................................................................................127
Congure Layer 2 and Layer 3 ACLs............................................................................................................................127
Assign an IP ACL to an Interface..................................................................................................................................128
Applying an IP ACL.........................................................................................................................................................128
Counting ACL Hits....................................................................................................................................................129
Congure Ingress ACLs................................................................................................................................................. 129
Congure Egress ACLs..................................................................................................................................................130
Applying Egress Layer 3 ACLs (Control-Plane)..................................................................................................... 131
IP Prex Lists................................................................................................................................................................... 131
Implementation Information.................................................................................................................................... 132
Conguration Task List for Prex Lists.................................................................................................................. 132
ACL Remarks.................................................................................................................................................................. 135
Conguring a Remark.............................................................................................................................................. 135
Deleting a Remark.................................................................................................................................................... 136
ACL Resequencing......................................................................................................................................................... 137
Resequencing an ACL or Prex List.......................................................................................................................137
Route Maps.....................................................................................................................................................................138
Implementation Information.................................................................................................................................... 138
Logging of ACL Processes............................................................................................................................................ 139
Guidelines for Conguring ACL Logging................................................................................................................140
Conguring ACL Logging........................................................................................................................................ 140
Flow-Based Monitoring.................................................................................................................................................. 141
Behavior of Flow-Based Monitoring....................................................................................................................... 141
Enabling Flow-Based Monitoring............................................................................................................................142
Conguring UDF ACL.....................................................................................................................................................143
Conguring IP Mirror Access Group............................................................................................................................ 146
Sample Conguration...............................................................................................................................................147
Example of viewing IP mirror–access–group applied to an Interface................................................................147
8 Bidirectional Forwarding Detection (BFD).................................................................................................. 148
How BFD Works............................................................................................................................................................. 148
BFD Packet Format..................................................................................................................................................149
6
Contents
BFD Sessions............................................................................................................................................................ 150
BFD Three-Way Handshake.....................................................................................................................................151
Session State Changes............................................................................................................................................153
Important Points to Remember.................................................................................................................................... 153
Congure BFD................................................................................................................................................................ 153
Congure BFD for Physical Ports...........................................................................................................................154
Congure BFD for Static Routes............................................................................................................................155
Congure BFD for IPv6 Static Routes...................................................................................................................159
Congure BFD for OSPF..........................................................................................................................................161
Congure BFD for OSPFv3.....................................................................................................................................166
Congure BFD for IS-IS...........................................................................................................................................169
Congure BFD for BGP............................................................................................................................................171
Congure BFD for VRRP.........................................................................................................................................179
Conguring Protocol Liveness.................................................................................................................................181
9 Border Gateway Protocol (BGP)................................................................................................................ 182
Border Gateway Protocol version 4 (BGPv4).............................................................................................................182
Autonomous Systems (AS)........................................................................................................................................... 182
AS4 Number Representation.................................................................................................................................. 184
Four-Byte AS Numbers............................................................................................................................................186
Multiprotocol BGP..........................................................................................................................................................186
MBGP for IPv4 MulticastBGP Address Family modelIPv4 and IPv6 address family........................................187
Sessions and Peers.........................................................................................................................................................187
Establish a Session................................................................................................................................................... 187
Implementing BGP global and address family.............................................................................................................188
BGP global conguration default values................................................................................................................189
BGP Attributes for selecting Best Path.......................................................................................................................189
Best Path Selection Criteria....................................................................................................................................190
Weight........................................................................................................................................................................ 191
Local Preference.......................................................................................................................................................192
Multi-Exit Discriminators (MEDs)...........................................................................................................................192
Origin..........................................................................................................................................................................193
AS Path......................................................................................................................................................................194
Next Hop................................................................................................................................................................... 194
Implement BGP with Dell EMC Networking OS.........................................................................................................195
Additional Path (Add-Path) Support......................................................................................................................195
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 195
Ignore Router-ID in Best-Path Calculation............................................................................................................ 196
AS Number Migration.............................................................................................................................................. 196
BGP4 Management Information Base (MIB)........................................................................................................197
Important Points to Remember.............................................................................................................................. 197
Conguration Information..............................................................................................................................................198
Conguring a basic BGP network................................................................................................................................ 198
Enabling BGP............................................................................................................................................................ 198
Conguring a BGP peer...........................................................................................................................................201
Conguring AS4 Number Representations.......................................................................................................... 202
Contents
7
Conguring a BGP VRF address family................................................................................................................ 203
Route-refresh and Soft-reconguration...............................................................................................................205
Aggregating Routes.................................................................................................................................................208
Filtering BGP Routes...............................................................................................................................................208
Filtering BGP Routes Using Route Maps...............................................................................................................210
Filtering BGP Routes Using AS-PATH Information.............................................................................................. 210
Conguring Peer Groups..........................................................................................................................................211
Conguring BGP Fast Fall-Over.............................................................................................................................219
Conguring Passive Peering...................................................................................................................................220
Maintaining Existing AS Numbers During an AS Migration................................................................................. 221
Allowing an AS Number to Appear in its Own AS Path...................................................................................... 222
Enabling Graceful Restart.......................................................................................................................................223
Filtering on an AS-Path Attribute...........................................................................................................................224
Regular Expressions as Filters................................................................................................................................225
Redistributing Routes..............................................................................................................................................226
Enabling Additional Paths........................................................................................................................................227
Conguring IP Community Lists.............................................................................................................................227
Conguring an IP Extended Community List....................................................................................................... 228
Filtering Routes with Community Lists................................................................................................................. 229
Manipulating the COMMUNITY Attribute............................................................................................................230
Changing MED Attributes........................................................................................................................................231
Changing the LOCAL_PREFERENCE Attribute..................................................................................................232
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes.............232
Changing the WEIGHT Attribute........................................................................................................................... 233
Enabling Multipath...................................................................................................................................................233
Route Reectors......................................................................................................................................................234
Conguring BGP Confederations.......................................................................................................................... 235
Enabling Route Flap Dampening............................................................................................................................ 235
Changing BGP Timers.............................................................................................................................................238
Setting the extended timer.....................................................................................................................................238
Enabling or disabling BGP neighbors.....................................................................................................................239
Route Map Continue............................................................................................................................................... 240
Enabling MBGP Congurations.................................................................................................................................... 241
MBGP support for IPv6.................................................................................................................................................241
Conguring IPv6 MBGP between peers..................................................................................................................... 241
Example-Conguring IPv4 and IPv6 neighbors......................................................................................................... 242
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor............................................... 244
BGP Regular Expression Optimization........................................................................................................................246
Debugging BGP..............................................................................................................................................................246
Storing Last and Bad PDUs.................................................................................................................................... 247
Capturing PDUs....................................................................................................................................................... 248
PDU Counters.......................................................................................................................................................... 249
10 Content Addressable Memory (CAM)...................................................................................................... 250
CAM Allocation.............................................................................................................................................................. 250
Test CAM Usage............................................................................................................................................................252
8
Contents
View CAM-ACL Settings.............................................................................................................................................. 252
View CAM Usage...........................................................................................................................................................254
Conguring CAM Threshold and Silence Period........................................................................................................254
Setting CAM Threshold and Silence Period......................................................................................................... 254
CAM Optimization......................................................................................................................................................... 255
Troubleshoot CAM Proling..........................................................................................................................................256
QoS CAM Region Limitation...................................................................................................................................256
11 Control Plane Policing (CoPP).................................................................................................................. 257
Congure Control Plane Policing................................................................................................................................. 258
Conguring CoPP for Protocols............................................................................................................................ 259
Conguring CoPP for CPU Queues....................................................................................................................... 261
CoPP for OSPFv3 Packets.....................................................................................................................................262
Conguring CoPP for OSPFv3.............................................................................................................................. 265
Displaying CoPP Conguration .............................................................................................................................265
12 Data Center Bridging (DCB).....................................................................................................................268
Ethernet Enhancements in Data Center Bridging..................................................................................................... 268
Priority-Based Flow Control................................................................................................................................... 269
Enhanced Transmission Selection..........................................................................................................................270
Data Center Bridging Exchange Protocol (DCBx)................................................................................................271
Data Center Bridging in a Trac Flow...................................................................................................................272
Enabling Data Center Bridging..................................................................................................................................... 272
DCB Maps and its Attributes..................................................................................................................................273
Data Center Bridging: Default Conguration.............................................................................................................. 274
Conguring Priority-Based Flow Control.................................................................................................................... 274
Conguring Lossless Queues..................................................................................................................................275
Conguring PFC in a DCB Map................................................................................................................................... 276
PFC Conguration Notes........................................................................................................................................276
PFC Prerequisites and Restrictions....................................................................................................................... 277
Applying a DCB Map on a Port.....................................................................................................................................277
Conguring PFC without a DCB Map.........................................................................................................................278
Conguring Lossless QueuesExample:..................................................................................................................278
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................280
Pause and Resume of Trac..................................................................................................................................280
Buer Sizes for Lossless or PFC Packets............................................................................................................ 280
Behavior of Tagged Packets..........................................................................................................................................281
Conguration Example for DSCP and PFC Priorities.................................................................................................281
Using PFC to Manage Converged Ethernet Trac...................................................................................................282
Congure Enhanced Transmission Selection..............................................................................................................282
ETS Prerequisites and Restrictions........................................................................................................................282
Creating an ETS Priority Group..............................................................................................................................283
ETS Operation with DCBx...................................................................................................................................... 284
Conguring Bandwidth Allocation for DCBx CIN.................................................................................................284
Conguring ETS in a DCB Map..............................................................................................................................285
Hierarchical Scheduling in ETS Output Policies.........................................................................................................286
Contents
9
Using ETS to Manage Converged Ethernet Trac................................................................................................... 287
Applying DCB Policies in a Switch Stack.....................................................................................................................287
Congure a DCBx Operation........................................................................................................................................ 287
DCBx Operation....................................................................................................................................................... 287
DCBx Port Roles...................................................................................................................................................... 288
DCB Conguration Exchange................................................................................................................................ 289
Conguration Source Election................................................................................................................................289
Propagation of DCB Information........................................................................................................................... 290
Auto-Detection and Manual Conguration of the DCBx Version...................................................................... 290
DCBx Example.......................................................................................................................................................... 291
DCBx Prerequisites and Restrictions..................................................................................................................... 291
Conguring DCBx.....................................................................................................................................................291
Verifying the DCB Conguration................................................................................................................................. 295
QoS dot1p Trac Classication and Queue Assignment..........................................................................................304
Conguring the Dynamic Buer Method................................................................................................................... 305
Sample DCB Conguration...........................................................................................................................................306
PFC and ETS Conguration Command Examples...............................................................................................308
13 Dynamic Host Conguration Protocol (DHCP).........................................................................................309
DHCP Packet Format and Options............................................................................................................................. 309
Assign an IP Address using DHCP................................................................................................................................ 311
Implementation Information.......................................................................................................................................... 312
Congure the System to be a DHCP Server.............................................................................................................. 312
Conguring the Server for Automatic Address Allocation...................................................................................313
Specifying a Default Gateway.................................................................................................................................314
Congure a Method of Hostname Resolution...................................................................................................... 315
Using DNS for Address Resolution.........................................................................................................................315
Using NetBIOS WINS for Address Resolution...................................................................................................... 315
Creating Manual Binding Entries............................................................................................................................ 315
Debugging the DHCP Server..................................................................................................................................316
Using DHCP Clear Commands............................................................................................................................... 316
Congure the System to be a Relay Agent................................................................................................................. 316
Congure the System to be a DHCP Client................................................................................................................318
Conguring the DHCP Client System....................................................................................................................318
DHCP Client on a Management Interface............................................................................................................320
DHCP Client Operation with Other Features.......................................................................................................320
DHCP Relay When DHCP Server and Client are in Dierent VRFs.........................................................................321
Conguring Route Leaking between VRFs on DHCP Relay Agent.................................................................... 321
Congure the System for User Port Stacking (Option 230)....................................................................................322
Congure Secure DHCP............................................................................................................................................... 323
Option 82.................................................................................................................................................................. 323
DHCP Snooping....................................................................................................................................................... 324
Drop DHCP Packets on Snooped VLANs Only....................................................................................................328
Dynamic ARP Inspection.........................................................................................................................................329
Conguring Dynamic ARP Inspection................................................................................................................... 330
Source Address Validation............................................................................................................................................. 331
10
Contents
Enabling IP Source Address Validation...................................................................................................................331
DHCP MAC Source Address Validation................................................................................................................ 332
Enabling IP+MAC Source Address Validation.......................................................................................................332
Viewing the Number of SAV Dropped Packets....................................................................................................333
Clearing the Number of SAV Dropped Packets................................................................................................... 333
14 Equal Cost Multi-Path (ECMP)................................................................................................................ 334
ECMP for Flow-Based Anity.....................................................................................................................................334
Conguring the Hash Algorithm............................................................................................................................ 334
Enabling Deterministic ECMP Next Hop.............................................................................................................. 334
Conguring the Hash Algorithm Seed.................................................................................................................. 335
Link Bundle Monitoring................................................................................................................................................. 335
Managing ECMP Group Paths...............................................................................................................................336
Creating an ECMP Group Bundle..........................................................................................................................336
Modifying the ECMP Group Threshold.................................................................................................................336
RTAG7............................................................................................................................................................................. 337
Flow-based Hashing for ECMP................................................................................................................................... 338
15 FIP Snooping............................................................................................................................................ 341
Fibre Channel over Ethernet.........................................................................................................................................341
Ensure Robustness in a Converged Ethernet Network.............................................................................................341
FIP Snooping on Ethernet Bridges.............................................................................................................................. 343
FIP Snooping in a Switch Stack...................................................................................................................................345
Using FIP Snooping....................................................................................................................................................... 345
FIP Snooping Prerequisites.....................................................................................................................................345
Important Points to Remember............................................................................................................................. 345
Enabling the FCoE Transit Feature........................................................................................................................346
Enable FIP Snooping on VLANs.............................................................................................................................347
Congure the FC-MAP Value.................................................................................................................................347
Congure a Port for a Bridge-to-Bridge Link....................................................................................................... 347
Congure a Port for a Bridge-to-FCF Link...........................................................................................................347
Impact on Other Software Features......................................................................................................................347
FIP Snooping Restrictions...................................................................................................................................... 348
Conguring FIP Snooping.......................................................................................................................................348
Displaying FIP Snooping Information...........................................................................................................................349
FCoE Transit Conguration Example...........................................................................................................................354
16 Flex Hash and Optimized Boot-Up............................................................................................................356
Flex Hash Capability Overview.................................................................................................................................... 356
Conguring the Flex Hash Mechanism.......................................................................................................................356
Conguring Fast Boot and LACP Fast Switchover................................................................................................... 357
Optimizing the Boot Time.............................................................................................................................................357
Booting Process When Optimized Boot Time Mechanism is Enabled.............................................................. 357
Guidelines for Conguring Optimized Booting Mechanism................................................................................358
Interoperation of Applications with Fast Boot and System States..........................................................................359
LACP and IPv4 Routing.......................................................................................................................................... 359
Contents
11
LACP and IPv6 Routing..........................................................................................................................................359
BGP Graceful Restart............................................................................................................................................. 360
Cold Boot Caused by Power Cycling the System............................................................................................... 360
Unexpected Reload of the System........................................................................................................................360
Software Upgrade................................................................................................................................................... 360
LACP Fast Switchover............................................................................................................................................360
Changes to BGP Multipath..................................................................................................................................... 361
Delayed Installation of ECMP Routes Into BGP................................................................................................... 361
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................ 361
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 362
17 FIPS Cryptography...................................................................................................................................363
Conguration Tasks....................................................................................................................................................... 363
Preparing the System....................................................................................................................................................363
Enabling FIPS Mode...................................................................................................................................................... 364
Generating Host-Keys...................................................................................................................................................364
Monitoring FIPS Mode Status......................................................................................................................................364
Disabling FIPS Mode..................................................................................................................................................... 365
18 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 366
Protocol Overview.........................................................................................................................................................366
Ring Status............................................................................................................................................................... 367
Multiple FRRP Rings................................................................................................................................................367
Important FRRP Points...........................................................................................................................................368
Important FRRP Concepts.....................................................................................................................................369
Implementing FRRP.......................................................................................................................................................370
FRRP Conguration.......................................................................................................................................................370
Creating the FRRP Group.......................................................................................................................................370
Conguring the Control VLAN................................................................................................................................371
Conguring and Adding the Member VLANs.......................................................................................................372
Setting the FRRP Timers........................................................................................................................................ 373
Clearing the FRRP Counters.................................................................................................................................. 373
Viewing the FRRP Conguration........................................................................................................................... 373
Viewing the FRRP Information...............................................................................................................................373
Troubleshooting FRRP...................................................................................................................................................374
Conguration Checks.............................................................................................................................................. 374
Sample Conguration and Topology............................................................................................................................ 374
FRRP Support on VLT...................................................................................................................................................375
Example Scenario.....................................................................................................................................................376
Important Points to Remember..............................................................................................................................377
19 GARP VLAN Registration Protocol (GVRP).............................................................................................. 378
Important Points to Remember....................................................................................................................................378
Congure GVRP.............................................................................................................................................................379
Related Conguration Tasks................................................................................................................................... 379
Enabling GVRP Globally................................................................................................................................................ 380
12
Contents
Enabling GVRP on a Layer 2 Interface........................................................................................................................380
Congure GVRP Registration...................................................................................................................................... 380
Congure a GARP Timer............................................................................................................................................... 381
RPM Redundancy...........................................................................................................................................................381
20 High Availability (HA)...............................................................................................................................383
Component Redundancy.............................................................................................................................................. 383
Automatic and Manual Stack Unit Failover.......................................................................................................... 383
Synchronization between Management and Standby Units..............................................................................384
Forcing a Stack Unit Failover................................................................................................................................. 384
Specifying an Auto-Failover Limit..........................................................................................................................385
Disabling Auto-Reboot............................................................................................................................................ 385
Pre-Conguring a Stack Unit Slot............................................................................................................................... 385
Removing a Provisioned Logical Stack Unit............................................................................................................... 385
Hitless Behavior............................................................................................................................................................. 385
Graceful Restart.............................................................................................................................................................386
Software Resiliency....................................................................................................................................................... 386
Software Component Health Monitoring............................................................................................................. 386
System Health Monitoring......................................................................................................................................386
Failure and Event Logging.......................................................................................................................................387
Hot-Lock Behavior.........................................................................................................................................................387
21 Internet Group Management Protocol (IGMP)......................................................................................... 388
IGMP Implementation Information.............................................................................................................................. 388
IGMP Protocol Overview..............................................................................................................................................388
IGMP Version 2........................................................................................................................................................ 388
IGMP Version 3........................................................................................................................................................390
Congure IGMP............................................................................................................................................................. 393
Related Conguration Tasks...................................................................................................................................393
Viewing IGMP Enabled Interfaces............................................................................................................................... 394
Selecting an IGMP Version...........................................................................................................................................394
Viewing IGMP Groups...................................................................................................................................................395
Adjusting Timers............................................................................................................................................................ 395
Adjusting Query and Response Timers................................................................................................................. 395
Preventing a Host from Joining a Group.................................................................................................................... 396
Enabling IGMP Immediate-Leave................................................................................................................................ 399
IGMP Snooping..............................................................................................................................................................399
IGMP Snooping Implementation Information.......................................................................................................399
Conguring IGMP Snooping...................................................................................................................................399
Removing a Group-Port Association.....................................................................................................................400
Disabling Multicast Flooding...................................................................................................................................400
Specifying a Port as Connected to a Multicast Router....................................................................................... 401
Conguring the Switch as Querier.........................................................................................................................401
Fast Convergence after MSTP Topology Changes...................................................................................................402
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................402
Protocol Separation.................................................................................................................................................402
Contents
13
Enabling and Disabling Management Egress Interface Selection...................................................................... 403
Handling of Management Route Conguration................................................................................................... 404
Handling of Switch-Initiated Trac.......................................................................................................................405
Handling of Switch-Destined Trac..................................................................................................................... 405
Handling of Transit Trac (Trac Separation).................................................................................................... 406
Mapping of Management Applications and Trac Type.....................................................................................406
Behavior of Various Applications for Switch-Initiated Trac ............................................................................ 407
Behavior of Various Applications for Switch-Destined Trac .......................................................................... 408
Interworking of EIS With Various Applications.....................................................................................................409
Designating a Multicast Router Interface...................................................................................................................409
22 Interfaces..................................................................................................................................................411
Basic Interface Conguration........................................................................................................................................ 411
Advanced Interface Conguration................................................................................................................................ 411
Interface Types................................................................................................................................................................412
View Basic Interface Information..................................................................................................................................412
Resetting an Interface to its Factory Default State................................................................................................... 414
Enabling a Physical Interface........................................................................................................................................ 415
Physical Interfaces......................................................................................................................................................... 415
Conguration Task List for Physical Interfaces.....................................................................................................415
Overview of Layer Modes....................................................................................................................................... 416
Conguring Layer 2 (Data Link) Mode.................................................................................................................. 416
Conguring Layer 2 (Interface) Mode................................................................................................................... 416
Conguring Layer 3 (Network) Mode....................................................................................................................417
Conguring Layer 3 (Interface) Mode................................................................................................................... 417
Monitoring internal physical temperature of 10GBase-T optical ports.....................................................................418
Enabling temperature polling on ports.................................................................................................................. 420
Setting the reset port to normal mode................................................................................................................. 420
Automatic recovery of an Err-disabled interface....................................................................................................... 420
Conguring an automatic recovery for an Err-disabled interface.......................................................................421
Egress Interface Selection (EIS)..................................................................................................................................422
Important Points to Remember..............................................................................................................................422
Conguring EIS........................................................................................................................................................ 422
Management Interfaces................................................................................................................................................422
Conguring Management Interfaces.....................................................................................................................422
Conguring a Management Interface on an Ethernet Port................................................................................424
VLAN Interfaces............................................................................................................................................................ 425
Loopback Interfaces......................................................................................................................................................425
Null Interfaces................................................................................................................................................................ 426
Port Channel Interfaces................................................................................................................................................ 426
Port Channel Denition and Standards.................................................................................................................426
Port Channel Benets.............................................................................................................................................426
Port Channel Implementation.................................................................................................................................427
Interfaces in Port Channels.....................................................................................................................................427
Conguration Tasks for Port Channel Interfaces.................................................................................................428
Creating a Port Channel..........................................................................................................................................428
14
Contents
Adding a Physical Interface to a Port Channel.....................................................................................................428
Reassigning an Interface to a New Port Channel................................................................................................430
Conguring the Minimum Oper Up Links in a Port Channel............................................................................... 431
Adding or Removing a Port Channel from a VLAN.............................................................................................. 431
Assigning an IP Address to a Port Channel.......................................................................................................... 432
Deleting or Disabling a Port Channel..................................................................................................................... 432
Load Balancing Through Port Channels................................................................................................................433
Changing the Hash Algorithm................................................................................................................................ 433
Bulk Conguration......................................................................................................................................................... 434
Interface Range........................................................................................................................................................434
Bulk Conguration Examples..................................................................................................................................434
Dening Interface Range Macros................................................................................................................................ 436
Dene the Interface Range.................................................................................................................................... 436
Choosing an Interface-Range Macro.................................................................................................................... 436
Monitoring and Maintaining Interfaces....................................................................................................................... 436
Maintenance Using TDR......................................................................................................................................... 437
Non Dell-Qualied Transceivers................................................................................................................................... 438
Splitting 40G Ports without Reload.............................................................................................................................438
Splitting QSFP Ports to SFP+ Ports........................................................................................................................... 440
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................440
Important Points to Remember.............................................................................................................................. 441
Example Scenarios................................................................................................................................................... 441
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................442
Link Dampening..............................................................................................................................................................443
Important Points to Remember..............................................................................................................................443
Conguration Example of Link Dampening...........................................................................................................444
Enabling Link Dampening........................................................................................................................................446
Link Bundle Monitoring..................................................................................................................................................447
Using Ethernet Pause Frames for Flow Control........................................................................................................ 448
Enabling Pause Frames........................................................................................................................................... 448
Congure the MTU Size on an Interface....................................................................................................................449
Port-Pipes.......................................................................................................................................................................450
Auto-Negotiation on Ethernet Interfaces...................................................................................................................450
Setting the Speed of Ethernet Interfaces............................................................................................................450
Set Auto-Negotiation Options................................................................................................................................452
View Advanced Interface Information.........................................................................................................................452
Conguring the Interface Sampling Size.............................................................................................................. 453
Conguring the Trac Sampling Size Globally...........................................................................................................454
Dynamic Counters......................................................................................................................................................... 456
Clearing Interface Counters................................................................................................................................... 456
Discard Counters............................................................................................................................................................457
Display discard counters..........................................................................................................................................457
23 Internet Protocol Security (IPSec).......................................................................................................... 459
Conguring IPSec .........................................................................................................................................................459
Contents
15
24 IPv4 Routing.............................................................................................................................................461
IP Addresses...................................................................................................................................................................462
Implementation Information....................................................................................................................................462
Conguration Tasks for IP Addresses..........................................................................................................................462
Assigning IP Addresses to an Interface.......................................................................................................................462
Conguring Static Routes.............................................................................................................................................463
Congure Static Routes for the Management Interface..........................................................................................464
IPv4 Path MTU Discovery Overview.......................................................................................................................... 465
Packet handling during MTU mismatch................................................................................................................465
Using the Congured Source IP Address in ICMP Messages..................................................................................465
Conguring the ICMP Source Interface............................................................................................................... 465
Conguring the Duration to Establish a TCP Connection........................................................................................ 466
Enabling Directed Broadcast........................................................................................................................................ 466
Resolution of Host Names............................................................................................................................................467
Enabling Dynamic Resolution of Host Names............................................................................................................ 467
Specifying the Local System Domain and a List of Domains....................................................................................467
Conguring DNS with Traceroute................................................................................................................................468
ARP................................................................................................................................................................................. 469
Conguration Tasks for ARP........................................................................................................................................ 469
Conguring Static ARP Entries....................................................................................................................................469
Enabling Proxy ARP.......................................................................................................................................................470
Clearing ARP Cache...................................................................................................................................................... 470
ARP Learning via Gratuitous ARP................................................................................................................................470
Enabling ARP Learning via Gratuitous ARP................................................................................................................470
ARP Learning via ARP Request.................................................................................................................................... 471
Conguring ARP Retries................................................................................................................................................471
ICMP................................................................................................................................................................................472
Conguration Tasks for ICMP...................................................................................................................................... 472
Enabling ICMP Unreachable Messages...................................................................................................................... 472
UDP Helper.....................................................................................................................................................................473
Congure UDP Helper.............................................................................................................................................473
Important Points to Remember..............................................................................................................................473
Enabling UDP Helper..................................................................................................................................................... 473
Congurations Using UDP Helper................................................................................................................................473
UDP Helper with Broadcast-All Addresses................................................................................................................. 474
UDP Helper with Subnet Broadcast Addresses......................................................................................................... 474
UDP Helper with Congured Broadcast Addresses.................................................................................................. 475
UDP Helper with No Congured Broadcast Addresses............................................................................................475
Troubleshooting UDP Helper........................................................................................................................................ 476
25 IPv6 Routing............................................................................................................................................ 477
Protocol Overview......................................................................................................................................................... 477
Extended Address Space........................................................................................................................................478
Stateless Autoconguration....................................................................................................................................478
IPv6 Headers............................................................................................................................................................478
16
Contents
IPv6 Header Fields...................................................................................................................................................479
Extension Header Fields.......................................................................................................................................... 481
Addressing................................................................................................................................................................ 482
Implementing IPv6 with Dell EMC Networking OS................................................................................................... 483
ICMPv6...........................................................................................................................................................................484
Path MTU discovery..................................................................................................................................................... 485
IPv6 Neighbor Discovery..............................................................................................................................................485
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................486
Conguration Task List for IPv6 RDNSS.................................................................................................................... 486
Conguring the IPv6 Recursive DNS Server....................................................................................................... 486
Debugging IPv6 RDNSS Information Sent to the Host ..................................................................................... 487
Displaying IPv6 RDNSS Information......................................................................................................................488
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 488
Conguration Tasks for IPv6........................................................................................................................................ 489
Adjusting Your CAM-Prole....................................................................................................................................489
Assigning an IPv6 Address to an Interface...........................................................................................................490
Assigning a Static IPv6 Route................................................................................................................................490
Conguring Telnet with IPv6...................................................................................................................................491
SNMP over IPv6.......................................................................................................................................................491
Displaying IPv6 Information.....................................................................................................................................491
Displaying an IPv6 Interface Information.............................................................................................................. 492
Showing IPv6 Routes..............................................................................................................................................492
Showing the Running-Conguration for an Interface.........................................................................................494
Clearing IPv6 Routes...............................................................................................................................................494
Disabling ND Entry Timeout................................................................................................................................... 494
Conguring IPv6 RA Guard.......................................................................................................................................... 495
Conguring IPv6 RA Guard on an Interface.........................................................................................................496
Monitoring IPv6 RA Guard......................................................................................................................................497
26 iSCSI Optimization.................................................................................................................................. 498
iSCSI Optimization Overview.......................................................................................................................................498
Monitoring iSCSI Trac Flows...............................................................................................................................500
Application of Quality of Service to iSCSI Trac Flows..................................................................................... 500
Information Monitored in iSCSI Trac Flows.......................................................................................................500
Detection and Auto-Conguration for Dell EqualLogic Arrays............................................................................501
Conguring Detection and Ports for Dell Compellent Arrays............................................................................. 501
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................502
Enable and Disable iSCSI Optimization.................................................................................................................502
Default iSCSI Optimization Values...............................................................................................................................503
iSCSI Optimization Prerequisites................................................................................................................................. 503
Conguring iSCSI Optimization................................................................................................................................... 503
Displaying iSCSI Optimization Information................................................................................................................. 505
27 Intermediate System to Intermediate System...........................................................................................507
IS-IS Protocol Overview................................................................................................................................................507
IS-IS Addressing.............................................................................................................................................................507
Contents
17
Multi-Topology IS-IS...................................................................................................................................................... 508
Transition Mode....................................................................................................................................................... 508
Interface Support.................................................................................................................................................... 509
Adjacencies.............................................................................................................................................................. 509
Graceful Restart............................................................................................................................................................ 509
Timers....................................................................................................................................................................... 509
Implementation Information......................................................................................................................................... 509
Conguration Information..............................................................................................................................................510
Conguration Tasks for IS-IS................................................................................................................................... 511
Conguring the Distance of a Route......................................................................................................................518
Changing the IS-Type...............................................................................................................................................519
Redistributing IPv4 Routes......................................................................................................................................521
Redistributing IPv6 Routes.....................................................................................................................................522
Conguring Authentication Passwords.................................................................................................................523
Setting the Overload Bit......................................................................................................................................... 523
Debugging IS-IS....................................................................................................................................................... 524
IS-IS Metric Styles.........................................................................................................................................................525
Congure Metric Values............................................................................................................................................... 525
Maximum Values in the Routing Table.................................................................................................................. 525
Change the IS-IS Metric Style in One Level Only................................................................................................525
Leaks from One Level to Another.......................................................................................................................... 527
Sample Congurations.................................................................................................................................................. 528
28 Link Aggregation Control Protocol (LACP).............................................................................................. 530
Introduction to Dynamic LAGs and LACP.................................................................................................................. 530
Important Points to Remember............................................................................................................................. 530
LACP Modes.............................................................................................................................................................531
Conguring LACP Commands................................................................................................................................531
LACP Conguration Tasks............................................................................................................................................532
Creating a LAG.........................................................................................................................................................532
Conguring the LAG Interfaces as Dynamic........................................................................................................532
Setting the LACP Long Timeout............................................................................................................................533
Monitoring and Debugging LACP..........................................................................................................................533
Shared LAG State Tracking.......................................................................................................................................... 534
Conguring Shared LAG State Tracking...............................................................................................................534
Important Points about Shared LAG State Tracking...........................................................................................536
LACP Basic Conguration Example............................................................................................................................ 536
Congure a LAG on ALPHA................................................................................................................................... 536
29 Layer 2.................................................................................................................................................... 545
Manage the MAC Address Table................................................................................................................................. 545
Clearing the MAC Address Table...........................................................................................................................545
Setting the Aging Time for Dynamic Entries........................................................................................................545
Conguring a Static MAC Address........................................................................................................................546
Displaying the MAC Address Table........................................................................................................................546
MAC Learning Limit.......................................................................................................................................................546
18
Contents
Setting the MAC Learning Limit.............................................................................................................................547
mac learning-limit Dynamic.....................................................................................................................................547
mac learning-limit mac-address-sticky................................................................................................................. 547
mac learning-limit station-move............................................................................................................................ 548
mac learning-limit no-station-move...................................................................................................................... 548
Learning Limit Violation Actions.............................................................................................................................548
Setting Station Move Violation Actions................................................................................................................ 549
Recovering from Learning Limit and Station Move Violations........................................................................... 549
Disabling MAC Address Learning on the System................................................................................................ 550
NIC Teaming...................................................................................................................................................................550
Congure Redundant Pairs........................................................................................................................................... 551
Important Points about Conguring Redundant Pairs........................................................................................ 553
Far-End Failure Detection.............................................................................................................................................554
FEFD State Changes.............................................................................................................................................. 555
Conguring FEFD....................................................................................................................................................556
Enabling FEFD on an Interface.............................................................................................................................. 556
Debugging FEFD......................................................................................................................................................557
30 Link Layer Discovery Protocol (LLDP)..................................................................................................... 559
802.1AB (LLDP) Overview........................................................................................................................................... 559
Protocol Data Units................................................................................................................................................. 559
Optional TLVs.................................................................................................................................................................560
Management TLVs.................................................................................................................................................. 560
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 562
TIA Organizationally Specic TLVs........................................................................................................................ 562
Congure LLDP............................................................................................................................................................. 566
Related Conguration Tasks...................................................................................................................................566
Important Points to Remember............................................................................................................................. 566
LLDP Compatibility.................................................................................................................................................. 567
CONFIGURATION versus INTERFACE Congurations............................................................................................ 567
Enabling LLDP................................................................................................................................................................567
Disabling and Undoing LLDP..................................................................................................................................568
Enabling LLDP on Management Ports........................................................................................................................568
Disabling and Undoing LLDP on Management Ports..........................................................................................568
Advertising TLVs............................................................................................................................................................568
Storing and Viewing Unrecognized LLDP TLVs......................................................................................................... 570
Reserved Unrecognized LLDP TLVs..................................................................................................................... 570
Organizational Specic Unrecognized LLDP TLVs.............................................................................................. 570
Viewing Unrecognized LLDP TLVs........................................................................................................................ 570
Viewing the LLDP Conguration.................................................................................................................................. 571
Viewing Information Advertised by Adjacent LLDP Neighbors.................................................................................571
Examples of Viewing Information Advertised by Neighbors............................................................................... 571
Conguring LLDPDU Intervals..................................................................................................................................... 573
Conguring LLDP Notication Interval........................................................................................................................574
Conguring LLDP Notication Interval........................................................................................................................574
Conguring Transmit and Receive Mode....................................................................................................................574
Contents
19
Conguring the Time to Live Value............................................................................................................................. 575
Debugging LLDP............................................................................................................................................................ 576
Relevant Management Objects....................................................................................................................................577
31 Microsoft Network Load Balancing...........................................................................................................582
NLB Unicast Mode Scenario........................................................................................................................................582
NLB Multicast Mode Scenario.....................................................................................................................................582
Limitations of the NLB Feature....................................................................................................................................583
Microsoft Clustering......................................................................................................................................................583
Enable and Disable VLAN Flooding ............................................................................................................................ 583
Conguring a Switch for NLB .....................................................................................................................................583
Enabling a Switch for Multicast NLB.................................................................................................................... 584
32 Multicast Source Discovery Protocol (MSDP).........................................................................................585
Protocol Overview.........................................................................................................................................................585
Anycast RP.....................................................................................................................................................................586
Implementation Information..........................................................................................................................................587
Congure Multicast Source Discovery Protocol........................................................................................................ 587
Related Conguration Tasks................................................................................................................................... 587
Enable MSDP..................................................................................................................................................................591
Manage the Source-Active Cache.............................................................................................................................. 592
Viewing the Source-Active Cache.........................................................................................................................592
Limiting the Source-Active Cache.........................................................................................................................592
Clearing the Source-Active Cache........................................................................................................................ 593
Enabling the Rejected Source-Active Cache....................................................................................................... 593
Accept Source-Active Messages that Fail the RFP Check......................................................................................593
Specifying Source-Active Messages...........................................................................................................................596
Limiting the Source-Active Messages from a Peer...................................................................................................597
Preventing MSDP from Caching a Local Source....................................................................................................... 597
Preventing MSDP from Caching a Remote Source.................................................................................................. 598
Preventing MSDP from Advertising a Local Source................................................................................................. 598
Logging Changes in Peership States...........................................................................................................................599
Terminating a Peership..................................................................................................................................................599
Clearing Peer Statistics.................................................................................................................................................600
Debugging MSDP..........................................................................................................................................................600
MSDP with Anycast RP................................................................................................................................................ 601
Conguring Anycast RP................................................................................................................................................602
Reducing Source-Active Message Flooding.........................................................................................................603
Specifying the RP Address Used in SA Messages.............................................................................................. 603
MSDP Sample Congurations..................................................................................................................................... 605
36 Multicast Listener Discovery Protocol..................................................................................................... 608
MLD Version 1................................................................................................................................................................ 608
MLD Querier Router......................................................................................................................................................608
Joining a Multicast Group.............................................................................................................................................609
Leaving a Multicast Group............................................................................................................................................609
20
Contents
/