PowerSwitch S3048-ON

Dell PowerSwitch S3048-ON Administrator Guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S3048-ON Administrator Guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Configuration Guide for the S3048–
ON System
9.14.2.6
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
2020 - 03
Rev. A00
1 About this Guide......................................................................................................................... 30
Audience............................................................................................................................................................................... 30
Conventions......................................................................................................................................................................... 30
Related Documents.............................................................................................................................................................30
2 Configuration Fundamentals........................................................................................................ 31
Accessing the Command Line............................................................................................................................................ 31
CLI Modes............................................................................................................................................................................. 31
Navigating CLI Modes...................................................................................................................................................33
The do Command................................................................................................................................................................35
Undoing Commands............................................................................................................................................................36
Obtaining Help..................................................................................................................................................................... 36
Entering and Editing Commands....................................................................................................................................... 36
Command History................................................................................................................................................................37
Filtering show Command Outputs.....................................................................................................................................37
Multiple Users in Configuration Mode.............................................................................................................................. 39
3 Getting Started..........................................................................................................................40
Console Access....................................................................................................................................................................40
Serial Console.................................................................................................................................................................40
Accessing the CLI Interface and Running Scripts Using SSH........................................................................................41
Default Configuration..........................................................................................................................................................42
Configuring a Host Name................................................................................................................................................... 42
Accessing the System Remotely.......................................................................................................................................42
Configure the Management Port IP Address.............................................................................................................42
Configure a Management Route................................................................................................................................. 43
Configuring a Username and Password......................................................................................................................43
Configuring the Enable Password..................................................................................................................................... 44
Configuration File Management........................................................................................................................................ 44
Copy Files to and from the System.............................................................................................................................44
Mounting an NFS File System..................................................................................................................................... 45
Save the Running-Configuration................................................................................................................................. 46
Configure the Overload Bit for a Startup Scenario................................................................................................... 47
Viewing Files................................................................................................................................................................... 47
Compressing Configuration Files................................................................................................................................. 48
Managing the File System..................................................................................................................................................50
Enabling Software Features on Devices Using a Command Option.............................................................................50
View Command History.......................................................................................................................................................51
Upgrading Dell EMC Networking OS................................................................................................................................52
Verify Software Images Before Installation......................................................................................................................52
Using HTTP for File Transfers........................................................................................................................................... 53
4 Management..............................................................................................................................55
Configuring Privilege Levels...............................................................................................................................................55
Contents
Contents 3
Removing a Command from EXEC Mode..................................................................................................................56
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................... 56
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 56
Allowing Access to Different Modes...........................................................................................................................56
Applying a Privilege Level to a Username...................................................................................................................58
Applying a Privilege Level to a Terminal Line............................................................................................................. 58
Configuring Logging............................................................................................................................................................58
Audit and Security Logs................................................................................................................................................58
Configuring Logging Format ................................................................................................................................ 60
Display the Logging Buffer and the Logging Configuration.....................................................................................60
Setting Up a Secure Connection to a Syslog Server....................................................................................... 61
Sending System Messages to a Syslog Server..........................................................................................................62
Track Login Activity............................................................................................................................................................ 62
Restrictions for Tracking Login Activity......................................................................................................................62
Configuring Login Activity Tracking............................................................................................................................ 62
Display Login Statistics................................................................................................................................................. 63
Limit Concurrent Login Sessions.......................................................................................................................................64
Restrictions for Limiting the Number of Concurrent Sessions................................................................................64
Configuring Concurrent Session Limit........................................................................................................................ 64
Enabling the System to Clear Existing Sessions........................................................................................................65
Enabling Secured CLI Mode...............................................................................................................................................65
Log Messages in the Internal Buffer.................................................................................................................................66
Disabling System Logging...................................................................................................................................................66
Sending System Messages to a Syslog Server............................................................................................................... 66
Configuring a UNIX System as a Syslog Server........................................................................................................ 66
Changing System Logging Settings.................................................................................................................................. 67
Display the Logging Buffer and the Logging Configuration...........................................................................................67
Configuring a UNIX Logging Facility Level.......................................................................................................................68
Synchronizing Log Messages............................................................................................................................................ 69
Enabling Timestamp on Syslog Messages....................................................................................................................... 69
File Transfer Services..........................................................................................................................................................72
Enabling the FTP Server...............................................................................................................................................72
Configuring FTP Server Parameters...........................................................................................................................72
Configuring FTP Client Parameters.............................................................................................................................73
Terminal Lines...................................................................................................................................................................... 73
Denying and Permitting Access to a Terminal Line................................................................................................... 73
Configuring Login Authentication for Terminal Lines................................................................................................74
Setting Timeout for EXEC Privilege Mode.......................................................................................................................75
Using Telnet to get to Another Network Device.............................................................................................................76
Lock CONFIGURATION Mode.......................................................................................................................................... 76
LPC Bus Quality Degradation.............................................................................................................................................77
Reloading the system.......................................................................................................................................................... 77
Viewing the Reason for Last System Reboot..................................................................................................................78
5 802.1X....................................................................................................................................... 79
Port-Authentication Process............................................................................................................................................. 80
EAP over RADIUS.......................................................................................................................................................... 81
Configuring 802.1X...............................................................................................................................................................81
Important Points to Remember.........................................................................................................................................82
Configuring dot1x Profile ................................................................................................................................................... 82
4
Contents
Configuring MAC addresses for a do1x Profile................................................................................................................82
Configuring the Static MAB and MAB Profile ................................................................................................................ 83
Configuring Critical VLAN ................................................................................................................................................. 83
Enabling 802.1X................................................................................................................................................................... 85
Configuring Request Identity Re-Transmissions............................................................................................................. 86
Configuring a Quiet Period after a Failed Authentication.........................................................................................87
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................87
Re-Authenticating a Port................................................................................................................................................... 88
Configuring Timeouts..........................................................................................................................................................89
Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................89
Guest and Authentication-Fail VLANs..............................................................................................................................90
Configuring a Guest VLAN............................................................................................................................................91
Configuring an Authentication-Fail VLAN................................................................................................................... 91
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)..........................93
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................................................93
Guidelines for Configuring ACL VLAN Groups................................................................................................................ 93
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters................................................... 94
Configuring ACL VLAN Groups................................................................................................................................... 94
Configuring FP Blocks for VLAN Parameters............................................................................................................95
Viewing CAM Usage........................................................................................................................................................... 95
Allocating FP Blocks for VLAN Processes....................................................................................................................... 97
7 Access Control Lists (ACLs)........................................................................................................98
IP Access Control Lists (ACLs)......................................................................................................................................... 99
CAM Usage.................................................................................................................................................................... 99
Implementing ACLs on Dell EMC Networking OS................................................................................................... 100
Important Points to Remember........................................................................................................................................ 101
Configuration Task List for Route Maps....................................................................................................................101
Configuring Match Routes..........................................................................................................................................103
Configuring Set Conditions.........................................................................................................................................104
Configure a Route Map for Route Redistribution....................................................................................................105
Configure a Route Map for Route Tagging.............................................................................................................. 105
Continue Clause........................................................................................................................................................... 106
IP Fragment Handling........................................................................................................................................................106
IP Fragments ACL Examples...................................................................................................................................... 106
Layer 4 ACL Rules Examples...................................................................................................................................... 107
Configure a Standard IP ACL........................................................................................................................................... 107
Configuring a Standard IP ACL Filter........................................................................................................................ 108
Configure an Extended IP ACL........................................................................................................................................ 109
Configuring Filters with a Sequence Number...........................................................................................................109
Configuring Filters Without a Sequence Number.....................................................................................................110
Configure Layer 2 and Layer 3 ACLs................................................................................................................................ 111
Assign an IP ACL to an Interface.......................................................................................................................................111
Applying an IP ACL.............................................................................................................................................................. 111
Counting ACL Hits........................................................................................................................................................ 112
Configure Ingress ACLs..................................................................................................................................................... 112
Configure Egress ACLs...................................................................................................................................................... 113
Applying Egress Layer 3 ACLs (Control-Plane)........................................................................................................ 114
Contents
5
IP Prefix Lists.......................................................................................................................................................................114
Configuration Task List for Prefix Lists......................................................................................................................115
ACL Remarks.......................................................................................................................................................................117
Configuring a Remark...................................................................................................................................................118
Deleting a Remark.........................................................................................................................................................118
ACL Resequencing............................................................................................................................................................. 119
Resequencing an ACL or Prefix List...........................................................................................................................119
Route Maps........................................................................................................................................................................ 120
Logging of ACL Processes............................................................................................................................................... 120
Guidelines for Configuring ACL Logging.................................................................................................................... 121
Configuring ACL Logging............................................................................................................................................ 122
Flow-Based Monitoring..................................................................................................................................................... 122
Enabling Flow-Based Monitoring................................................................................................................................123
8 Bidirectional Forwarding Detection (BFD)................................................................................... 125
How BFD Works.................................................................................................................................................................125
BFD Packet Format..................................................................................................................................................... 126
BFD Sessions................................................................................................................................................................ 127
BFD Three-Way Handshake....................................................................................................................................... 128
Session State Changes................................................................................................................................................129
Important Points to Remember....................................................................................................................................... 129
Configure BFD....................................................................................................................................................................129
Configure BFD for Physical Ports..............................................................................................................................130
Configure BFD for Static Routes................................................................................................................................131
Configure BFD for IPv6 Static Routes...................................................................................................................... 134
Configure BFD for OSPF............................................................................................................................................ 136
Configure BFD for OSPFv3........................................................................................................................................ 138
Configure BFD for IS-IS............................................................................................................................................... 141
Configure BFD for BGP...............................................................................................................................................143
Configure BFD for VRRP............................................................................................................................................ 150
Configuring Protocol Liveness....................................................................................................................................152
9 Border Gateway Protocol (BGP).................................................................................................153
BGP IP version 4 (BGPv4) Overview..............................................................................................................................153
BGP Autonomous Systems.........................................................................................................................................153
AS4 Number Representation......................................................................................................................................155
Four-Byte AS Numbers............................................................................................................................................... 157
BGP router ID............................................................................................................................................................... 157
Sessions and Peers...................................................................................................................................................... 157
Establish a Session.......................................................................................................................................................157
BGP Attributes for selecting Best Path....................................................................................................................158
Multiprotocol BGP....................................................................................................................................................... 163
BGP global and address family configuration........................................................................................................... 164
Implement BGP with Dell EMC Networking OS...................................................................................................... 165
Configuration Information........................................................................................................................................... 168
Basic BGP configuration tasks.........................................................................................................................................168
Prerequisite for configuring a BGP network.............................................................................................................168
Restrictions................................................................................................................................................................... 168
Enabling BGP................................................................................................................................................................168
6
Contents
Enabling four-byte autonomous system numbers................................................................................................... 170
Changing a BGP router ID............................................................................................................................................171
Configuring AS4 Number Representations................................................................................................................171
Configuring a BGP peer...............................................................................................................................................172
Example-Configuring BGP routing between peers..................................................................................................173
BGP peer group............................................................................................................................................................174
Advanced BGP configuration tasks..................................................................................................................................181
Route-refresh and Soft-reconfiguration....................................................................................................................181
Aggregating Routes..................................................................................................................................................... 183
Filtering BGP.................................................................................................................................................................185
Configuring BGP Fast Fall-Over.................................................................................................................................190
Configuring Passive Peering........................................................................................................................................191
Enabling Graceful Restart........................................................................................................................................... 192
Redistributing Routes.................................................................................................................................................. 193
Enabling Additional Paths............................................................................................................................................193
Configuring IP Community Lists.................................................................................................................................194
Configuring an IP Extended Community List............................................................................................................195
Configure BGP attributes........................................................................................................................................... 196
Enabling Multipath....................................................................................................................................................... 199
Route Reflectors......................................................................................................................................................... 200
Enabling Route Flap Dampening.................................................................................................................................201
Changing BGP keepalive and hold timers................................................................................................................ 203
Setting the extended timer........................................................................................................................................203
Enabling or disabling BGP neighbors........................................................................................................................ 204
Route Map Continue...................................................................................................................................................205
Configuring BGP Confederations..............................................................................................................................205
Configuring a BGP VRF address family....................................................................................................................206
Maintaining Existing AS Numbers During an AS Migration....................................................................................207
Allowing an AS Number to Appear in its Own AS Path..........................................................................................208
Enabling MBGP Configurations.................................................................................................................................209
MBGP support for IPv6..............................................................................................................................................209
Configuring IPv6 MBGP between peers..................................................................................................................209
Example-Configuring IPv4 and IPv6 neighbors........................................................................................................210
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor............................................. 212
BGP Regular Expression Optimization...................................................................................................................... 213
Debugging BGP............................................................................................................................................................ 214
10 Content Addressable Memory (CAM)........................................................................................ 216
CAM Allocation...................................................................................................................................................................216
Test CAM Usage................................................................................................................................................................217
View CAM-ACL Settings.................................................................................................................................................. 218
View CAM Usage...............................................................................................................................................................219
Configuring CAM Threshold and Silence Period........................................................................................................... 220
CAM Optimization..............................................................................................................................................................221
Troubleshoot CAM Profiling............................................................................................................................................. 221
QoS CAM Region Limitation.......................................................................................................................................221
11 Control Plane Policing (CoPP).................................................................................................. 222
Configure Control Plane Policing.....................................................................................................................................223
Contents
7
Configuring CoPP for Protocols................................................................................................................................224
Configuring CoPP for CPU Queues..........................................................................................................................225
CoPP for OSPFv3 Packets........................................................................................................................................226
Configuring CoPP for OSPFv3..................................................................................................................................228
Displaying CoPP Configuration .................................................................................................................................229
12 Dynamic Host Configuration Protocol (DHCP)........................................................................... 231
DHCP Packet Format and Options..................................................................................................................................231
Assign an IP Address using DHCP.................................................................................................................................. 232
Implementation Information............................................................................................................................................. 233
Configure the System to be a DHCP Server.................................................................................................................234
Configuring the Server for Automatic Address Allocation..................................................................................... 234
Specifying a Default Gateway................................................................................................................................... 235
Configure a Method of Hostname Resolution.........................................................................................................235
Using DNS for Address Resolution........................................................................................................................... 235
Using NetBIOS WINS for Address Resolution.........................................................................................................236
Creating Manual Binding Entries............................................................................................................................... 236
Debugging the DHCP Server.....................................................................................................................................236
Using DHCP Clear Commands.................................................................................................................................. 236
Configure the System to be a Relay Agent....................................................................................................................237
Configure the System to be a DHCP Client.................................................................................................................. 238
Configuring the DHCP Client System.......................................................................................................................238
DHCP Client on a Management Interface................................................................................................................239
DHCP Client Operation with Other Features.......................................................................................................... 240
DHCP Relay When DHCP Server and Client are in Different VRFs............................................................................241
Configuring Route Leaking between VRFs on DHCP Relay Agent....................................................................... 241
Non-default VRF configuration for DHCPv6 helper address...................................................................................... 242
Configuring DHCP relay source interface...................................................................................................................... 242
Global DHCP relay source IPv4 or IPv6 configuration ...........................................................................................242
Interface level DHCP relay source IPv4 or IPv6 configuration .............................................................................243
Configure the System for User Port Stacking (Option 230)...................................................................................... 244
Configure Secure DHCP.................................................................................................................................................. 244
Option 82 (DHCPv4 relay options)........................................................................................................................... 244
DHCPv6 relay agent options..................................................................................................................................... 245
DHCP Snooping...........................................................................................................................................................245
Drop DHCP Packets on Snooped VLANs Only....................................................................................................... 249
Dynamic ARP Inspection............................................................................................................................................ 250
Configuring Dynamic ARP Inspection.......................................................................................................................250
Source Address Validation................................................................................................................................................ 251
Enabling IP Source Address Validation......................................................................................................................251
DHCP MAC Source Address Validation................................................................................................................... 252
Enabling IP+MAC Source Address Validation..........................................................................................................252
Viewing the Number of SAV Dropped Packets.......................................................................................................253
Clearing the Number of SAV Dropped Packets...................................................................................................... 253
13 Equal Cost Multi-Path (ECMP).................................................................................................254
ECMP for Flow-Based Affinity........................................................................................................................................254
Configuring the Hash Algorithm................................................................................................................................ 254
Enabling Deterministic ECMP Next Hop..................................................................................................................254
8
Contents
Configuring the Hash Algorithm Seed...................................................................................................................... 254
Link Bundle Monitoring.....................................................................................................................................................255
Managing ECMP Group Paths.................................................................................................................................. 255
Creating an ECMP Group Bundle............................................................................................................................. 256
Modifying the ECMP Group Threshold....................................................................................................................256
14 FIPS Cryptography..................................................................................................................257
Configuration Tasks.......................................................................................................................................................... 257
Preparing the System....................................................................................................................................................... 257
Enabling FIPS Mode..........................................................................................................................................................257
Generating Host-Keys...................................................................................................................................................... 258
Monitoring FIPS Mode Status.........................................................................................................................................258
Disabling FIPS Mode.........................................................................................................................................................258
15 Force10 Resilient Ring Protocol (FRRP)....................................................................................260
Protocol Overview............................................................................................................................................................ 260
Ring Status....................................................................................................................................................................261
Multiple FRRP Rings.................................................................................................................................................... 261
Important FRRP Points...............................................................................................................................................262
Important FRRP Concepts.........................................................................................................................................263
Implementing FRRP.......................................................................................................................................................... 263
FRRP Configuration..........................................................................................................................................................264
Creating the FRRP Group.......................................................................................................................................... 264
Configuring the Control VLAN...................................................................................................................................264
Configuring and Adding the Member VLANs.......................................................................................................... 265
Setting the FRRP Timers........................................................................................................................................... 266
Clearing the FRRP Counters......................................................................................................................................266
Viewing the FRRP Configuration.............................................................................................................................. 266
Viewing the FRRP Information.................................................................................................................................. 266
Troubleshooting FRRP......................................................................................................................................................267
Sample Configuration and Topology...............................................................................................................................267
FRRP Support on VLT......................................................................................................................................................268
16 GARP VLAN Registration Protocol (GVRP)................................................................................ 271
Configure GVRP................................................................................................................................................................ 272
Enabling GVRP Globally.................................................................................................................................................... 272
Enabling GVRP on a Layer 2 Interface........................................................................................................................... 273
Configure GVRP Registration..........................................................................................................................................273
Configure a GARP Timer.................................................................................................................................................. 274
RPM Redundancy..............................................................................................................................................................274
17 High Availability (HA)...............................................................................................................275
Component Redundancy..................................................................................................................................................275
Automatic and Manual Stack Unit Failover..............................................................................................................275
Synchronization between Management and Standby Units..................................................................................276
Forcing a Stack Unit Failover.....................................................................................................................................276
Specifying an Auto-Failover Limit..............................................................................................................................276
Disabling Auto-Reboot................................................................................................................................................ 276
Pre-Configuring a Stack Unit Slot...................................................................................................................................277
Contents
9
Removing a Provisioned Logical Stack Unit...................................................................................................................277
Hitless Behavior................................................................................................................................................................. 277
Graceful Restart................................................................................................................................................................ 277
Software Resiliency...........................................................................................................................................................278
Software Component Health Monitoring.................................................................................................................278
System Health Monitoring..........................................................................................................................................278
Failure and Event Logging.......................................................................................................................................... 278
Hot-Lock Behavior............................................................................................................................................................ 279
18 Internet Group Management Protocol (IGMP)........................................................................... 280
IGMP Protocol Overview................................................................................................................................................. 280
IGMP Version 2............................................................................................................................................................280
IGMP Version 3............................................................................................................................................................ 281
Configure IGMP.................................................................................................................................................................284
Viewing IGMP Enabled Interfaces...................................................................................................................................284
Selecting an IGMP Version.............................................................................................................................................. 285
Viewing IGMP Groups...................................................................................................................................................... 286
Adjusting Timers................................................................................................................................................................286
Adjusting Query and Response Timers.....................................................................................................................286
Preventing a Host from Joining a Group........................................................................................................................287
Enabling IGMP Immediate-Leave....................................................................................................................................289
IGMP Snooping................................................................................................................................................................. 290
Configuring IGMP Snooping...................................................................................................................................... 290
Removing a Group-Port Association........................................................................................................................ 290
Disabling Multicast Flooding....................................................................................................................................... 291
Specifying a Port as Connected to a Multicast Router...........................................................................................291
Configuring the Switch as Querier.............................................................................................................................291
Fast Convergence after MSTP Topology Changes......................................................................................................292
Egress Interface Selection (EIS) for HTTP and IGMP Applications...........................................................................292
Designating a Multicast Router Interface...................................................................................................................... 298
19 Interfaces...............................................................................................................................299
Interface Types................................................................................................................................................................. 300
View Basic Interface Information....................................................................................................................................300
Resetting an Interface to its Factory Default State..................................................................................................... 302
Enabling a Physical Interface........................................................................................................................................... 302
Enabling Energy Efficient Ethernet.................................................................................................................................302
View EEE Information.......................................................................................................................................................303
Clear EEE Counters...........................................................................................................................................................307
Physical Interfaces............................................................................................................................................................ 307
Configuration Task List for Physical Interfaces.......................................................................................................308
Overview of Layer Modes..........................................................................................................................................308
Configuring Layer 2 (Data Link) Mode.....................................................................................................................308
Configuring Layer 2 (Interface) Mode......................................................................................................................309
Configuring Layer 3 (Network) Mode...................................................................................................................... 309
Configuring Layer 3 (Interface) Mode......................................................................................................................309
Automatic recovery of an Err-disabled interface...........................................................................................................310
Configuring an automatic recovery for an Err-disabled interface......................................................................... 310
Egress Interface Selection (EIS).......................................................................................................................................311
10
Contents
Configuring EIS..............................................................................................................................................................311
Management Interfaces....................................................................................................................................................312
Configuring Management Interfaces.........................................................................................................................312
Configuring a Management Interface on an Ethernet Port....................................................................................313
VLAN Interfaces.................................................................................................................................................................314
Loopback Interfaces.......................................................................................................................................................... 314
Null Interfaces.................................................................................................................................................................... 315
Configuring Port Delay...................................................................................................................................................... 315
Port Channel Interfaces.................................................................................................................................................... 315
Port Channel Definition and Standards.....................................................................................................................315
Port Channel Benefits................................................................................................................................................. 316
Port Channel Implementation.....................................................................................................................................316
Interfaces in Port Channels........................................................................................................................................ 316
Configuration Tasks for Port Channel Interfaces.................................................................................................... 316
Creating a Port Channel.............................................................................................................................................. 317
Adding a Physical Interface to a Port Channel......................................................................................................... 317
Reassigning an Interface to a New Port Channel.................................................................................................... 319
Configuring the Minimum Oper Up Links in a Port Channel...................................................................................319
Adding or Removing a Port Channel from a VLAN..................................................................................................319
Assigning an IP Address to a Port Channel..............................................................................................................320
Deleting or Disabling a Port Channel......................................................................................................................... 321
Load Balancing Through Port Channels....................................................................................................................321
Changing the Hash Algorithm.....................................................................................................................................321
Bulk Configuration.............................................................................................................................................................322
Interface Range........................................................................................................................................................... 322
Bulk Configuration Examples..................................................................................................................................... 322
Defining Interface Range Macros....................................................................................................................................324
Define the Interface Range........................................................................................................................................ 324
Choosing an Interface-Range Macro........................................................................................................................324
Monitoring and Maintaining Interfaces...........................................................................................................................324
Maintenance Using TDR.............................................................................................................................................325
Configuring wavelength for 10–Gigabit SFP+ optics...................................................................................................326
Link Dampening................................................................................................................................................................. 326
Enabling Link Dampening............................................................................................................................................329
Link Bundle Monitoring.....................................................................................................................................................330
Using Ethernet Pause Frames for Flow Control........................................................................................................... 330
Enabling Pause Frames................................................................................................................................................331
Configure the MTU Size on an Interface........................................................................................................................331
Port-Pipes.......................................................................................................................................................................... 332
Auto-Negotiation on Ethernet Interfaces...................................................................................................................... 332
Setting the Speed of Ethernet Interfaces................................................................................................................332
Set Auto-Negotiation Options................................................................................................................................... 333
View Advanced Interface Information............................................................................................................................ 334
Configuring the Interface Sampling Size..................................................................................................................335
Configuring the Traffic Sampling Size Globally............................................................................................................. 336
Dynamic Counters............................................................................................................................................................. 337
Clearing Interface Counters....................................................................................................................................... 337
Discard Counters...............................................................................................................................................................338
Display discard counters.............................................................................................................................................338
Contents
11
20 Internet Protocol Security (IPSec)...........................................................................................340
Configuring IPSec ............................................................................................................................................................ 340
21 IPv4 Routing........................................................................................................................... 342
IP Addresses...................................................................................................................................................................... 343
Configuration Tasks for IP Addresses............................................................................................................................ 343
Assigning IP Addresses to an Interface.......................................................................................................................... 343
Configuring Static Routes................................................................................................................................................344
Adding description for IPv4 and IPv6 static routes................................................................................................ 345
Configure Static Routes for the Management Interface.............................................................................................345
IPv4 Path MTU Discovery Overview..............................................................................................................................346
Using the Configured Source IP Address in ICMP Messages.....................................................................................346
Configuring the Duration to Establish a TCP Connection............................................................................................347
Enabling Directed Broadcast............................................................................................................................................347
Resolution of Host Names................................................................................................................................................347
Enabling Dynamic Resolution of Host Names................................................................................................................348
Specifying the Local System Domain and a List of Domains.......................................................................................348
Configuring DNS with Traceroute...................................................................................................................................348
ARP..................................................................................................................................................................................... 349
Configuration Tasks for ARP........................................................................................................................................... 349
Configuring Static ARP Entries....................................................................................................................................... 349
Enabling Proxy ARP.......................................................................................................................................................... 350
Clearing ARP Cache......................................................................................................................................................... 350
ARP Learning via Gratuitous ARP...................................................................................................................................350
Enabling ARP Learning via Gratuitous ARP....................................................................................................................351
ARP Learning via ARP Request....................................................................................................................................... 351
Configuring ARP Retries.................................................................................................................................................. 352
ICMP...................................................................................................................................................................................352
Configuration Tasks for ICMP.........................................................................................................................................352
Enabling ICMP Unreachable Messages..........................................................................................................................352
ICMP Redirects................................................................................................................................................................. 353
UDP Helper........................................................................................................................................................................ 353
Enabling UDP Helper.........................................................................................................................................................354
Configurations Using UDP Helper...................................................................................................................................354
UDP Helper with Broadcast-All Addresses....................................................................................................................354
UDP Helper with Subnet Broadcast Addresses............................................................................................................355
UDP Helper with Configured Broadcast Addresses.....................................................................................................355
UDP Helper with No Configured Broadcast Addresses...............................................................................................356
Troubleshooting UDP Helper...........................................................................................................................................356
22 IPv6 Routing.......................................................................................................................... 357
Protocol Overview............................................................................................................................................................ 357
Extended Address Space........................................................................................................................................... 357
Stateless Autoconfiguration.......................................................................................................................................357
IPv6 Headers................................................................................................................................................................358
IPv6 Header Fields...................................................................................................................................................... 358
Extension Header Fields............................................................................................................................................. 360
Addressing.....................................................................................................................................................................361
12
Contents
Implementing IPv6 with Dell EMC Networking OS....................................................................................................... 361
ICMPv6...............................................................................................................................................................................363
Path MTU discovery.........................................................................................................................................................363
IPv6 Neighbor Discovery..................................................................................................................................................364
IPv6 Neighbor Discovery of MTU Packets..............................................................................................................365
Configuration Task List for IPv6 RDNSS....................................................................................................................... 365
Configuring the IPv6 Recursive DNS Server...........................................................................................................365
Debugging IPv6 RDNSS Information Sent to the Host ........................................................................................ 366
Displaying IPv6 RDNSS Information......................................................................................................................... 366
Secure Shell (SSH) Over an IPv6 Transport................................................................................................................. 367
Configuration Tasks for IPv6........................................................................................................................................... 367
Adjusting Your CAM-Profile....................................................................................................................................... 367
Assigning an IPv6 Address to an Interface.............................................................................................................. 368
Assigning a Static IPv6 Route....................................................................................................................................368
Configuring Telnet with IPv6..................................................................................................................................... 369
SNMP over IPv6..........................................................................................................................................................369
Displaying IPv6 Information........................................................................................................................................369
Displaying an IPv6 Interface Information..................................................................................................................370
Showing IPv6 Routes..................................................................................................................................................370
Showing the Running-Configuration for an Interface............................................................................................. 371
Clearing IPv6 Routes...................................................................................................................................................372
Disabling ND Entry Timeout....................................................................................................................................... 372
Configuring IPv6 RA Guard..............................................................................................................................................372
Configuring IPv6 RA Guard on an Interface.............................................................................................................374
Monitoring IPv6 RA Guard......................................................................................................................................... 374
23 Intermediate System to Intermediate System............................................................................375
IS-IS Protocol Overview...................................................................................................................................................375
IS-IS Addressing................................................................................................................................................................ 375
Multi-Topology IS-IS......................................................................................................................................................... 376
Transition Mode...........................................................................................................................................................376
Interface Support........................................................................................................................................................ 376
Adjacencies...................................................................................................................................................................376
Graceful Restart................................................................................................................................................................ 377
Timers............................................................................................................................................................................377
Implementation Information............................................................................................................................................. 377
Configuration Information................................................................................................................................................ 378
Configuration Tasks for IS-IS.....................................................................................................................................378
Configuring the Distance of a Route........................................................................................................................ 385
Changing the IS-Type.................................................................................................................................................385
Redistributing IPv4 Routes.........................................................................................................................................387
Redistributing IPv6 Routes.........................................................................................................................................387
Configuring Authentication Passwords.................................................................................................................... 388
Setting the Overload Bit.............................................................................................................................................388
Debugging IS-IS...........................................................................................................................................................389
IS-IS Metric Styles............................................................................................................................................................ 390
Configure Metric Values...................................................................................................................................................390
Maximum Values in the Routing Table..................................................................................................................... 390
Change the IS-IS Metric Style in One Level Only................................................................................................... 390
Leaks from One Level to Another............................................................................................................................. 392
Contents
13
Sample Configurations......................................................................................................................................................392
24 Link Aggregation Control Protocol (LACP)................................................................................395
Introduction to Dynamic LAGs and LACP......................................................................................................................395
Important Points to Remember.................................................................................................................................395
LACP Modes................................................................................................................................................................395
Configuring LACP Commands...................................................................................................................................396
LACP Configuration Tasks...............................................................................................................................................396
Creating a LAG............................................................................................................................................................ 396
Configuring the LAG Interfaces as Dynamic............................................................................................................397
Setting the LACP Long Timeout............................................................................................................................... 397
Monitoring and Debugging LACP..............................................................................................................................398
Shared LAG State Tracking............................................................................................................................................. 398
Configuring Shared LAG State Tracking..................................................................................................................399
Important Points about Shared LAG State Tracking..............................................................................................400
LACP Basic Configuration Example................................................................................................................................400
Configure a LAG on ALPHA.......................................................................................................................................400
25 Layer 2.................................................................................................................................. 408
Manage the MAC Address Table.................................................................................................................................... 408
Clearing the MAC Address Table.............................................................................................................................. 408
Setting the Aging Time for Dynamic Entries........................................................................................................... 408
Configuring a Static MAC Address........................................................................................................................... 408
Displaying the MAC Address Table...........................................................................................................................409
MAC Learning Limit.......................................................................................................................................................... 409
Setting the MAC Learning Limit................................................................................................................................409
mac learning-limit Dynamic......................................................................................................................................... 410
mac learning-limit mac-address-sticky......................................................................................................................410
mac learning-limit station-move.................................................................................................................................410
mac learning-limit no-station-move...........................................................................................................................410
Learning Limit Violation Actions.................................................................................................................................. 411
Setting Station Move Violation Actions..................................................................................................................... 411
Recovering from Learning Limit and Station Move Violations................................................................................411
Disabling MAC Address Learning on the System.....................................................................................................412
Enabling port security.................................................................................................................................................. 412
NIC Teaming....................................................................................................................................................................... 412
Configure Redundant Pairs...............................................................................................................................................413
Far-End Failure Detection.................................................................................................................................................416
FEFD State Changes................................................................................................................................................... 416
Configuring FEFD......................................................................................................................................................... 417
Enabling FEFD on an Interface...................................................................................................................................418
Debugging FEFD.......................................................................................................................................................... 418
26 Link Layer Discovery Protocol (LLDP)...................................................................................... 420
802.1AB (LLDP) Overview...............................................................................................................................................420
Protocol Data Units.....................................................................................................................................................420
Optional TLVs..................................................................................................................................................................... 421
Management TLVs.......................................................................................................................................................421
TIA-1057 (LLDP-MED) Overview................................................................................................................................... 422
14
Contents
TIA Organizationally Specific TLVs............................................................................................................................423
Configure LLDP................................................................................................................................................................. 426
CONFIGURATION versus INTERFACE Configurations............................................................................................... 426
Enabling LLDP....................................................................................................................................................................427
Disabling and Undoing LLDP...................................................................................................................................... 427
Enabling LLDP on Management Ports............................................................................................................................427
Disabling and Undoing LLDP on Management Ports..............................................................................................428
Advertising TLVs............................................................................................................................................................... 428
Storing and Viewing Unrecognized LLDP TLVs............................................................................................................429
Viewing the LLDP Configuration.....................................................................................................................................430
Viewing Information Advertised by Adjacent LLDP Neighbors...................................................................................430
Examples of Viewing Information Advertised by Neighbors..................................................................................430
Configuring LLDPDU Intervals.........................................................................................................................................433
Configuring LLDP Notification Interval...........................................................................................................................433
Configuring LLDP Notification Interval...........................................................................................................................434
Configuring Transmit and Receive Mode.......................................................................................................................434
Configuring the Time to Live Value.................................................................................................................................435
Debugging LLDP................................................................................................................................................................435
Relevant Management Objects.......................................................................................................................................436
27 Microsoft Network Load Balancing............................................................................................441
Configuring a Switch for NLB .........................................................................................................................................442
Enabling a Switch for Multicast NLB........................................................................................................................ 442
28 Multicast Source Discovery Protocol (MSDP)........................................................................... 444
Anycast RP........................................................................................................................................................................ 445
Implementation Information.............................................................................................................................................446
Configure Multicast Source Discovery Protocol...........................................................................................................446
Related Configuration Tasks......................................................................................................................................446
Enable MSDP.....................................................................................................................................................................450
Manage the Source-Active Cache.................................................................................................................................. 451
Viewing the Source-Active Cache.............................................................................................................................451
Limiting the Source-Active Cache.............................................................................................................................451
Clearing the Source-Active Cache............................................................................................................................ 451
Enabling the Rejected Source-Active Cache...........................................................................................................452
Accept Source-Active Messages that Fail the RFP Check.........................................................................................452
Specifying Source-Active Messages.............................................................................................................................. 454
Limiting the Source-Active Messages from a Peer......................................................................................................455
Preventing MSDP from Caching a Local Source..........................................................................................................455
Preventing MSDP from Caching a Remote Source..................................................................................................... 455
Preventing MSDP from Advertising a Local Source.................................................................................................... 456
Logging Changes in Peership States.............................................................................................................................. 457
Terminating a Peership.....................................................................................................................................................457
Clearing Peer Statistics.................................................................................................................................................... 457
Debugging MSDP..............................................................................................................................................................458
MSDP with Anycast RP................................................................................................................................................... 458
Configuring Anycast RP................................................................................................................................................... 459
Reducing Source-Active Message Flooding............................................................................................................460
Specifying the RP Address Used in SA Messages..................................................................................................460
Contents
15
MSDP Sample Configurations......................................................................................................................................... 462
29 Multicast Listener Discovery Protocol...................................................................................... 465
MLD timers........................................................................................................................................................................ 468
Reducing Host Response Burstiness........................................................................................................................468
Configuring MLD Version.................................................................................................................................................469
Clearing MLD groups........................................................................................................................................................ 469
Debugging MLD.................................................................................................................................................................469
Explicit Tracking................................................................................................................................................................ 469
Reducing Leave Latency..................................................................................................................................................469
Displaying MLD groups table........................................................................................................................................... 469
Displaying MLD Interfaces................................................................................................................................................470
MLD Snooping................................................................................................................................................................... 470
Enable MLD Snooping.................................................................................................................................................470
Disable MLD Snooping................................................................................................................................................470
Configure the switch as a querier.............................................................................................................................. 471
Specify port as connected to multicast router.........................................................................................................471
Enable Snooping Explicit Tracking..............................................................................................................................471
Display the MLD Snooping Table................................................................................................................................471
30 Multiple Spanning Tree Protocol (MSTP)..................................................................................472
Spanning Tree Variations..................................................................................................................................................473
Implementation Information....................................................................................................................................... 473
Configure Multiple Spanning Tree Protocol...................................................................................................................473
Related Configuration Tasks...................................................................................................................................... 473
Enable Multiple Spanning Tree Globally..........................................................................................................................474
Adding and Removing Interfaces.................................................................................................................................... 474
Creating Multiple Spanning Tree Instances................................................................................................................... 474
Influencing MSTP Root Selection................................................................................................................................... 475
Interoperate with Non-Dell Bridges................................................................................................................................ 476
Changing the Region Name or Revision.........................................................................................................................476
Modifying Global Parameters...........................................................................................................................................476
Modifying the Interface Parameters............................................................................................................................... 477
Setting STP path cost as constant.................................................................................................................................478
Configuring an EdgePort..................................................................................................................................................478
Flush MAC Addresses after a Topology Change.......................................................................................................... 479
MSTP Sample Configurations..........................................................................................................................................479
Debugging and Verifying MSTP Configurations............................................................................................................483
31 Multicast Features.................................................................................................................. 485
Enabling IP Multicast........................................................................................................................................................ 485
Implementation Information.............................................................................................................................................485
Multicast Policies...............................................................................................................................................................486
IPv4 Multicast Policies................................................................................................................................................486
Understanding Multicast Traceroute (mtrace)............................................................................................................. 492
Printing Multicast Traceroute (mtrace) Paths..............................................................................................................492
Supported Error Codes.................................................................................................................................................... 494
mtrace Scenarios...............................................................................................................................................................494
16
Contents
32 Object Tracking......................................................................................................................500
Object Tracking Overview............................................................................................................................................... 500
Track Layer 2 Interfaces............................................................................................................................................. 501
Track Layer 3 Interfaces............................................................................................................................................. 501
Track IPv4 and IPv6 Routes.......................................................................................................................................501
Set Tracking Delays.................................................................................................................................................... 502
VRRP Object Tracking................................................................................................................................................503
Object Tracking Configuration........................................................................................................................................ 503
Tracking a Layer 2 Interface...................................................................................................................................... 503
Tracking a Layer 3 Interface...................................................................................................................................... 504
Track an IPv4/IPv6 Route......................................................................................................................................... 505
Displaying Tracked Objects..............................................................................................................................................508
33 Open Shortest Path First (OSPFv2 and OSPFv3).......................................................................510
Protocol Overview.............................................................................................................................................................510
Autonomous System (AS) Areas............................................................................................................................... 510
Area Types.....................................................................................................................................................................511
Networks and Neighbors............................................................................................................................................ 512
Router Types................................................................................................................................................................ 512
Designated and Backup Designated Routers........................................................................................................... 513
Link-State Advertisements (LSAs)............................................................................................................................513
Router Priority and Cost............................................................................................................................................. 514
OSPF with Dell EMC Networking OS............................................................................................................................. 515
Graceful Restart...........................................................................................................................................................515
Fast Convergence (OSPFv2, IPv4 Only)..................................................................................................................516
Multi-Process OSPFv2 with VRF.............................................................................................................................. 516
OSPF ACK Packing......................................................................................................................................................517
Setting OSPF Adjacency with Cisco Routers...........................................................................................................517
Configuration Information................................................................................................................................................. 517
Configuration Task List for OSPFv2 (OSPF for IPv4)............................................................................................518
OSPFv3 NSSA...................................................................................................................................................................529
Configuration Task List for OSPFv3 (OSPF for IPv6).................................................................................................530
Enabling IPv6 Unicast Routing.................................................................................................................................. 530
Applying cost for OSPFv3.......................................................................................................................................... 531
Assigning IPv6 Addresses on an Interface................................................................................................................531
Assigning Area ID on an Interface.............................................................................................................................. 531
Assigning OSPFv3 Process ID and Router ID Globally............................................................................................531
Assigning OSPFv3 Process ID and Router ID to a VRF......................................................................................... 532
Configuring Stub Areas...............................................................................................................................................532
Configuring Passive-Interface................................................................................................................................... 532
Redistributing Routes................................................................................................................................................. 533
Configuring a Default Route...................................................................................................................................... 533
Enabling OSPFv3 Graceful Restart...........................................................................................................................533
OSPFv3 Authentication Using IPsec........................................................................................................................ 535
Troubleshooting OSPFv3............................................................................................................................................541
MIB Support for OSPFv3............................................................................................................................................541
34 Policy-based Routing (PBR).................................................................................................... 543
Contents
17
Overview............................................................................................................................................................................ 543
Implementing PBR.............................................................................................................................................................544
Configuration Task List for Policy-based Routing........................................................................................................ 544
Create a Redirect List.................................................................................................................................................545
Create a Rule for a Redirect-list................................................................................................................................545
Apply a Redirect-list to an Interface using a Redirect-group................................................................................ 546
Sample Configuration....................................................................................................................................................... 548
35 PIM Sparse-Mode (PIM-SM)................................................................................................... 552
Implementation Information.............................................................................................................................................552
Protocol Overview............................................................................................................................................................ 552
Requesting Multicast Traffic..................................................................................................................................... 552
Refuse Multicast Traffic.............................................................................................................................................552
Send Multicast Traffic................................................................................................................................................ 553
Configuring PIM-SM.........................................................................................................................................................553
Related Configuration Tasks......................................................................................................................................553
Enable PIM-SM................................................................................................................................................................. 553
Configuring S,G Expiry Timers........................................................................................................................................ 555
Configuring a Static Rendezvous Point......................................................................................................................... 556
Overriding Bootstrap Router Updates..................................................................................................................... 556
Configuring a Designated Router....................................................................................................................................557
Creating Multicast Boundaries and Domains.................................................................................................................558
Electing an RP using the BSR Mechanism.................................................................................................................... 558
36 PIM Source-Specific Mode (PIM-SSM).................................................................................... 560
Implementation Information.............................................................................................................................................560
Configure PIM-SSM......................................................................................................................................................... 560
Enabling PIM-SSM.............................................................................................................................................................561
Use PIM-SSM with IGMP Version 2 Hosts....................................................................................................................561
Electing an RP using the BSR Mechanism.................................................................................................................... 562
Enabling RP to Server Specific Multicast Groups...................................................................................................563
37 Port Monitoring......................................................................................................................565
Important Points to Remember...................................................................................................................................... 565
Port Monitoring.................................................................................................................................................................565
Configuring Port Monitoring............................................................................................................................................567
Configuring Monitor Multicast Queue............................................................................................................................569
Enabling Flow-Based Monitoring.................................................................................................................................... 569
Remote Port Mirroring..................................................................................................................................................... 570
Remote Port Mirroring Example.................................................................................................................................571
Configuring Remote Port Mirroring........................................................................................................................... 571
Displaying Remote-Port Mirroring Configurations.................................................................................................. 573
Configuration procedure for Remote Port Mirroring..............................................................................................573
Encapsulated Remote Port Monitoring.......................................................................................................................... 577
ERPM Behavior on a typical Dell EMC Networking OS .............................................................................................. 579
Port Monitoring on VLT................................................................................................................................................... 580
38 Private VLANs (PVLAN).......................................................................................................... 583
Private VLAN Concepts................................................................................................................................................... 583
18
Contents
Using the Private VLAN Commands.............................................................................................................................. 584
Configuration Task List.................................................................................................................................................... 585
Creating PVLAN ports................................................................................................................................................585
Creating a Primary VLAN...........................................................................................................................................585
Creating a Community VLAN.................................................................................................................................... 586
Creating an Isolated VLAN......................................................................................................................................... 587
Private VLAN Configuration Example............................................................................................................................ 588
Inspecting the Private VLAN Configuration.................................................................................................................. 589
39 Per-VLAN Spanning Tree Plus (PVST+).................................................................................... 591
Protocol Overview.............................................................................................................................................................591
Implementation Information.............................................................................................................................................592
Configure Per-VLAN Spanning Tree Plus......................................................................................................................592
Enabling PVST+.................................................................................................................................................................592
Disabling PVST+................................................................................................................................................................592
Influencing PVST+ Root Selection..................................................................................................................................593
Modifying Global PVST+ Parameters.............................................................................................................................594
Modifying Interface PVST+ Parameters........................................................................................................................595
Configuring an EdgePort..................................................................................................................................................595
PVST+ in Multi-Vendor Networks..................................................................................................................................596
Enabling PVST+ Extend System ID................................................................................................................................ 596
PVST+ Sample Configurations........................................................................................................................................597
40 Quality of Service (QoS)......................................................................................................... 599
Implementation Information..............................................................................................................................................601
Port-Based QoS Configurations...................................................................................................................................... 601
Setting dot1p Priorities for Incoming Traffic............................................................................................................ 601
Honoring dot1p Priorities on Ingress Traffic............................................................................................................ 602
Configuring Port-Based Rate Policing......................................................................................................................602
Configuring Port-Based Rate Shaping..................................................................................................................... 603
Policy-Based QoS Configurations...................................................................................................................................604
Classify Traffic.............................................................................................................................................................604
Create a QoS Policy.................................................................................................................................................... 607
Create Policy Maps.....................................................................................................................................................609
DSCP Color Maps...............................................................................................................................................................611
Creating a DSCP Color Map.......................................................................................................................................612
Displaying DSCP Color Maps......................................................................................................................................612
Displaying a DSCP Color Policy Configuration ........................................................................................................ 613
Enabling QoS Rate Adjustment........................................................................................................................................613
Enabling Strict-Priority Queueing.................................................................................................................................... 614
Weighted Random Early Detection..................................................................................................................................614
Creating WRED Profiles..............................................................................................................................................615
Applying a WRED Profile to Traffic........................................................................................................................... 615
Displaying Default and Configured WRED Profiles..................................................................................................615
Displaying WRED Drop Statistics...............................................................................................................................616
Displaying egress–queue Statistics........................................................................................................................... 616
Pre-Calculating Available QoS CAM Space....................................................................................................................616
Configuring Weights and ECN for WRED ......................................................................................................................617
Configuring WRED and ECN Attributes..........................................................................................................................618
Contents
19
Guidelines for Configuring ECN for Classifying and Color-Marking Packets.............................................................619
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class..................................... 619
Classifying Incoming Packets Using ECN and Color-Marking...............................................................................620
Sample configuration to mark non-ecn packets as “yellow” with single traffic class......................................... 621
Applying Layer 2 Match Criteria on a Layer 3 Interface...............................................................................................622
Applying DSCP and VLAN Match Criteria on a Service Queue.................................................................................. 623
Classifying Incoming Packets Using ECN and Color-Marking.....................................................................................623
Guidelines for Configuring ECN for Classifying and Color-Marking Packets............................................................ 625
Sample configuration to mark non-ecn packets as “yellow” with Multiple traffic class.......................................... 625
Sample configuration to mark non-ecn packets as “yellow” with single traffic class.............................................. 625
41 Routing Information Protocol (RIP).......................................................................................... 627
Protocol Overview............................................................................................................................................................ 627
RIPv1..............................................................................................................................................................................627
RIPv2.............................................................................................................................................................................627
Implementation Information............................................................................................................................................. 627
Configuration Information................................................................................................................................................ 628
Configuration Task List...............................................................................................................................................628
RIP Configuration Example........................................................................................................................................ 633
42 Remote Monitoring (RMON)....................................................................................................638
Implementation Information.............................................................................................................................................638
Fault Recovery...................................................................................................................................................................638
Setting the RMON Alarm........................................................................................................................................... 638
Configuring an RMON Event.....................................................................................................................................639
Configuring RMON Collection Statistics..................................................................................................................640
Configuring the RMON Collection History...............................................................................................................640
43 Rapid Spanning Tree Protocol (RSTP)...................................................................................... 641
Protocol Overview............................................................................................................................................................. 641
Configuring Rapid Spanning Tree.................................................................................................................................... 641
Important Points to Remember....................................................................................................................................... 641
RSTP and VLT............................................................................................................................................................. 642
Configuring Interfaces for Layer 2 Mode.......................................................................................................................642
Enabling Rapid Spanning Tree Protocol Globally...........................................................................................................642
Adding and Removing Interfaces.................................................................................................................................... 644
Modifying Global Parameters.......................................................................................................................................... 644
Enabling SNMP Traps for Root Elections and Topology Changes....................................................................... 645
Modifying Interface Parameters..................................................................................................................................... 646
Enabling SNMP Traps for Root Elections and Topology Changes.............................................................................646
Influencing RSTP Root Selection.................................................................................................................................... 646
Configuring an EdgePort..................................................................................................................................................647
Configuring Fast Hellos for Link State Detection..........................................................................................................647
44 Software-Defined Networking (SDN)....................................................................................... 649
45 Security.................................................................................................................................650
AAA Accounting................................................................................................................................................................ 650
Configuration Task List for AAA Accounting...........................................................................................................650
20
Contents
/