Dell PowerSwitch S4810P Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4810P Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S4810
System
9.7(0.0)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2015 - 02
Rev. A00
Contents
1 About this Guide................................................................................................. 36
Audience..............................................................................................................................................36
Conventions........................................................................................................................................ 36
Related Documents............................................................................................................................ 36
2 Configuration Fundamentals............................................................................37
Accessing the Command Line............................................................................................................37
CLI Modes............................................................................................................................................37
Navigating CLI Modes................................................................................................................... 39
The do Command...............................................................................................................................42
Undoing Commands...........................................................................................................................43
Obtaining Help....................................................................................................................................44
Entering and Editing Commands....................................................................................................... 44
Command History...............................................................................................................................45
Filtering show Command Outputs.....................................................................................................45
Multiple Users in Configuration Mode............................................................................................... 47
3 Getting Started................................................................................................... 48
Console Access...................................................................................................................................48
Serial Console................................................................................................................................48
Accessing the CLI Interface and Running Scripts Using SSH............................................................49
Entering CLI commands Using an SSH Connection................................................................... 50
Executing Local CLI Scripts Using an SSH Connection...............................................................50
Default Configuration..........................................................................................................................51
Configuring a Host Name................................................................................................................... 51
Accessing the System Remotely.........................................................................................................51
Accessing the System Remotely................................................................................................... 51
Configure the Management Port IP Address................................................................................51
Configure a Management Route.................................................................................................. 52
Configuring a Username and Password.......................................................................................52
Configuring the Enable Password...................................................................................................... 52
Configuration File Management.........................................................................................................53
Copy Files to and from the System.............................................................................................. 53
Mounting an NFS File System....................................................................................................... 54
Save the Running-Configuration..................................................................................................56
Configure the Overload Bit for a Startup Scenario......................................................................56
Viewing Files.................................................................................................................................. 56
Compressing Configuration Files................................................................................................. 58
Managing the File System................................................................................................................... 61
Enabling Software Features on Devices Using a Command Option.................................................61
View Command History......................................................................................................................62
Upgrading Dell Networking OS.......................................................................................................... 62
Using Hashes to Validate Software Images........................................................................................63
Using HTTP for File Transfers............................................................................................................. 64
4 Management........................................................................................................65
Configuring Privilege Levels............................................................................................................... 65
Creating a Custom Privilege Level................................................................................................65
Removing a Command from EXEC Mode................................................................................... 65
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................66
Allowing Access to CONFIGURATION Mode Commands..........................................................66
Allowing Access to the Following Modes.................................................................................... 66
Applying a Privilege Level to a Username.................................................................................... 68
Applying a Privilege Level to a Terminal Line...............................................................................68
Configuring Logging...........................................................................................................................68
Audit and Security Logs................................................................................................................ 69
Configuring Logging Format .......................................................................................................71
Display the Logging Buffer and the Logging Configuration........................................................ 71
Setting Up a Secure Connection to a Syslog Server.................................................................... 72
Sending System Messages to a Syslog Server.............................................................................. 73
Log Messages in the Internal Buffer................................................................................................... 73
Configuration Task List for System Log Management.................................................................73
Disabling System Logging...................................................................................................................73
Sending System Messages to a Syslog Server....................................................................................74
Configuring a UNIX System as a Syslog Server............................................................................ 74
Changing System Logging Settings....................................................................................................74
Display the Logging Buffer and the Logging Configuration..............................................................75
Configuring a UNIX Logging Facility Level.........................................................................................76
Synchronizing Log Messages..............................................................................................................77
Enabling Timestamp on Syslog Messages..........................................................................................78
File Transfer Services...........................................................................................................................78
Configuration Task List for File Transfer Services........................................................................ 78
Enabling the FTP Server................................................................................................................ 79
Configuring FTP Server Parameters..............................................................................................79
Configuring FTP Client Parameters.............................................................................................. 79
Terminal Lines.....................................................................................................................................80
Denying and Permitting Access to a Terminal Line.....................................................................80
Configuring Login Authentication for Terminal Lines..................................................................81
Setting Time Out of EXEC Privilege Mode......................................................................................... 82
Using Telnet to get to Another Network Device............................................................................... 82
Lock CONFIGURATION Mode............................................................................................................83
Viewing the Configuration Lock Status........................................................................................83
Recovering from a Forgotten Password............................................................................................ 84
Recovering from a Forgotten Enable Password.......................................................................... 85
Recovering from a Failed Start........................................................................................................... 86
Restoring the Factory Default Settings.............................................................................................. 86
Important Points to Remember....................................................................................................86
Restoring Factory Default Environment Variables....................................................................... 87
5 802.1ag................................................................................................................. 89
Ethernet CFM...................................................................................................................................... 89
Maintenance Domains........................................................................................................................90
Maintenance Points............................................................................................................................ 90
Maintenance End Points......................................................................................................................91
Implementation Information.............................................................................................................. 92
Configuring the CFM.......................................................................................................................... 92
Related Configuration Tasks.........................................................................................................92
Enabling Ethernet CFM....................................................................................................................... 92
Creating a Maintenance Domain........................................................................................................92
Creating a Maintenance Association..................................................................................................93
Create Maintenance Points................................................................................................................ 93
Creating a Maintenance End Point...............................................................................................93
Creating a Maintenance Intermediate Point................................................................................94
Displaying the MP Databases........................................................................................................95
Continuity Check Messages............................................................................................................... 96
Enabling CCM................................................................................................................................97
Enabling Cross-Checking............................................................................................................. 97
Sending Loopback Messages and Responses....................................................................................97
Sending Linktrace Messages and Responses.....................................................................................98
Caching Link Trace....................................................................................................................... 98
Enabling CFM SNMP Traps................................................................................................................. 99
Displaying Ethernet CFM Statistics................................................................................................... 101
6 802.1X.................................................................................................................102
The Port-Authentication Process.....................................................................................................103
EAP over RADIUS.........................................................................................................................105
Configuring 802.1X........................................................................................................................... 105
Related Configuration Tasks.......................................................................................................105
Important Points to Remember....................................................................................................... 106
Enabling 802.1X.................................................................................................................................106
Configuring Request Identity Re-Transmissions.............................................................................108
Configuring a Quiet Period after a Failed Authentication......................................................... 108
Forcibly Authorizing or Unauthorizing a Port..................................................................................109
Re-Authenticating a Port.................................................................................................................. 110
Configuring Timeouts........................................................................................................................111
Configuring Dynamic VLAN Assignment with Port Authentication.................................................112
Guest and Authentication-Fail VLANs...............................................................................................113
Configuring a Guest VLAN.......................................................................................................... 114
Configuring an Authentication-Fail VLAN.................................................................................. 114
7 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM)......................................................................................................116
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..........................................116
Guidelines for Configuring ACL VLAN groups..................................................................................117
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters........................ 118
Configuring ACL VLAN Groups................................................................................................... 118
Configuring FP Blocks for VLAN Parameters..............................................................................119
Viewing CAM Usage..........................................................................................................................120
Allocating FP Blocks for VLAN Processes.........................................................................................121
8 Access Control Lists (ACLs).............................................................................123
IP Access Control Lists (ACLs).......................................................................................................... 124
CAM Usage.................................................................................................................................. 124
Implementing ACLs on Dell Networking OS..............................................................................125
Important Points to Remember........................................................................................................127
Configuration Task List for Route Maps..................................................................................... 127
Configuring Match Routes..........................................................................................................130
Configuring Set Conditions.........................................................................................................131
Configure a Route Map for Route Redistribution...................................................................... 132
Configure a Route Map for Route Tagging................................................................................ 133
Continue Clause..........................................................................................................................133
IP Fragment Handling........................................................................................................................133
IP Fragments ACL Examples....................................................................................................... 134
Layer 4 ACL Rules Examples.......................................................................................................134
Configure a Standard IP ACL............................................................................................................ 135
Configuring a Standard IP ACL Filter.......................................................................................... 136
Configure an Extended IP ACL..........................................................................................................137
Configuring Filters with a Sequence Number............................................................................ 137
Configuring Filters Without a Sequence Number......................................................................139
Configure Layer 2 and Layer 3 ACLs................................................................................................140
Assign an IP ACL to an Interface...................................................................................................... 140
Applying an IP ACL............................................................................................................................ 141
Counting ACL Hits....................................................................................................................... 141
Configure Ingress ACLs.....................................................................................................................142
Configure Egress ACLs......................................................................................................................143
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................... 144
IP Prefix Lists......................................................................................................................................144
Implementation Information...................................................................................................... 145
Configuration Task List for Prefix Lists....................................................................................... 145
ACL Resequencing............................................................................................................................149
Resequencing an ACL or Prefix List............................................................................................149
Route Maps........................................................................................................................................ 151
Implementation Information.......................................................................................................151
Logging of ACL Processes.................................................................................................................151
Guidelines for Configuring ACL Logging....................................................................................152
Configuring ACL Logging............................................................................................................153
Flow-Based Monitoring Support for ACLs....................................................................................... 154
Behavior of Flow-Based Monitoring...........................................................................................154
Enabling Flow-Based Monitoring............................................................................................... 155
9 Bidirectional Forwarding Detection (BFD)...................................................157
How BFD Works.................................................................................................................................157
BFD Packet Format......................................................................................................................158
BFD Sessions............................................................................................................................... 160
BFD Three-Way Handshake........................................................................................................160
Session State Changes.................................................................................................................161
Important Points to Remember........................................................................................................162
Configure BFD...................................................................................................................................162
Configure BFD for Physical Ports............................................................................................... 163
Configure BFD for Static Routes.................................................................................................166
Configure BFD for OSPF............................................................................................................. 168
Configure BFD for OSPFv3.......................................................................................................... 171
Configure BFD for IS-IS...............................................................................................................172
Configure BFD for BGP............................................................................................................... 175
Configure BFD for VRRP............................................................................................................. 182
Configuring Protocol Liveness................................................................................................... 185
Troubleshooting BFD.................................................................................................................. 185
10 Border Gateway Protocol IPv4 (BGPv4).....................................................187
Autonomous Systems (AS)................................................................................................................187
Sessions and Peers............................................................................................................................189
Establish a Session.......................................................................................................................190
Route Reflectors............................................................................................................................... 190
BGP Attributes....................................................................................................................................191
Best Path Selection Criteria.........................................................................................................192
Weight..........................................................................................................................................194
Local Preference......................................................................................................................... 194
Multi-Exit Discriminators (MEDs)................................................................................................ 195
Origin........................................................................................................................................... 196
AS Path......................................................................................................................................... 197
Next Hop......................................................................................................................................197
Multiprotocol BGP............................................................................................................................ 198
Implement BGP with Dell Networking OS.......................................................................................198
Additional Path (Add-Path) Support........................................................................................... 198
Advertise IGP Cost as MED for Redistributed Routes................................................................ 198
Ignore Router-ID for Some Best-Path Calculations..................................................................199
Four-Byte AS Numbers............................................................................................................... 199
AS4 Number Representation......................................................................................................200
AS Number Migration..................................................................................................................201
BGP4 Management Information Base (MIB)..............................................................................203
Important Points to Remember................................................................................................. 203
Configuration Information............................................................................................................... 204
BGP Configuration........................................................................................................................... 204
Enabling BGP...............................................................................................................................205
Configuring AS4 Number Representations............................................................................... 209
Configuring Peer Groups.............................................................................................................211
Configuring BGP Fast Fall-Over..................................................................................................213
Configuring Passive Peering....................................................................................................... 215
Maintaining Existing AS Numbers During an AS Migration........................................................216
Allowing an AS Number to Appear in its Own AS Path.............................................................. 217
Enabling Graceful Restart............................................................................................................218
Enabling Neighbor Graceful Restart...........................................................................................219
Filtering on an AS-Path Attribute................................................................................................ 219
Regular Expressions as Filters..................................................................................................... 221
Redistributing Routes..................................................................................................................222
Enabling Additional Paths........................................................................................................... 223
Configuring IP Community Lists................................................................................................ 223
Configuring an IP Extended Community List............................................................................ 225
Filtering Routes with Community Lists...................................................................................... 226
Manipulating the COMMUNITY Attribute...................................................................................226
Changing MED Attributes........................................................................................................... 228
Changing the LOCAL_PREFERENCE Attribute.......................................................................... 228
Changing the NEXT_HOP Attribute........................................................................................... 229
Changing the WEIGHT Attribute................................................................................................ 230
Enabling Multipath...................................................................................................................... 230
Filtering BGP Routes...................................................................................................................230
Filtering BGP Routes Using Route Maps.................................................................................... 232
Filtering BGP Routes Using AS-PATH Information.................................................................... 233
Configuring BGP Route Reflectors.............................................................................................233
Aggregating Routes.................................................................................................................... 234
Configuring BGP Confederations...............................................................................................235
Enabling Route Flap Dampening................................................................................................235
Changing BGP Timers.................................................................................................................238
Enabling BGP Neighbor Soft-Reconfiguration..........................................................................238
Route Map Continue.................................................................................................................. 240
Enabling MBGP Configurations....................................................................................................... 240
BGP Regular Expression Optimization............................................................................................. 241
Debugging BGP.................................................................................................................................241
Storing Last and Bad PDUs......................................................................................................... 242
Capturing PDUs...........................................................................................................................243
PDU Counters............................................................................................................................. 244
Sample Configurations.....................................................................................................................244
11 Content Addressable Memory (CAM)..........................................................251
CAM Allocation..................................................................................................................................251
Test CAM Usage................................................................................................................................253
View CAM-ACL Settings................................................................................................................... 253
View CAM Usage...............................................................................................................................255
CAM Optimization............................................................................................................................ 256
Troubleshoot CAM Profiling.............................................................................................................256
CAM Profile Mismatches.............................................................................................................256
QoS CAM Region Limitation.......................................................................................................256
12 Control Plane Policing (CoPP)..................................................................... 258
Configure Control Plane Policing.................................................................................................... 259
Configuring CoPP for Protocols................................................................................................ 260
Configuring CoPP for CPU Queues...........................................................................................262
CoPP for OSPFv3 Packets...........................................................................................................263
Configuring CoPP for OSPFv3................................................................................................... 266
Show Commands........................................................................................................................267
13 Data Center Bridging (DCB)......................................................................... 269
Ethernet Enhancements in Data Center Bridging........................................................................... 269
Priority-Based Flow Control.......................................................................................................270
Enhanced Transmission Selection.............................................................................................. 271
Data Center Bridging Exchange Protocol (DCBx)......................................................................272
Data Center Bridging in a Traffic Flow....................................................................................... 273
Enabling Data Center Bridging......................................................................................................... 273
QoS dot1p Traffic Classification and Queue Assignment............................................................... 274
DCB Maps and its Attributes............................................................................................................. 275
DCB Map: Configuration Procedure.......................................................................................... 275
Important Points to Remember..................................................................................................275
Applying a DCB Map on a Port................................................................................................... 276
Configuring PFC without a DCB Map........................................................................................ 276
Configuring Lossless Queues..................................................................................................... 277
Data Center Bridging: Default Configuration.................................................................................. 278
Configuring PFC and ETS in a DCB Map..........................................................................................279
PFC Configuration Notes............................................................................................................279
PFC Prerequisites and Restrictions............................................................................................ 280
ETS Configuration Notes............................................................................................................280
ETS Prerequisites and Restrictions..............................................................................................281
Configuring Priority-Based Flow Control........................................................................................282
Configuring Lossless Queues.....................................................................................................283
Configure Enhanced Transmission Selection..................................................................................283
ETS Prerequisites and Restrictions.............................................................................................284
Creating an ETS Priority Group.................................................................................................. 284
ETS Operation with DCBx...........................................................................................................285
Configuring Bandwidth Allocation for DCBx CIN..................................................................... 286
Applying DCB Policies in a Switch Stack......................................................................................... 286
Configure a DCBx Operation........................................................................................................... 287
DCBx Operation..........................................................................................................................287
DCBx Port Roles..........................................................................................................................287
DCB Configuration Exchange.................................................................................................... 289
Configuration Source Election...................................................................................................289
Propagation of DCB Information...............................................................................................290
Auto-Detection and Manual Configuration of the DCBx Version............................................290
Behavior of Tagged Packets....................................................................................................... 291
Configuration Example for DSCP and PFC Priorities.................................................................291
DCBx Example.............................................................................................................................292
DCBx Prerequisites and Restrictions..........................................................................................293
Configuring DCBx.......................................................................................................................293
Verifying the DCB Configuration......................................................................................................297
Using PFC and ETS to Manage Data Center Traffic........................................................................ 308
PFC and ETS Configuration Command Examples.....................................................................310
Using PFC and ETS to Manage Converged Ethernet Traffic..................................................... 310
Hierarchical Scheduling in ETS Output Policies........................................................................ 310
Priority-Based Flow Control Using Dynamic Buffer Method...........................................................311
Pause and Resume of Traffic.......................................................................................................311
Buffer Sizes for Lossless or PFC Packets.................................................................................... 312
Configuring the Dynamic Buffer Method.........................................................................................312
Sample Configurations..................................................................................................................... 314
......................................................................................................................................................314
14 Dynamic Host Configuration Protocol (DHCP)........................................318
DHCP Packet Format and Options...................................................................................................318
Assign an IP Address using DHCP....................................................................................................320
Implementation Information............................................................................................................ 321
Configure the System to be a DHCP Server.................................................................................... 322
Configuring the Server for Automatic Address Allocation........................................................ 322
Specifying a Default Gateway.....................................................................................................324
Configure a Method of Hostname Resolution.......................................................................... 324
Using DNS for Address Resolution.............................................................................................324
Using NetBIOS WINS for Address Resolution............................................................................324
Creating Manual Binding Entries................................................................................................ 324
Debugging the DHCP Server......................................................................................................325
Using DHCP Clear Commands...................................................................................................325
Configure the System to be a Relay Agent......................................................................................325
Configure the System to be a DHCP Client.....................................................................................327
Configuring the DHCP Client System........................................................................................328
DHCP Client on a Management Interface................................................................................. 329
DHCP Client Operation with Other Features............................................................................ 330
Configure the System for User Port Stacking (Option 230)............................................................ 331
Configure Secure DHCP................................................................................................................... 331
Option 82.....................................................................................................................................331
DHCP Snooping.......................................................................................................................... 332
Drop DHCP Packets on Snooped VLANs Only..........................................................................335
Dynamic ARP Inspection............................................................................................................ 336
Configuring Dynamic ARP Inspection........................................................................................337
Source Address Validation................................................................................................................338
Enabling IP Source Address Validation.......................................................................................338
DHCP MAC Source Address Validation......................................................................................339
Enabling IP+MAC Source Address Validation............................................................................ 339
Viewing the Number of SAV Dropped Packets......................................................................... 340
Clearing the Number of SAV Dropped Packets.........................................................................340
15 Equal Cost Multi-Path (ECMP)..................................................................... 341
ECMP for Flow-Based Affinity...........................................................................................................341
Configuring the Hash Algorithm.................................................................................................341
Enabling Deterministic ECMP Next Hop.................................................................................... 341
Configuring the Hash Algorithm Seed....................................................................................... 342
Link Bundle Monitoring.................................................................................................................... 342
Managing ECMP Group Paths.................................................................................................... 343
Creating an ECMP Group Bundle...............................................................................................343
Modifying the ECMP Group Threshold......................................................................................344
16 FCoE Transit.................................................................................................... 345
Fibre Channel over Ethernet............................................................................................................ 345
Ensure Robustness in a Converged Ethernet Network...................................................................345
FIP Snooping on Ethernet Bridges................................................................................................... 347
FIP Snooping in a Switch Stack........................................................................................................ 349
Using FIP Snooping...........................................................................................................................349
FIP Snooping Prerequisites.........................................................................................................349
Important Points to Remember................................................................................................. 350
Enabling the FCoE Transit Feature..............................................................................................351
Enable FIP Snooping on VLANs.................................................................................................. 351
Configure the FC-MAP Value......................................................................................................351
Configure a Port for a Bridge-to-Bridge Link............................................................................ 351
Configure a Port for a Bridge-to-FCF Link................................................................................ 352
Impact on Other Software Features...........................................................................................352
FIP Snooping Restrictions...........................................................................................................352
Configuring FIP Snooping...........................................................................................................353
Displaying FIP Snooping Information...............................................................................................353
FCoE Transit Configuration Example...............................................................................................359
17 Enabling FIPS Cryptography.........................................................................361
Configuration Tasks.......................................................................................................................... 361
Preparing the System........................................................................................................................ 361
Enabling FIPS Mode.......................................................................................................................... 362
Generating Host-Keys...................................................................................................................... 362
Monitoring FIPS Mode Status........................................................................................................... 363
Disabling FIPS Mode......................................................................................................................... 363
18 Force10 Resilient Ring Protocol (FRRP).....................................................365
Protocol Overview............................................................................................................................365
Ring Status...................................................................................................................................366
Multiple FRRP Rings.................................................................................................................... 367
Important FRRP Points................................................................................................................367
Important FRRP Concepts.......................................................................................................... 367
Implementing FRRP..........................................................................................................................369
FRRP Configuration.......................................................................................................................... 369
Creating the FRRP Group........................................................................................................... 369
Configuring the Control VLAN................................................................................................... 370
Configuring and Adding the Member VLANs............................................................................. 371
Setting the FRRP Timers..............................................................................................................372
Clearing the FRRP Counters....................................................................................................... 372
Viewing the FRRP Configuration................................................................................................ 373
Viewing the FRRP Information....................................................................................................373
Troubleshooting FRRP...................................................................................................................... 373
Configuration Checks................................................................................................................. 373
Sample Configuration and Topology...............................................................................................373
19 GARP VLAN Registration Protocol (GVRP)................................................ 376
Important Points to Remember....................................................................................................... 376
Configure GVRP................................................................................................................................ 377
Related Configuration Tasks....................................................................................................... 377
Enabling GVRP Globally....................................................................................................................378
Enabling GVRP on a Layer 2 Interface............................................................................................. 378
Configure GVRP Registration........................................................................................................... 378
Configure a GARP Timer...................................................................................................................379
RPM Redundancy............................................................................................................................. 380
20 High Availability (HA).....................................................................................381
Component Redundancy................................................................................................................. 381
Automatic and Manual Stack Unit Failover.................................................................................381
Synchronization between Management and Standby Units.....................................................382
Forcing an Stack Unit Failover....................................................................................................382
Specifying an Auto-Failover Limit.............................................................................................. 383
Disabling Auto-Reboot............................................................................................................... 383
Manually Synchronizing Management and Standby Units........................................................383
Pre-Configuring a Stack Unit Slot....................................................................................................383
Removing a Provisioned Logical Stack Unit.................................................................................... 384
Hitless Behavior................................................................................................................................ 384
Graceful Restart................................................................................................................................ 385
Software Resiliency...........................................................................................................................385
Software Component Health Monitoring..................................................................................385
System Health Monitoring..........................................................................................................385
Failure and Event Logging.......................................................................................................... 385
Hot-Lock Behavior........................................................................................................................... 386
21 Internet Group Management Protocol (IGMP).........................................387
IGMP Implementation Information..................................................................................................387
IGMP Protocol Overview.................................................................................................................. 387
IGMP Version 2............................................................................................................................387
IGMP Version 3............................................................................................................................389
Configure IGMP................................................................................................................................ 392
Related Configuration Tasks.......................................................................................................392
Viewing IGMP Enabled Interfaces.................................................................................................... 393
Selecting an IGMP Version............................................................................................................... 393
Viewing IGMP Groups...................................................................................................................... 394
Adjusting Timers............................................................................................................................... 394
Adjusting Query and Response Timers......................................................................................394
Preventing a Host from Joining a Group.........................................................................................395
Enabling IGMP Immediate-Leave.................................................................................................... 398
IGMP Snooping.................................................................................................................................398
IGMP Snooping Implementation Information...........................................................................398
Configuring IGMP Snooping...................................................................................................... 398
Removing a Group-Port Association......................................................................................... 399
Disabling Multicast Flooding...................................................................................................... 399
Specifying a Port as Connected to a Multicast Router............................................................. 400
Configuring the Switch as Querier............................................................................................ 400
Fast Convergence after MSTP Topology Changes..........................................................................401
Egress Interface Selection (EIS) for HTTP and IGMP Applications..................................................401
Protocol Separation....................................................................................................................402
Enabling and Disabling Management Egress Interface Selection............................................ 403
Handling of Management Route Configuration........................................................................404
Handling of Switch-Initiated Traffic...........................................................................................404
Handling of Switch-Destined Traffic......................................................................................... 405
Handling of Transit Traffic (Traffic Separation)......................................................................... 406
Mapping of Management Applications and Traffic Type..........................................................406
Behavior of Various Applications for Switch-Initiated Traffic .................................................. 407
Behavior of Various Applications for Switch-Destined Traffic ................................................ 408
Interworking of EIS With Various Applications.......................................................................... 409
Designating a Multicast Router Interface.........................................................................................410
22 Interfaces......................................................................................................... 411
Basic Interface Configuration........................................................................................................... 411
Advanced Interface Configuration....................................................................................................411
Interface Types..................................................................................................................................412
View Basic Interface Information..................................................................................................... 412
Enabling a Physical Interface............................................................................................................414
Physical Interfaces............................................................................................................................ 414
Configuration Task List for Physical Interfaces.......................................................................... 415
Overview of Layer Modes............................................................................................................415
Configuring Layer 2 (Data Link) Mode........................................................................................415
Configuring Layer 2 (Interface) Mode........................................................................................ 416
Configuring Layer 3 (Network) Mode.........................................................................................416
Configuring Layer 3 (Interface) Mode.........................................................................................417
Egress Interface Selection (EIS).........................................................................................................417
Important Points to Remember..................................................................................................418
Configuring EIS............................................................................................................................418
Management Interfaces....................................................................................................................418
Configuring Management Interfaces......................................................................................... 418
Configuring Management Interfaces on the S-Series...............................................................420
VLAN Interfaces.................................................................................................................................421
Loopback Interfaces......................................................................................................................... 422
Null Interfaces...................................................................................................................................422
Port Channel Interfaces....................................................................................................................422
Port Channel Definition and Standards......................................................................................423
Port Channel Benefits.................................................................................................................423
Port Channel Implementation....................................................................................................423
10/100/1000 Mbps Interfaces in Port Channels........................................................................424
Configuration Tasks for Port Channel Interfaces......................................................................424
Creating a Port Channel............................................................................................................. 425
Adding a Physical Interface to a Port Channel.......................................................................... 425
Reassigning an Interface to a New Port Channel......................................................................427
Configuring the Minimum Oper Up Links in a Port Channel....................................................428
.....................................................................................................................................................428
Assigning an IP Address to a Port Channel................................................................................429
Deleting or Disabling a Port Channel.........................................................................................429
Load Balancing Through Port Channels....................................................................................429
Load-Balancing Method.............................................................................................................430
Changing the Hash Algorithm....................................................................................................430
Bulk Configuration............................................................................................................................432
Interface Range...........................................................................................................................432
Bulk Configuration Examples..................................................................................................... 432
Defining Interface Range Macros.................................................................................................... 434
Define the Interface Range.........................................................................................................434
Choosing an Interface-Range Macro........................................................................................ 434
Monitoring and Maintaining Interfaces............................................................................................435
Maintenance Using TDR............................................................................................................. 436
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 436
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port............................................................ 437
Important Points to Remember................................................................................................. 438
Support for LM4 Optics.............................................................................................................. 438
Example Scenarios......................................................................................................................438
Link Dampening................................................................................................................................442
Important Points to Remember................................................................................................. 443
Enabling Link Dampening...........................................................................................................443
Link Bundle Monitoring.................................................................................................................... 444
Using Ethernet Pause Frames for Flow Control.............................................................................. 445
Enabling Pause Frames...............................................................................................................446
Configure the MTU Size on an Interface.........................................................................................446
Port-Pipes......................................................................................................................................... 447
Auto-Negotiation on Ethernet Interfaces........................................................................................447
Setting the Speed and Duplex Mode of Ethernet Interfaces.................................................... 448
Set Auto-Negotiation Options................................................................................................... 449
View Advanced Interface Information.............................................................................................450
Configuring the Interface Sampling Size....................................................................................451
Dynamic Counters............................................................................................................................452
Clearing Interface Counters....................................................................................................... 453
Enhanced Validation of Interface Ranges........................................................................................453
23 Internet Protocol Security (IPSec).............................................................. 455
Configuring IPSec ............................................................................................................................456
24 IPv4 Routing....................................................................................................457
IP Addresses...................................................................................................................................... 457
Implementation Information...................................................................................................... 457
Configuration Tasks for IP Addresses...............................................................................................457
Assigning IP Addresses to an Interface............................................................................................458
Configuring Static Routes................................................................................................................ 459
Configure Static Routes for the Management Interface................................................................. 461
IPv4 Path MTU Discovery Overview.................................................................................................461
Using the Configured Source IP Address in ICMP Messages..........................................................462
Configuring the ICMP Source Interface.....................................................................................462
Configuring the Duration to Establish a TCP Connection..............................................................463
Enabling Directed Broadcast............................................................................................................463
Resolution of Host Names............................................................................................................... 464
Enabling Dynamic Resolution of Host Names................................................................................ 464
Specifying the Local System Domain and a List of Domains..........................................................465
Configuring DNS with Traceroute................................................................................................... 465
ARP....................................................................................................................................................466
Configuration Tasks for ARP............................................................................................................ 466
Configuring Static ARP Entries......................................................................................................... 467
Enabling Proxy ARP...........................................................................................................................467
Clearing ARP Cache..........................................................................................................................467
ARP Learning via Gratuitous ARP..................................................................................................... 468
Enabling ARP Learning via Gratuitous ARP......................................................................................468
ARP Learning via ARP Request......................................................................................................... 469
Configuring ARP Retries...................................................................................................................469
ICMP..................................................................................................................................................470
Configuration Tasks for ICMP.......................................................................................................... 470
Enabling ICMP Unreachable Messages............................................................................................470
UDP Helper........................................................................................................................................471
Configure UDP Helper................................................................................................................ 471
Important Points to Remember..................................................................................................471
Enabling UDP Helper.........................................................................................................................471
Configuring a Broadcast Address.....................................................................................................472
Configurations Using UDP Helper....................................................................................................472
UDP Helper with Broadcast-All Addresses...................................................................................... 473
UDP Helper with Subnet Broadcast Addresses................................................................................473
UDP Helper with Configured Broadcast Addresses........................................................................ 474
UDP Helper with No Configured Broadcast Addresses.................................................................. 475
Troubleshooting UDP Helper...........................................................................................................475
25 IPv6 Routing....................................................................................................476
Protocol Overview............................................................................................................................476
Extended Address Space.............................................................................................................476
Stateless Autoconfiguration........................................................................................................476
IPv6 Headers................................................................................................................................477
IPv6 Header Fields.......................................................................................................................478
Extension Header Fields..............................................................................................................479
Addressing...................................................................................................................................480
Implementing IPv6 with Dell Networking OS..................................................................................482
ICMPv6..............................................................................................................................................484
Path MTU Discovery......................................................................................................................... 484
IPv6 Neighbor Discovery..................................................................................................................485
IPv6 Neighbor Discovery of MTU Packets.................................................................................486
Configuration Task List for IPv6 RDNSS.......................................................................................... 486
Configuring the IPv6 Recursive DNS Server..............................................................................486
Debugging IPv6 RDNSS Information Sent to the Host .............................................................487
Displaying IPv6 RDNSS Information.......................................................................................... 488
Secure Shell (SSH) Over an IPv6 Transport..................................................................................... 488
Configuration Tasks for IPv6............................................................................................................489
Adjusting Your CAM-Profile....................................................................................................... 489
Assigning an IPv6 Address to an Interface.................................................................................490
Assigning a Static IPv6 Route..................................................................................................... 490
Configuring Telnet with IPv6......................................................................................................491
SNMP over IPv6...........................................................................................................................491
Showing IPv6 Information.......................................................................................................... 491
Showing an IPv6 Interface..........................................................................................................492
Showing IPv6 Routes..................................................................................................................493
Showing the Running-Configuration for an Interface..............................................................494
Clearing IPv6 Routes.................................................................................................................. 494
Configuring IPv6 RA Guard.............................................................................................................. 495
Configuring IPv6 RA Guard on an Interface.............................................................................. 497
Monitoring IPv6 RA Guard.......................................................................................................... 497
26 iSCSI Optimization........................................................................................ 498
iSCSI Optimization Overview........................................................................................................... 498
Monitoring iSCSI Traffic Flows................................................................................................... 500
Application of Quality of Service to iSCSI Traffic Flows............................................................500
Information Monitored in iSCSI Traffic Flows........................................................................... 500
Detection and Auto-Configuration for Dell EqualLogic Arrays.................................................501
Configuring Detection and Ports for Dell Compellent Arrays.................................................. 502
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer........................................502
Enable and Disable iSCSI Optimization......................................................................................502
Default iSCSI Optimization Values...................................................................................................503
iSCSI Optimization Prerequisites..................................................................................................... 504
Configuring iSCSI Optimization.......................................................................................................504
Displaying iSCSI Optimization Information..................................................................................... 506
27 Intermediate System to Intermediate System.......................................... 508
IS-IS Protocol Overview...................................................................................................................508
IS-IS Addressing................................................................................................................................508
Multi-Topology IS-IS........................................................................................................................ 509
Transition Mode.......................................................................................................................... 510
Interface Support.........................................................................................................................510
Adjacencies..................................................................................................................................510
Graceful Restart.................................................................................................................................510
Timers...........................................................................................................................................511
Implementation Information.............................................................................................................511
Configuration Information................................................................................................................512
Configuration Tasks for IS-IS...................................................................................................... 512
Configuring the Distance of a Route..........................................................................................521
Changing the IS-Type................................................................................................................. 521
Redistributing IPv4 Routes..........................................................................................................524
Redistributing IPv6 Routes..........................................................................................................525
Configuring Authentication Passwords......................................................................................525
Setting the Overload Bit..............................................................................................................526
Debugging IS-IS.......................................................................................................................... 527
IS-IS Metric Styles............................................................................................................................. 528
Configure Metric Values...................................................................................................................528
Maximum Values in the Routing Table...................................................................................... 529
Change the IS-IS Metric Style in One Level Only...................................................................... 529
Leaks from One Level to Another.............................................................................................. 530
Sample Configurations......................................................................................................................531
28 Link Aggregation Control Protocol (LACP)...............................................534
Introduction to Dynamic LAGs and LACP....................................................................................... 534
Important Points to Remember................................................................................................. 534
LACP Modes................................................................................................................................ 535
Configuring LACP Commands................................................................................................... 535
LACP Configuration Tasks................................................................................................................536
Creating a LAG............................................................................................................................ 536
Configuring the LAG Interfaces as Dynamic..............................................................................537
Setting the LACP Long Timeout................................................................................................. 537
Monitoring and Debugging LACP.............................................................................................. 538
Shared LAG State Tracking............................................................................................................... 538
Configuring Shared LAG State Tracking.....................................................................................539
Important Points about Shared LAG State Tracking..................................................................540
LACP Basic Configuration Example..................................................................................................541
Configure a LAG on ALPHA........................................................................................................ 541
29 Layer 2..............................................................................................................549
Manage the MAC Address Table...................................................................................................... 549
Clearing the MAC Address Table................................................................................................549
Setting the Aging Time for Dynamic Entries..............................................................................549
Configuring a Static MAC Address............................................................................................. 550
Displaying the MAC Address Table.............................................................................................550
MAC Learning Limit.......................................................................................................................... 550
Setting the MAC Learning Limit.................................................................................................. 551
mac learning-limit Dynamic....................................................................................................... 551
mac learning-limit mac-address-sticky.....................................................................................552
mac learning-limit station-move............................................................................................... 552
mac learning-limit no-station-move......................................................................................... 552
Learning Limit Violation Actions.................................................................................................553
Setting Station Move Violation Actions...................................................................................... 553
Recovering from Learning Limit and Station Move Violations..................................................554
NIC Teaming..................................................................................................................................... 554
Configure Redundant Pairs...............................................................................................................555
Important Points about Configuring Redundant Pairs.............................................................. 557
Far-End Failure Detection................................................................................................................ 558
FEFD State Changes....................................................................................................................559
Configuring FEFD........................................................................................................................560
Enabling FEFD on an Interface....................................................................................................561
Debugging FEFD......................................................................................................................... 562
30 Link Layer Discovery Protocol (LLDP)........................................................564
802.1AB (LLDP) Overview.................................................................................................................564
Protocol Data Units.....................................................................................................................564
Optional TLVs....................................................................................................................................565
Management TLVs...................................................................................................................... 565
TIA-1057 (LLDP-MED) Overview...................................................................................................... 567
TIA Organizationally Specific TLVs.............................................................................................568
Configure LLDP.................................................................................................................................572
Related Configuration Tasks.......................................................................................................572
Important Points to Remember..................................................................................................573
LLDP Compatibility......................................................................................................................573
CONFIGURATION versus INTERFACE Configurations.................................................................... 573
Enabling LLDP................................................................................................................................... 574
Disabling and Undoing LLDP......................................................................................................574
Enabling LLDP on Management Ports............................................................................................. 574
Disabling and Undoing LLDP on Management Ports................................................................ 574
Advertising TLVs................................................................................................................................ 575
Viewing the LLDP Configuration......................................................................................................576
Viewing Information Advertised by Adjacent LLDP Agents.............................................................577
Configuring LLDPDU Intervals..........................................................................................................578
Configuring Transmit and Receive Mode........................................................................................ 578
Configuring a Time to Live............................................................................................................... 579
Debugging LLDP...............................................................................................................................580
Relevant Management Objects........................................................................................................ 581
31 Microsoft Network Load Balancing............................................................ 587
NLB Unicast Mode Scenario.............................................................................................................587
NLB Multicast Mode Scenario..........................................................................................................588
Limitations With Enabling NLB on Switches....................................................................................588
Benefits and Working of Microsoft Clustering................................................................................ 588
Enable and Disable VLAN Flooding .................................................................................................589
Configuring a Switch for NLB ..........................................................................................................589
.....................................................................................................................................................589
32 Multicast Source Discovery Protocol (MSDP)...........................................590
Protocol Overview............................................................................................................................590
Anycast RP.........................................................................................................................................592
Implementation Information............................................................................................................592
Configure Multicast Source Discovery Protocol............................................................................. 592
Related Configuration Tasks.......................................................................................................592
Enable MSDP.....................................................................................................................................596
Manage the Source-Active Cache................................................................................................... 597
Viewing the Source-Active Cache..............................................................................................597
/