Dell PowerSwitch S6010-ON Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6010-ON Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S6010–ON
System
9.14.2.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2019 - 04
Rev. A00
Contents
1 About this Guide...........................................................................................................................................36
Audience........................................................................................................................................................................... 36
Conventions......................................................................................................................................................................36
Related Documents......................................................................................................................................................... 36
2 Conguration Fundamentals........................................................................................................................ 37
Accessing the Command Line........................................................................................................................................ 37
CLI Modes.........................................................................................................................................................................37
Navigating CLI Modes...............................................................................................................................................39
The do Command............................................................................................................................................................ 42
Undoing Commands........................................................................................................................................................ 42
Obtaining Help..................................................................................................................................................................43
Entering and Editing Commands....................................................................................................................................43
Command History............................................................................................................................................................ 44
Filtering show Command Outputs.................................................................................................................................44
Example of the grep Keyword.................................................................................................................................. 44
Multiple Users in Conguration Mode...........................................................................................................................45
3 Getting Started............................................................................................................................................46
Console Access................................................................................................................................................................ 47
Serial Console............................................................................................................................................................. 47
Default Conguration...................................................................................................................................................... 48
Conguring a Host Name............................................................................................................................................... 48
Accessing the System Remotely....................................................................................................................................48
Accessing the System Remotely..............................................................................................................................49
Congure the Management Port IP Address......................................................................................................... 49
Congure a Management Route..............................................................................................................................49
Conguring a Username and Password..................................................................................................................49
Conguring the Enable Password..................................................................................................................................50
Conguration File Management......................................................................................................................................51
Copy Files to and from the System..........................................................................................................................51
Mounting an NFS File System..................................................................................................................................52
Save the Running-Conguration..............................................................................................................................53
Congure the Overload Bit for a Startup Scenario............................................................................................... 54
Viewing Files...............................................................................................................................................................54
Managing the File System.............................................................................................................................................. 55
View Command History.................................................................................................................................................. 55
Upgrading Dell EMC Networking OS............................................................................................................................ 56
Using HTTP for File Transfers........................................................................................................................................56
Verify Software Images Before Installation...................................................................................................................57
4 Management............................................................................................................................................... 58
Contents
3
Conguring Privilege Levels........................................................................................................................................... 58
Creating a Custom Privilege Level...........................................................................................................................59
Removing a Command from EXEC Mode.............................................................................................................. 59
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................59
Allowing Access to CONFIGURATION Mode Commands....................................................................................59
Allowing Access to Dierent Modes........................................................................................................................59
Applying a Privilege Level to a Username................................................................................................................61
Applying a Privilege Level to a Terminal Line...........................................................................................................61
Conguring Logging......................................................................................................................................................... 61
Audit and Security Logs............................................................................................................................................ 62
Conguring Logging Format ...................................................................................................................................63
Setting Up a Secure Connection to a Syslog Server.............................................................................................63
Log Messages in the Internal Buer..............................................................................................................................65
Conguration Task List for System Log Management..........................................................................................65
Disabling System Logging...............................................................................................................................................65
Sending System Messages to a Syslog Server............................................................................................................65
Conguring a UNIX System as a Syslog Server.....................................................................................................65
Track Login Activity......................................................................................................................................................... 66
Restrictions for Tracking Login Activity.................................................................................................................. 66
Conguring Login Activity Tracking.........................................................................................................................66
Display Login Statistics..............................................................................................................................................67
Limit Concurrent Login Sessions....................................................................................................................................68
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 68
Conguring Concurrent Session Limit.....................................................................................................................68
Enabling the System to Clear Existing Sessions.................................................................................................... 69
Enabling Secured CLI Mode........................................................................................................................................... 70
Changing System Logging Settings...............................................................................................................................70
Display the Logging Buer and the Logging Conguration.........................................................................................71
Conguring a UNIX Logging Facility Level.....................................................................................................................71
Synchronizing Log Messages......................................................................................................................................... 72
Enabling Timestamp on Syslog Messages.................................................................................................................... 73
File Transfer Services.......................................................................................................................................................73
Conguration Task List for File Transfer Services.................................................................................................. 74
Enabling the FTP Server........................................................................................................................................... 74
Conguring FTP Server Parameters........................................................................................................................74
Conguring FTP Client Parameters......................................................................................................................... 75
Terminal Lines................................................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line................................................................................................75
Conguring Login Authentication for Terminal Lines.............................................................................................76
Setting Timeout for EXEC Privilege Mode....................................................................................................................77
Using Telnet to get to Another Network Device..........................................................................................................78
Lock CONFIGURATION Mode....................................................................................................................................... 78
Viewing the Conguration Lock Status...................................................................................................................78
Restoring the Factory Default Settings.........................................................................................................................79
Important Points to Remember................................................................................................................................79
4
Contents
Restoring Factory Default Environment Variables................................................................................................. 80
Viewing the Reason for Last System Reboot............................................................................................................... 81
Disabling Syslog Messages for SNMP Authentication Failure Events.......................................................................82
5 802.1X..........................................................................................................................................................83
Port-Authentication Process..........................................................................................................................................85
EAP over RADIUS......................................................................................................................................................85
Conguring 802.1X...........................................................................................................................................................86
Related Conguration Tasks..................................................................................................................................... 86
Important Points to Remember......................................................................................................................................86
Enabling 802.1X.................................................................................................................................................................87
Conguring Request Identity Re-Transmissions...........................................................................................................88
Conguring a Quiet Period after a Failed Authentication..................................................................................... 89
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 90
Re-Authenticating a Port................................................................................................................................................90
Conguring Timeouts.......................................................................................................................................................91
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................92
Guest and Authentication-Fail VLANs.......................................................................................................................... 93
Conguring a Guest VLAN....................................................................................................................................... 94
Conguring an Authentication-Fail VLAN...............................................................................................................94
6 Access Control Lists (ACLs)........................................................................................................................ 96
IP Access Control Lists (ACLs).......................................................................................................................................97
CAM Usage.................................................................................................................................................................98
Implementing ACLs on Dell EMC Networking OS................................................................................................. 98
Important Points to Remember....................................................................................................................................100
Conguration Task List for Route Maps................................................................................................................100
Conguring Match Routes...................................................................................................................................... 102
Conguring Set Conditions.....................................................................................................................................104
Congure a Route Map for Route Redistribution.................................................................................................105
Congure a Route Map for Route Tagging........................................................................................................... 105
Continue Clause........................................................................................................................................................106
IP Fragment Handling.................................................................................................................................................... 106
IP Fragments ACL Examples...................................................................................................................................106
Layer 4 ACL Rules Examples...................................................................................................................................107
Congure a Standard IP ACL........................................................................................................................................ 107
Conguring a Standard IP ACL Filter.....................................................................................................................108
Congure an Extended IP ACL.....................................................................................................................................109
Conguring Filters with a Sequence Number.......................................................................................................109
Conguring Filters Without a Sequence Number.................................................................................................. 111
Congure Layer 2 and Layer 3 ACLs............................................................................................................................ 112
Assign an IP ACL to an Interface...................................................................................................................................112
Applying an IP ACL..........................................................................................................................................................112
Counting ACL Hits.....................................................................................................................................................113
Congure Ingress ACLs.................................................................................................................................................. 113
Congure Egress ACLs...................................................................................................................................................114
Contents
5
Applying Egress Layer 3 ACLs (Control-Plane)..................................................................................................... 115
IP Prex Lists...................................................................................................................................................................115
Implementation Information..................................................................................................................................... 116
Conguration Task List for Prex Lists...................................................................................................................116
ACL Remarks................................................................................................................................................................... 119
Conguring a Remark.............................................................................................................................................. 120
Deleting a Remark.................................................................................................................................................... 120
ACL Resequencing..........................................................................................................................................................121
Resequencing an ACL or Prex List........................................................................................................................121
Route Maps.....................................................................................................................................................................123
Implementation Information.................................................................................................................................... 123
Flow-Based Monitoring..................................................................................................................................................123
Behavior of Flow-Based Monitoring.......................................................................................................................123
Enabling Flow-Based Monitoring............................................................................................................................125
Conguring IP Mirror Access Group............................................................................................................................ 126
Sample Conguration...............................................................................................................................................126
Example of viewing IP mirror–access–group applied to an Interface................................................................127
7 Bidirectional Forwarding Detection (BFD).................................................................................................. 128
How BFD Works............................................................................................................................................................. 128
BFD Packet Format..................................................................................................................................................129
BFD Sessions............................................................................................................................................................ 130
BFD Three-Way Handshake.....................................................................................................................................131
Session State Changes............................................................................................................................................133
Important Points to Remember.................................................................................................................................... 133
Congure BFD................................................................................................................................................................ 134
Congure BFD for Physical Ports...........................................................................................................................134
Congure BFD for Static Routes............................................................................................................................136
Congure BFD for IPv6 Static Routes...................................................................................................................139
Congure BFD for OSPF.........................................................................................................................................142
Congure BFD for OSPFv3.....................................................................................................................................148
Congure BFD for IS-IS............................................................................................................................................151
Congure BFD for BGP...........................................................................................................................................153
Congure BFD for VRRP......................................................................................................................................... 161
Conguring Protocol Liveness................................................................................................................................ 163
8 Border Gateway Protocol (BGP)................................................................................................................ 164
BGP IP version 4 (BGPv4) Overview.......................................................................................................................... 164
BGP Autonomous Systems.....................................................................................................................................164
AS4 Number Representation.................................................................................................................................. 166
Four-Byte AS Numbers............................................................................................................................................168
BGP router ID............................................................................................................................................................168
Sessions and Peers.................................................................................................................................................. 168
Establish a Session...................................................................................................................................................169
BGP Attributes for selecting Best Path.................................................................................................................169
Multiprotocol BGP.................................................................................................................................................... 174
6
Contents
BGP global and address family conguration........................................................................................................175
Implement BGP with Dell EMC Networking OS................................................................................................... 177
Conguration Information........................................................................................................................................180
Basic BGP conguration tasks..................................................................................................................................... 180
Prerequisite for conguring a BGP network......................................................................................................... 180
Restrictions................................................................................................................................................................ 181
Enabling BGP.............................................................................................................................................................181
Enabling four-byte autonomous system numbers................................................................................................183
Changing a BGP router ID.......................................................................................................................................184
Conguring AS4 Number Representations........................................................................................................... 184
Conguring a BGP peer...........................................................................................................................................186
Example-Conguring BGP routing between peers.............................................................................................. 187
BGP peer group........................................................................................................................................................188
Advanced BGP conguration tasks............................................................................................................................. 194
Route-refresh and Soft-reconguration................................................................................................................195
Aggregating Routes..................................................................................................................................................197
Filtering BGP.............................................................................................................................................................199
Conguring BGP Fast Fall-Over............................................................................................................................ 206
Conguring Passive Peering...................................................................................................................................207
Enabling Graceful Restart.......................................................................................................................................208
Redistributing Routes..............................................................................................................................................209
Enabling Additional Paths........................................................................................................................................ 210
Conguring IP Community Lists..............................................................................................................................211
Conguring an IP Extended Community List........................................................................................................ 212
Congure BGP attributes........................................................................................................................................ 213
Enabling Multipath....................................................................................................................................................217
Route Reectors.......................................................................................................................................................218
Enabling Route Flap Dampening.............................................................................................................................219
Changing BGP keepalive and hold timers..............................................................................................................221
Setting the extended timer.....................................................................................................................................222
Enabling or disabling BGP neighbors.....................................................................................................................223
Route Map Continue............................................................................................................................................... 224
Conguring BGP Confederations.......................................................................................................................... 224
Conguring a BGP VRF address family................................................................................................................ 225
Maintaining Existing AS Numbers During an AS Migration................................................................................ 226
Allowing an AS Number to Appear in its Own AS Path.......................................................................................227
Enabling MBGP Congurations............................................................................................................................. 228
MBGP support for IPv6..........................................................................................................................................228
Conguring IPv6 MBGP between peers.............................................................................................................. 229
Example-Conguring IPv4 and IPv6 neighbors................................................................................................... 229
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor......................................... 232
BGP Regular Expression Optimization..................................................................................................................233
Debugging BGP........................................................................................................................................................234
9 Content Addressable Memory (CAM)........................................................................................................236
CAM Allocation...............................................................................................................................................................236
Contents
7
Test CAM Usage............................................................................................................................................................238
View CAM Proles.........................................................................................................................................................238
View CAM-ACL Settings.............................................................................................................................................. 239
View CAM Usage...........................................................................................................................................................240
Conguring CAM Threshold and Silence Period.........................................................................................................241
Setting CAM Threshold and Silence Period.......................................................................................................... 241
CAM Optimization......................................................................................................................................................... 242
Troubleshoot CAM Proling..........................................................................................................................................242
QoS CAM Region Limitation...................................................................................................................................243
Syslog Error When the Table is Full....................................................................................................................... 243
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................243
Syslog Warning for Discrepancies Between Congured Extended Prexes.................................................... 243
Unied Forwarding Table (UFT) Modes......................................................................................................................243
Conguring UFT Modes..........................................................................................................................................244
10 Control Plane Policing (CoPP)................................................................................................................. 245
Congure Control Plane Policing................................................................................................................................. 246
Conguring CoPP for Protocols.............................................................................................................................247
Conguring CoPP for CPU Queues...................................................................................................................... 249
Displaying CoPP Conguration .............................................................................................................................250
11 Data Center Bridging (DCB)......................................................................................................................252
Ethernet Enhancements in Data Center Bridging..................................................................................................... 252
Priority-Based Flow Control................................................................................................................................... 253
Enhanced Transmission Selection..........................................................................................................................254
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................255
Data Center Bridging in a Trac Flow.................................................................................................................. 256
Enabling Data Center Bridging.....................................................................................................................................256
DCB Maps and its Attributes..................................................................................................................................257
Data Center Bridging: Default Conguration..............................................................................................................258
Conguring Priority-Based Flow Control....................................................................................................................258
Conguring Lossless Queues................................................................................................................................. 259
Conguring PFC in a DCB Map................................................................................................................................... 260
PFC Conguration Notes....................................................................................................................................... 260
PFC Prerequisites and Restrictions........................................................................................................................261
Applying a DCB Map on a Port.................................................................................................................................... 262
Conguring PFC without a DCB Map.........................................................................................................................262
Conguring Lossless QueuesExample:..................................................................................................................263
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................264
Pause and Resume of Trac..................................................................................................................................264
Buer Sizes for Lossless or PFC Packets............................................................................................................ 264
Behavior of Tagged Packets.........................................................................................................................................265
Conguration Example for DSCP and PFC Priorities................................................................................................265
SNMP Support for PFC and Buer Statistics Tracking............................................................................................266
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................267
PFC and ETS Conguration Examples........................................................................................................................268
8
Contents
Using PFC to Manage Converged Ethernet Trac...................................................................................................268
Operations on Untagged Packets................................................................................................................................268
Generation of PFC for a Priority for Untagged Packets...........................................................................................269
Congure Enhanced Transmission Selection..............................................................................................................269
ETS Prerequisites and Restrictions....................................................................................................................... 269
Creating an ETS Priority Group............................................................................................................................. 269
ETS Operation with DCBx...................................................................................................................................... 270
Conguring Bandwidth Allocation for DCBx CIN................................................................................................. 271
Conguring ETS in a DCB Map..............................................................................................................................272
Hierarchical Scheduling in ETS Output Policies......................................................................................................... 273
Using ETS to Manage Converged Ethernet Trac................................................................................................... 273
Applying DCB Policies in a Switch Stack.....................................................................................................................274
Congure a DCBx Operation........................................................................................................................................ 274
DCBx Operation........................................................................................................................................................274
DCBx Port Roles.......................................................................................................................................................274
DCB Conguration Exchange.................................................................................................................................276
Conguration Source Election................................................................................................................................276
Propagation of DCB Information............................................................................................................................277
Auto-Detection and Manual Conguration of the DCBx Version.......................................................................277
DCBx Example..........................................................................................................................................................277
DCBx Prerequisites and Restrictions.....................................................................................................................278
Conguring DCBx.................................................................................................................................................... 278
Verifying the DCB Conguration..................................................................................................................................282
QoS dot1p Trac Classication and Queue Assignment..........................................................................................290
Conguring the Dynamic Buer Method.................................................................................................................... 291
Sample DCB Conguration...........................................................................................................................................292
PFC and ETS Conguration Command Examples...............................................................................................293
12 Dynamic Host Conguration Protocol (DHCP).........................................................................................294
DHCP Packet Format and Options............................................................................................................................. 294
Assign an IP Address using DHCP...............................................................................................................................296
Implementation Information..........................................................................................................................................297
Congure the System to be a DHCP Server..............................................................................................................297
Conguring the Server for Automatic Address Allocation..................................................................................298
Specifying a Default Gateway................................................................................................................................ 299
Congure a Method of Hostname Resolution..................................................................................................... 300
Using DNS for Address Resolution........................................................................................................................300
Using NetBIOS WINS for Address Resolution..................................................................................................... 300
Creating Manual Binding Entries........................................................................................................................... 300
Debugging the DHCP Server..................................................................................................................................301
Using DHCP Clear Commands............................................................................................................................... 301
Congure the System to be a DHCP Client................................................................................................................301
Conguring the DHCP Client System...................................................................................................................302
DHCP Client on a Management Interface............................................................................................................303
DHCP Client Operation with Other Features.......................................................................................................304
DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................305
Contents
9
Conguring Route Leaking between VRFs on DHCP Relay Agent................................................................... 305
Non-default VRF conguration for DHCPv6 helper address...................................................................................306
Conguring DHCP relay source interface...................................................................................................................306
Global DHCP relay source IPv4 or IPv6 conguration .......................................................................................306
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................307
Congure the System for User Port Stacking (Option 230)................................................................................... 308
Congure Secure DHCP...............................................................................................................................................308
Option 82..................................................................................................................................................................309
DHCPv6 relay agent options..................................................................................................................................309
DHCP Snooping........................................................................................................................................................310
Drop DHCP Packets on Snooped VLANs Only.....................................................................................................314
Dynamic ARP Inspection......................................................................................................................................... 315
Conguring Dynamic ARP Inspection....................................................................................................................315
Source Address Validation............................................................................................................................................. 317
Enabling IP Source Address Validation................................................................................................................... 317
DHCP MAC Source Address Validation................................................................................................................. 318
Enabling IP+MAC Source Address Validation........................................................................................................318
Viewing the Number of SAV Dropped Packets.................................................................................................... 319
Clearing the Number of SAV Dropped Packets....................................................................................................319
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 320
ECMP for Flow-Based Anity.....................................................................................................................................320
Conguring the Hash Algorithm............................................................................................................................ 320
Enabling Deterministic ECMP Next Hop.............................................................................................................. 320
Conguring the Hash Algorithm Seed................................................................................................................... 321
Link Bundle Monitoring.................................................................................................................................................. 321
Managing ECMP Group Paths...............................................................................................................................322
Creating an ECMP Group Bundle.......................................................................................................................... 322
Modifying the ECMP Group Threshold.................................................................................................................322
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................323
Support for ECMP in host table............................................................................................................................ 324
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes ........................................................................ 324
14 FIP Snooping............................................................................................................................................325
Fibre Channel over Ethernet........................................................................................................................................ 325
Ensure Robustness in a Converged Ethernet Network............................................................................................325
FIP Snooping on Ethernet Bridges.............................................................................................................................. 327
FIP Snooping in a Switch Stack...................................................................................................................................329
Using FIP Snooping....................................................................................................................................................... 329
FIP Snooping Prerequisites.....................................................................................................................................329
Important Points to Remember............................................................................................................................. 329
Enabling the FCoE Transit Feature........................................................................................................................330
Enable FIP Snooping on VLANs..............................................................................................................................331
Congure the FC-MAP Value................................................................................................................................. 331
Congure a Port for a Bridge-to-Bridge Link........................................................................................................331
Congure a Port for a Bridge-to-FCF Link............................................................................................................331
10
Contents
Impact on Other Software Features...................................................................................................................... 331
FIP Snooping Restrictions...................................................................................................................................... 332
Conguring FIP Snooping.......................................................................................................................................332
Displaying FIP Snooping Information...........................................................................................................................333
FCoE Transit Conguration Example...........................................................................................................................338
15 Flex Hash and Optimized Boot-Up............................................................................................................340
Flex Hash Capability Overview.................................................................................................................................... 340
Conguring the Flex Hash Mechanism.......................................................................................................................340
Conguring Fast Boot and LACP Fast Switchover....................................................................................................341
Optimizing the Boot Time..............................................................................................................................................341
Booting Process When Optimized Boot Time Mechanism is Enabled...............................................................341
Guidelines for Conguring Optimized Booting Mechanism................................................................................342
Interoperation of Applications with Fast Boot and System States..........................................................................343
LACP and IPv4 Routing.......................................................................................................................................... 343
LACP and IPv6 Routing.......................................................................................................................................... 343
BGP Graceful Restart............................................................................................................................................. 344
Cold Boot Caused by Power Cycling the System................................................................................................344
Unexpected Reload of the System........................................................................................................................344
Software Upgrade................................................................................................................................................... 344
LACP Fast Switchover............................................................................................................................................344
Changes to BGP Multipath.................................................................................................................................... 345
Delayed Installation of ECMP Routes Into BGP...................................................................................................345
RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 345
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 346
16 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 347
Protocol Overview......................................................................................................................................................... 347
Ring Status............................................................................................................................................................... 348
Multiple FRRP Rings................................................................................................................................................348
Important FRRP Points...........................................................................................................................................349
Important FRRP Concepts.....................................................................................................................................350
Implementing FRRP....................................................................................................................................................... 351
FRRP Conguration....................................................................................................................................................... 351
Creating the FRRP Group....................................................................................................................................... 351
Conguring the Control VLAN................................................................................................................................351
Conguring and Adding the Member VLANs.......................................................................................................353
Setting the FRRP Timers........................................................................................................................................354
Clearing the FRRP Counters..................................................................................................................................354
Viewing the FRRP Conguration...........................................................................................................................354
Viewing the FRRP Information.............................................................................................................................. 354
Troubleshooting FRRP.................................................................................................................................................. 355
Conguration Checks..............................................................................................................................................355
Sample Conguration and Topology............................................................................................................................355
FRRP Support on VLT.................................................................................................................................................. 356
Example Scenario.....................................................................................................................................................357
Contents
11
Important Points to Remember............................................................................................................................. 358
17 GARP VLAN Registration Protocol (GVRP)..............................................................................................359
Important Points to Remember................................................................................................................................... 359
Congure GVRP............................................................................................................................................................ 360
Related Conguration Tasks...................................................................................................................................360
Enabling GVRP Globally.................................................................................................................................................361
Enabling GVRP on a Layer 2 Interface.........................................................................................................................361
Congure GVRP Registration....................................................................................................................................... 361
Congure a GARP Timer.............................................................................................................................................. 362
18 Internet Group Management Protocol (IGMP)......................................................................................... 363
IGMP Implementation Information.............................................................................................................................. 363
IGMP Protocol Overview..............................................................................................................................................363
IGMP Version 2........................................................................................................................................................ 363
IGMP Version 3........................................................................................................................................................365
Congure IGMP............................................................................................................................................................. 368
Related Conguration Tasks...................................................................................................................................368
Viewing IGMP Enabled Interfaces...............................................................................................................................369
Selecting an IGMP Version...........................................................................................................................................369
Viewing IGMP Groups................................................................................................................................................... 370
Adjusting Timers.............................................................................................................................................................370
Adjusting Query and Response Timers................................................................................................................. 370
Enabling IGMP Immediate-Leave..................................................................................................................................371
IGMP Snooping.............................................................................................................................................................. 372
IGMP Snooping Implementation Information....................................................................................................... 372
Conguring IGMP Snooping...................................................................................................................................372
Removing a Group-Port Association..................................................................................................................... 373
Disabling Multicast Flooding................................................................................................................................... 373
Specifying a Port as Connected to a Multicast Router.......................................................................................373
Conguring the Switch as Querier.........................................................................................................................374
Fast Convergence after MSTP Topology Changes................................................................................................... 374
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................ 374
Protocol Separation................................................................................................................................................. 375
Enabling and Disabling Management Egress Interface Selection...................................................................... 376
Handling of Management Route Conguration....................................................................................................377
Handling of Switch-Initiated Trac........................................................................................................................377
Handling of Switch-Destined Trac......................................................................................................................378
Handling of Transit Trac (Trac Separation).....................................................................................................379
Mapping of Management Applications and Trac Type.....................................................................................379
Behavior of Various Applications for Switch-Initiated Trac ............................................................................380
Behavior of Various Applications for Switch-Destined Trac ........................................................................... 381
Interworking of EIS With Various Applications......................................................................................................381
Designating a Multicast Router Interface................................................................................................................... 382
19 Interfaces................................................................................................................................................. 383
12
Contents
Basic Interface Conguration.......................................................................................................................................383
Advanced Interface Conguration...............................................................................................................................383
Interface Types...............................................................................................................................................................384
View Basic Interface Information.................................................................................................................................384
Resetting an Interface to its Factory Default State...................................................................................................386
Enabling a Physical Interface........................................................................................................................................387
Physical Interfaces.........................................................................................................................................................387
Conguration Task List for Physical Interfaces.................................................................................................... 387
40G to 1G Breakout Cable Adaptor....................................................................................................................... 387
Overview of Layer Modes...................................................................................................................................... 388
Conguring Layer 2 (Data Link) Mode..................................................................................................................389
Conguring Layer 2 (Interface) Mode.................................................................................................................. 389
Conguring Layer 3 (Network) Mode...................................................................................................................389
Conguring Layer 3 (Interface) Mode.................................................................................................................. 390
Automatic recovery of an Err-disabled interface........................................................................................................391
Conguring an automatic recovery for an Err-disabled interface...................................................................... 391
Egress Interface Selection (EIS)..................................................................................................................................392
Important Points to Remember............................................................................................................................. 392
Conguring EIS........................................................................................................................................................ 392
Management Interfaces................................................................................................................................................393
Conguring Management Interfaces.....................................................................................................................393
Conguring a Management Interface on an Ethernet Port................................................................................394
VLAN Interfaces............................................................................................................................................................ 395
Loopback Interfaces......................................................................................................................................................396
Null Interfaces................................................................................................................................................................ 396
Port Channel Interfaces................................................................................................................................................396
Port Channel Denition and Standards.................................................................................................................397
Port Channel Benets............................................................................................................................................. 397
Port Channel Implementation.................................................................................................................................397
Interfaces in Port Channels.................................................................................................................................... 398
Conguration Tasks for Port Channel Interfaces.................................................................................................398
Creating a Port Channel......................................................................................................................................... 398
Adding a Physical Interface to a Port Channel.....................................................................................................399
Reassigning an Interface to a New Port Channel................................................................................................400
Conguring the Minimum Oper Up Links in a Port Channel...............................................................................401
Adding or Removing a Port Channel from a VLAN..............................................................................................401
Assigning an IP Address to a Port Channel.......................................................................................................... 402
Deleting or Disabling a Port Channel.....................................................................................................................403
Load Balancing Through Port Channels................................................................................................................403
Changing the Hash Algorithm................................................................................................................................403
Bulk Conguration......................................................................................................................................................... 404
Interface Range....................................................................................................................................................... 404
Bulk Conguration Examples................................................................................................................................. 405
Dening Interface Range Macros................................................................................................................................ 406
Dene the Interface Range.....................................................................................................................................407
Contents
13
Choosing an Interface-Range Macro.................................................................................................................... 407
Monitoring and Maintaining Interfaces........................................................................................................................407
Maintenance Using TDR.........................................................................................................................................408
Non Dell-Qualied Transceivers................................................................................................................................... 409
Splitting 40G Ports without Reload.............................................................................................................................409
Splitting QSFP Ports to SFP+ Ports.............................................................................................................................411
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port................................................................................... 411
Important Points to Remember.............................................................................................................................. 412
Example Scenarios................................................................................................................................................... 412
Link Dampening.............................................................................................................................................................. 413
Important Points to Remember.............................................................................................................................. 414
Conguration Example of Link Dampening........................................................................................................... 414
Enabling Link Dampening.........................................................................................................................................416
Link Bundle Monitoring.................................................................................................................................................. 417
Using Ethernet Pause Frames for Flow Control......................................................................................................... 418
Enabling Pause Frames............................................................................................................................................418
Congure the MTU Size on an Interface.....................................................................................................................419
Port-Pipes.......................................................................................................................................................................420
Auto-Negotiation on Ethernet Interfaces...................................................................................................................420
Setting the Speed of Ethernet Interfaces............................................................................................................ 420
Set Auto-Negotiation Options................................................................................................................................ 421
View Advanced Interface Information.........................................................................................................................422
Conguring the Interface Sampling Size...............................................................................................................423
Conguring the Trac Sampling Size Globally...........................................................................................................424
Dynamic Counters......................................................................................................................................................... 425
Clearing Interface Counters....................................................................................................................................426
Compressing Conguration Files................................................................................................................................. 426
Discard Counters........................................................................................................................................................... 429
Display discard counters......................................................................................................................................... 429
20 IPv4 Routing............................................................................................................................................432
IP Addresses...................................................................................................................................................................433
Implementation Information....................................................................................................................................433
Conguration Tasks for IP Addresses..........................................................................................................................433
Assigning IP Addresses to an Interface.......................................................................................................................433
Conguring Static Routes.............................................................................................................................................434
Congure Static Routes for the Management Interface..........................................................................................435
IPv4 Path MTU Discovery Overview.......................................................................................................................... 436
Packet handling during MTU mismatch................................................................................................................436
Using the Congured Source IP Address in ICMP Messages..................................................................................436
Conguring the ICMP Source Interface............................................................................................................... 436
Conguring the Duration to Establish a TCP Connection.........................................................................................437
Enabling Directed Broadcast.........................................................................................................................................437
Resolution of Host Names............................................................................................................................................437
Enabling Dynamic Resolution of Host Names............................................................................................................438
Specifying the Local System Domain and a List of Domains................................................................................... 438
14
Contents
Conguring DNS with Traceroute................................................................................................................................439
ARP................................................................................................................................................................................. 439
Conguration Tasks for ARP........................................................................................................................................ 440
Conguring Static ARP Entries....................................................................................................................................440
Enabling Proxy ARP.......................................................................................................................................................440
Clearing ARP Cache.......................................................................................................................................................441
ARP Learning via Gratuitous ARP................................................................................................................................ 441
Enabling ARP Learning via Gratuitous ARP.................................................................................................................441
ARP Learning via ARP Request....................................................................................................................................441
Conguring ARP Retries...............................................................................................................................................442
ICMP............................................................................................................................................................................... 443
Conguration Tasks for ICMP...................................................................................................................................... 443
Enabling ICMP Unreachable Messages...................................................................................................................... 443
ICMP Redirects..............................................................................................................................................................443
UDP Helper.....................................................................................................................................................................444
Congure UDP Helper.............................................................................................................................................444
Important Points to Remember............................................................................................................................. 445
Enabling UDP Helper.....................................................................................................................................................445
Congurations Using UDP Helper............................................................................................................................... 445
UDP Helper with Broadcast-All Addresses.................................................................................................................445
UDP Helper with Subnet Broadcast Addresses.........................................................................................................446
UDP Helper with Congured Broadcast Addresses..................................................................................................446
UDP Helper with No Congured Broadcast Addresses............................................................................................447
Troubleshooting UDP Helper........................................................................................................................................ 447
21 IPv6 Routing............................................................................................................................................ 448
Protocol Overview.........................................................................................................................................................448
Extended Address Space........................................................................................................................................449
Stateless Autoconguration................................................................................................................................... 449
IPv6 Headers............................................................................................................................................................449
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support................................................................... 450
IPv6 Header Fields................................................................................................................................................... 451
Extension Header Fields..........................................................................................................................................453
Addressing................................................................................................................................................................ 454
Implementing IPv6 with Dell EMC Networking OS...................................................................................................455
ICMPv6...........................................................................................................................................................................456
Path MTU discovery......................................................................................................................................................457
IPv6 Neighbor Discovery.............................................................................................................................................. 457
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................458
Conguring the IPv6 Recursive DNS Server....................................................................................................... 458
Debugging IPv6 RDNSS Information Sent to the Host .....................................................................................459
Displaying IPv6 RDNSS Information......................................................................................................................459
Secure Shell (SSH) Over an IPv6 Transport..............................................................................................................460
Conguration Tasks for IPv6........................................................................................................................................460
Adjusting Your CAM-Prole....................................................................................................................................460
Assigning an IPv6 Address to an Interface............................................................................................................461
Contents
15
Assigning a Static IPv6 Route................................................................................................................................462
Conguring Telnet with IPv6..................................................................................................................................462
SNMP over IPv6......................................................................................................................................................463
Displaying IPv6 Information....................................................................................................................................463
Displaying an IPv6 Interface Information.............................................................................................................. 463
Showing IPv6 Routes..............................................................................................................................................464
Showing the Running-Conguration for an Interface.........................................................................................465
Clearing IPv6 Routes...............................................................................................................................................466
Disabling ND Entry Timeout................................................................................................................................... 466
Conguring IPv6 RA Guard.......................................................................................................................................... 466
Conguring IPv6 RA Guard on an Interface.........................................................................................................468
Monitoring IPv6 RA Guard..................................................................................................................................... 469
22 iSCSI Optimization...................................................................................................................................470
iSCSI Optimization Overview....................................................................................................................................... 470
Monitoring iSCSI Trac Flows............................................................................................................................... 472
Application of Quality of Service to iSCSI Trac Flows......................................................................................472
Information Monitored in iSCSI Trac Flows....................................................................................................... 472
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 473
Conguring Detection and Ports for Dell Compellent Arrays............................................................................. 473
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer................................................................. 474
Enable and Disable iSCSI Optimization..................................................................................................................474
Default iSCSI Optimization Values............................................................................................................................... 475
iSCSI Optimization Prerequisites................................................................................................................................. 475
Conguring iSCSI Optimization....................................................................................................................................475
Displaying iSCSI Optimization Information..................................................................................................................477
23 Intermediate System to Intermediate System...........................................................................................479
IS-IS Protocol Overview................................................................................................................................................479
IS-IS Addressing.............................................................................................................................................................479
Multi-Topology IS-IS...................................................................................................................................................... 480
Transition Mode....................................................................................................................................................... 480
Interface Support..................................................................................................................................................... 481
Adjacencies................................................................................................................................................................481
Graceful Restart............................................................................................................................................................. 481
Timers........................................................................................................................................................................ 481
Implementation Information.......................................................................................................................................... 481
Conguration Information.............................................................................................................................................482
Conguration Tasks for IS-IS..................................................................................................................................483
Conguring the Distance of a Route.....................................................................................................................490
Changing the IS-Type...............................................................................................................................................491
Redistributing IPv4 Routes.....................................................................................................................................493
Redistributing IPv6 Routes.....................................................................................................................................494
Conguring Authentication Passwords.................................................................................................................495
Setting the Overload Bit.........................................................................................................................................495
Debugging IS-IS....................................................................................................................................................... 496
16
Contents
IS-IS Metric Styles.........................................................................................................................................................497
Congure Metric Values................................................................................................................................................497
Maximum Values in the Routing Table...................................................................................................................497
Change the IS-IS Metric Style in One Level Only................................................................................................ 497
Leaks from One Level to Another..........................................................................................................................499
Sample Congurations..................................................................................................................................................500
24 Link Aggregation Control Protocol (LACP).............................................................................................. 502
Introduction to Dynamic LAGs and LACP.................................................................................................................. 502
Important Points to Remember............................................................................................................................. 502
LACP Modes............................................................................................................................................................ 503
Conguring LACP Commands...............................................................................................................................503
LACP Conguration Tasks............................................................................................................................................504
Creating a LAG.........................................................................................................................................................504
Conguring the LAG Interfaces as Dynamic........................................................................................................504
Setting the LACP Long Timeout........................................................................................................................... 505
Monitoring and Debugging LACP..........................................................................................................................505
Shared LAG State Tracking.......................................................................................................................................... 506
Conguring Shared LAG State Tracking...............................................................................................................506
Important Points about Shared LAG State Tracking...........................................................................................508
LACP Basic Conguration Example............................................................................................................................ 508
Congure a LAG on ALPHA................................................................................................................................... 508
25 Layer 2..................................................................................................................................................... 517
Manage the MAC Address Table.................................................................................................................................. 517
Clearing the MAC Address Table............................................................................................................................ 517
Setting the Aging Time for Dynamic Entries.........................................................................................................517
Conguring a Static MAC Address.........................................................................................................................518
Displaying the MAC Address Table.........................................................................................................................518
MAC Learning Limit........................................................................................................................................................518
Setting the MAC Learning Limit............................................................................................................................. 519
mac learning-limit Dynamic..................................................................................................................................... 519
mac learning-limit mac-address-sticky.................................................................................................................. 519
mac learning-limit station-move............................................................................................................................ 520
mac learning-limit no-station-move...................................................................................................................... 520
Learning Limit Violation Actions.............................................................................................................................520
Setting Station Move Violation Actions.................................................................................................................521
Recovering from Learning Limit and Station Move Violations............................................................................521
Enabling port security............................................................................................................................................. 522
NIC Teaming................................................................................................................................................................... 522
Congure Redundant Pairs...........................................................................................................................................523
Important Points about Conguring Redundant Pairs........................................................................................ 525
Far-End Failure Detection.............................................................................................................................................526
FEFD State Changes...............................................................................................................................................527
Conguring FEFD.................................................................................................................................................... 528
Enabling FEFD on an Interface...............................................................................................................................528
Contents
17
Debugging FEFD......................................................................................................................................................529
26 Link Layer Discovery Protocol (LLDP)......................................................................................................531
802.1AB (LLDP) Overview............................................................................................................................................ 531
Protocol Data Units..................................................................................................................................................531
Optional TLVs.................................................................................................................................................................532
Management TLVs.................................................................................................................................................. 532
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 534
TIA Organizationally Specic TLVs........................................................................................................................ 534
Congure LLDP............................................................................................................................................................. 538
Related Conguration Tasks...................................................................................................................................538
Important Points to Remember............................................................................................................................. 538
LLDP Compatibility..................................................................................................................................................539
CONFIGURATION versus INTERFACE Congurations............................................................................................ 539
Enabling LLDP................................................................................................................................................................539
Disabling and Undoing LLDP..................................................................................................................................540
Enabling LLDP on Management Ports........................................................................................................................540
Disabling and Undoing LLDP on Management Ports..........................................................................................540
Advertising TLVs............................................................................................................................................................540
Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................542
Reserved Unrecognized LLDP TLVs..................................................................................................................... 542
Organizational Specic Unrecognized LLDP TLVs..............................................................................................542
Viewing Unrecognized LLDP TLVs........................................................................................................................ 542
Viewing the LLDP Conguration................................................................................................................................. 543
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................543
Examples of Viewing Information Advertised by Neighbors...............................................................................543
Conguring LLDPDU Intervals.....................................................................................................................................545
Conguring LLDP Notication Interval....................................................................................................................... 546
Conguring LLDP Notication Interval....................................................................................................................... 546
Conguring Transmit and Receive Mode....................................................................................................................546
Conguring the Time to Live Value............................................................................................................................. 547
Debugging LLDP............................................................................................................................................................548
Relevant Management Objects................................................................................................................................... 549
27 Microsoft Network Load Balancing.......................................................................................................... 554
NLB Unicast Mode Scenario........................................................................................................................................554
NLB Multicast Mode Scenario.....................................................................................................................................554
Limitations of the NLB Feature....................................................................................................................................555
Microsoft Clustering......................................................................................................................................................555
Enable and Disable VLAN Flooding ............................................................................................................................ 555
Conguring a Switch for NLB .....................................................................................................................................555
Enabling a Switch for Multicast NLB.................................................................................................................... 556
28 Multicast Source Discovery Protocol (MSDP)......................................................................................... 557
Protocol Overview.........................................................................................................................................................557
Anycast RP.....................................................................................................................................................................558
18
Contents
Implementation Information......................................................................................................................................... 559
Congure Multicast Source Discovery Protocol........................................................................................................559
Related Conguration Tasks...................................................................................................................................559
Enable MSDP................................................................................................................................................................. 563
Manage the Source-Active Cache.............................................................................................................................. 564
Viewing the Source-Active Cache.........................................................................................................................564
Limiting the Source-Active Cache.........................................................................................................................564
Clearing the Source-Active Cache........................................................................................................................565
Enabling the Rejected Source-Active Cache.......................................................................................................565
Accept Source-Active Messages that Fail the RFP Check..................................................................................... 565
Specifying Source-Active Messages...........................................................................................................................568
Limiting the Source-Active Messages from a Peer...................................................................................................569
Preventing MSDP from Caching a Local Source.......................................................................................................569
Preventing MSDP from Caching a Remote Source.................................................................................................. 570
Preventing MSDP from Advertising a Local Source..................................................................................................570
Logging Changes in Peership States............................................................................................................................571
Terminating a Peership...................................................................................................................................................571
Clearing Peer Statistics.................................................................................................................................................572
Debugging MSDP.......................................................................................................................................................... 572
MSDP with Anycast RP................................................................................................................................................573
Conguring Anycast RP................................................................................................................................................ 574
Reducing Source-Active Message Flooding.........................................................................................................575
Specifying the RP Address Used in SA Messages.............................................................................................. 575
MSDP Sample Congurations......................................................................................................................................577
32 Multicast Listener Discovery Protocol..................................................................................................... 580
MLD Version 1................................................................................................................................................................ 580
MLD Querier Router......................................................................................................................................................580
Joining a Multicast Group..............................................................................................................................................581
Leaving a Multicast Group.............................................................................................................................................581
MLD version 2.................................................................................................................................................................581
MLD timers.....................................................................................................................................................................583
Reducing Host Response Burstiness.................................................................................................................... 584
Conguring MLD Version..............................................................................................................................................584
Clearing MLD groups.....................................................................................................................................................584
Debugging MLD.............................................................................................................................................................584
Explicit Tracking............................................................................................................................................................. 584
Reducing Leave Latency...............................................................................................................................................585
Displaying MLD groups table........................................................................................................................................585
Displaying MLD Interfaces............................................................................................................................................585
30 Multiple Spanning Tree Protocol (MSTP)................................................................................................ 586
Protocol Overview.........................................................................................................................................................586
Spanning Tree Variations...............................................................................................................................................587
Implementation Information....................................................................................................................................587
Congure Multiple Spanning Tree Protocol................................................................................................................ 587
Contents
19
Related Conguration Tasks...................................................................................................................................588
Enable Multiple Spanning Tree Globally...................................................................................................................... 588
Adding and Removing Interfaces.................................................................................................................................588
Creating Multiple Spanning Tree Instances................................................................................................................ 589
Inuencing MSTP Root Selection................................................................................................................................590
Interoperate with Non-Dell Bridges..............................................................................................................................591
Changing the Region Name or Revision......................................................................................................................591
Modifying Global Parameters........................................................................................................................................591
Modifying the Interface Parameters............................................................................................................................593
Setting STP path cost as constant............................................................................................................................. 594
Conguring an EdgePort.............................................................................................................................................. 594
Flush MAC Addresses after a Topology Change....................................................................................................... 595
MSTP Sample Congurations......................................................................................................................................595
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................595
Debugging and Verifying MSTP Congurations........................................................................................................ 599
31 Multicast Features....................................................................................................................................602
Enabling IP Multicast.....................................................................................................................................................602
Implementation Information..........................................................................................................................................602
Multicast Policies...........................................................................................................................................................603
IPv4 Multicast Policies............................................................................................................................................603
Understanding Multicast Traceroute (mtrace)........................................................................................................... 610
Important Points to Remember...............................................................................................................................611
Printing Multicast Traceroute (mtrace) Paths.............................................................................................................611
Supported Error Codes..................................................................................................................................................612
mtrace Scenarios............................................................................................................................................................613
32 Multicast Listener Discovery Protocol...................................................................................................... 619
MLD Version 1................................................................................................................................................................. 619
MLD Querier Router.......................................................................................................................................................619
Joining a Multicast Group.............................................................................................................................................620
Leaving a Multicast Group............................................................................................................................................620
MLD version 2................................................................................................................................................................620
MLD timers.....................................................................................................................................................................622
Reducing Host Response Burstiness.................................................................................................................... 623
Clearing MLD groups.....................................................................................................................................................623
Debugging MLD............................................................................................................................................................. 623
Explicit Tracking............................................................................................................................................................. 623
Reducing Leave Latency...............................................................................................................................................623
Displaying MLD groups table........................................................................................................................................ 624
Displaying MLD Interfaces............................................................................................................................................ 624
MLD Snooping............................................................................................................................................................... 624
Enable MLD Snooping.............................................................................................................................................624
Disable MLD Snooping............................................................................................................................................625
Congure the switch as a querier..........................................................................................................................625
20
Contents
/