Force10 Z9000

Dell Force10 Z9000 Administrator Guide

  • Hello! I am an AI chatbot trained to assist you with the Dell Force10 Z9000 Administrator Guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the Z9000
System
9.5(0.0)
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. Dell
â„¢
and the Dell logo are trademarks of Dell Inc. in the United States and/or other
jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2014 - 06
Rev. A00
Contents
1 About this Guide......................................................................................................31
Audience.............................................................................................................................................. 31
Conventions.........................................................................................................................................31
Related Documents.............................................................................................................................31
2 Configuration Fundamentals...............................................................................32
Accessing the Command Line............................................................................................................32
CLI Modes............................................................................................................................................32
Navigating CLI Modes................................................................................................................... 34
The do Command............................................................................................................................... 37
Undoing Commands...........................................................................................................................38
Obtaining Help.................................................................................................................................... 39
Entering and Editing Commands....................................................................................................... 39
Command History.............................................................................................................................. 40
Filtering show Command Outputs.....................................................................................................40
Multiple Users in Configuration Mode............................................................................................... 42
3 Data Center Bridging (DCB).................................................................................43
SNMP Support for PFC and Buffer Statistics Tracking.......................................................................43
4 Getting Started....................................................................................................... 44
Console Access...................................................................................................................................44
Serial Console................................................................................................................................44
Accessing the CLI Interface and Running Scripts Using SSH............................................................45
Z9000 ........................................................................................................................................... 45
Entering CLI commands Using an SSH Connection................................................................... 46
Executing Local CLI Scripts Using an SSH Connection...............................................................46
Default Configuration......................................................................................................................... 47
Configuring a Host Name...................................................................................................................47
Accessing the System Remotely.........................................................................................................47
Accessing the Z-Series and Remotely..........................................................................................47
Configure the Management Port IP Address............................................................................... 48
Configure a Management Route..................................................................................................48
Configuring a Username and Password.......................................................................................48
Configuring the Enable Password......................................................................................................49
Configuration File Management.........................................................................................................49
Copy Files to and from the System.............................................................................................. 49
Save the Running-Configuration..................................................................................................50
Configure the Overload Bit for a Startup Scenario...................................................................... 51
Viewing Files...................................................................................................................................51
Managing the File System................................................................................................................... 52
Enabling Software Features on Devices Using a Command Option................................................ 53
View Command History......................................................................................................................54
Upgrading Dell Networking OS.......................................................................................................... 55
Using HTTP for File Transfers............................................................................................................. 55
Using Hashes to Validate Software Images........................................................................................55
5 Management............................................................................................................ 57
Configuring Privilege Levels................................................................................................................57
Creating a Custom Privilege Level................................................................................................57
Removing a Command from EXEC Mode....................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 57
Allowing Access to CONFIGURATION Mode Commands.......................................................... 58
Allowing Access to the Following Modes.................................................................................... 58
Applying a Privilege Level to a Username.................................................................................... 60
Applying a Privilege Level to a Terminal Line...............................................................................60
Configuring Logging...........................................................................................................................60
Audit and Security Logs.................................................................................................................61
Configuring Logging Format ...................................................................................................... 62
Setting Up a Secure Connection to a Syslog Server....................................................................63
Log Messages in the Internal Buffer...................................................................................................64
Configuration Task List for System Log Management................................................................ 64
Disabling System Logging.................................................................................................................. 64
Sending System Messages to a Syslog Server....................................................................................65
Configuring a UNIX System as a Syslog Server............................................................................65
Changing System Logging Settings....................................................................................................65
Display the Logging Buffer and the Logging Configuration............................................................. 66
Configuring a UNIX Logging Facility Level.........................................................................................67
Synchronizing Log Messages............................................................................................................. 68
Enabling Timestamp on Syslog Messages......................................................................................... 68
File Transfer Services.......................................................................................................................... 69
Configuration Task List for File Transfer Services........................................................................69
Enabling the FTP Server................................................................................................................ 69
Configuring FTP Server Parameters............................................................................................. 70
Configuring FTP Client Parameters..............................................................................................70
Terminal Lines......................................................................................................................................71
Denying and Permitting Access to a Terminal Line......................................................................71
Configuring Login Authentication for Terminal Lines..................................................................72
Setting Time Out of EXEC Privilege Mode..........................................................................................73
Using Telnet to get to Another Network Device................................................................................73
Lock CONFIGURATION Mode............................................................................................................74
Viewing the Configuration Lock Status........................................................................................ 74
Recovering from a Forgotten Password on the Z9000 System........................................................75
Recovering from a Forgotten Enable Password on the Z9000.................................................. 76
Recovering from a Failed Start on the Z9000 System.......................................................................77
Restoring the Factory Default Settings...............................................................................................78
Z9000MXL Switch......................................................................................................................... 78
Important Points to Remember....................................................................................................78
6 802.1X........................................................................................................................79
The Port-Authentication Process.......................................................................................................80
EAP over RADIUS...........................................................................................................................82
Configuring 802.1X............................................................................................................................. 82
Related Configuration Tasks.........................................................................................................82
Important Points to Remember..........................................................................................................83
Enabling 802.1X...................................................................................................................................84
Configuring Request Identity Re-Transmissions............................................................................... 85
Configuring a Quiet Period after a Failed Authentication........................................................... 86
Forcibly Authorizing or Unauthorizing a Port.................................................................................... 87
Re-Authenticating a Port....................................................................................................................88
Configuring Timeouts.........................................................................................................................89
Configuring Dynamic VLAN Assignment with Port Authentication..................................................90
Guest and Authentication-Fail VLANs................................................................................................ 91
Configuring a Guest VLAN............................................................................................................92
Configuring an Authentication-Fail VLAN....................................................................................92
7 Access Control Lists (ACLs)..................................................................................94
IP Access Control Lists (ACLs)............................................................................................................ 95
CAM Usage.................................................................................................................................... 95
Implementing ACLs on Dell Networking OS................................................................................97
IP Fragment Handling......................................................................................................................... 98
IP Fragments ACL Examples......................................................................................................... 98
Layer 4 ACL Rules Examples.........................................................................................................99
Configure a Standard IP ACL............................................................................................................100
Configuring a Standard IP ACL Filter.......................................................................................... 101
Configure an Extended IP ACL......................................................................................................... 102
Configuring Filters with a Sequence Number............................................................................102
Configuring Filters Without a Sequence Number......................................................................103
Configure Layer 2 and Layer 3 ACLs................................................................................................104
Assign an IP ACL to an Interface...................................................................................................... 105
Applying an IP ACL............................................................................................................................105
Counting ACL Hits.......................................................................................................................106
Configure Ingress ACLs.................................................................................................................... 106
Configure Egress ACLs......................................................................................................................107
Applying Egress Layer 3 ACLs (Control-Plane).......................................................................... 108
IP Prefix Lists..................................................................................................................................... 108
Implementation Information...................................................................................................... 109
Configuration Task List for Prefix Lists....................................................................................... 109
ACL Resequencing.............................................................................................................................113
Resequencing an ACL or Prefix List............................................................................................ 114
Route Maps........................................................................................................................................ 115
Implementation Information.......................................................................................................115
Important Points to Remember........................................................................................................ 116
Configuration Task List for Route Maps......................................................................................116
Configuring Match Routes.......................................................................................................... 118
Configuring Set Conditions........................................................................................................ 120
Configure a Route Map for Route Redistribution.......................................................................121
Configure a Route Map for Route Tagging................................................................................ 122
Continue Clause..........................................................................................................................122
Logging of ACL Processes................................................................................................................ 122
Guidelines for Configuring ACL Logging......................................................................................... 123
Configuring ACL Logging................................................................................................................. 124
Flow-Based Monitoring Support for ACLs....................................................................................... 125
Behavior of Flow-Based Monitoring...........................................................................................125
Enabling Flow-Based Monitoring..................................................................................................... 127
8 Access Control List (ACL) VLAN Groups and Content Addressable
Memory (CAM).......................................................................................................... 129
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................... 129
Guidelines for Configuring ACL VLAN groups.................................................................................130
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters.........................131
Configuring ACL VLAN Groups................................................................................................... 131
Configuring FP Blocks for VLAN Parameters............................................................................. 132
Viewing CAM Usage.......................................................................................................................... 133
Allocating FP Blocks for VLAN Processes.........................................................................................134
9 Bidirectional Forwarding Detection (BFD).....................................................136
How BFD Works................................................................................................................................ 136
BFD Packet Format......................................................................................................................137
BFD Sessions................................................................................................................................139
BFD Three-Way Handshake........................................................................................................139
Session State Changes................................................................................................................140
Important Points to Remember........................................................................................................ 141
Configure BFD................................................................................................................................... 141
Configure BFD for Physical Ports............................................................................................... 142
Configure BFD for Static Routes.................................................................................................145
Configure BFD for OSPF..............................................................................................................147
Configure BFD for OSPFv3......................................................................................................... 150
Configure BFD for IS-IS............................................................................................................... 151
Configure BFD for BGP............................................................................................................... 154
Configure BFD for VRRP..............................................................................................................161
Configuring Protocol Liveness................................................................................................... 164
Troubleshooting BFD..................................................................................................................164
10 Border Gateway Protocol IPv4 (BGPv4).......................................................166
Autonomous Systems (AS)................................................................................................................166
Sessions and Peers............................................................................................................................168
Establish a Session.......................................................................................................................169
Route Reflectors................................................................................................................................169
BGP Attributes................................................................................................................................... 170
Best Path Selection Criteria......................................................................................................... 171
Weight.......................................................................................................................................... 173
Local Preference..........................................................................................................................173
Multi-Exit Discriminators (MEDs)................................................................................................ 174
Origin............................................................................................................................................175
AS Path......................................................................................................................................... 176
Next Hop......................................................................................................................................176
Multiprotocol BGP............................................................................................................................. 177
Implement BGP with Dell Networking OS........................................................................................177
Additional Path (Add-Path) Support............................................................................................177
Advertise IGP Cost as MED for Redistributed Routes.................................................................177
Ignore Router-ID for Some Best-Path Calculations..................................................................178
Four-Byte AS Numbers................................................................................................................178
AS4 Number Representation.......................................................................................................179
AS Number Migration..................................................................................................................180
BGP4 Management Information Base (MIB).............................................................................. 182
Important Points to Remember..................................................................................................182
Configuration Information................................................................................................................183
BGP Configuration............................................................................................................................ 183
Enabling BGP...............................................................................................................................184
Configuring AS4 Number Representations................................................................................188
Configuring Peer Groups............................................................................................................190
Configuring BGP Fast Fall-Over..................................................................................................193
Configuring Passive Peering....................................................................................................... 194
Maintaining Existing AS Numbers During an AS Migration........................................................195
Allowing an AS Number to Appear in its Own AS Path..............................................................196
Enabling Graceful Restart............................................................................................................197
Enabling Neighbor Graceful Restart...........................................................................................198
Filtering on an AS-Path Attribute................................................................................................199
Regular Expressions as Filters.................................................................................................... 200
Redistributing Routes..................................................................................................................202
Enabling Additional Paths...........................................................................................................202
Configuring IP Community Lists................................................................................................ 203
Configuring an IP Extended Community List............................................................................ 205
Filtering Routes with Community Lists......................................................................................206
Manipulating the COMMUNITY Attribute.................................................................................. 206
Changing MED Attributes...........................................................................................................208
Changing the LOCAL_PREFERENCE Attribute..........................................................................208
Changing the NEXT_HOP Attribute...........................................................................................209
Changing the WEIGHT Attribute.................................................................................................210
Enabling Multipath...................................................................................................................... 210
Filtering BGP Routes................................................................................................................... 210
Filtering BGP Routes Using Route Maps.....................................................................................212
Filtering BGP Routes Using AS-PATH Information.................................................................... 213
Configuring BGP Route Reflectors.............................................................................................213
Aggregating Routes.....................................................................................................................214
Configuring BGP Confederations...............................................................................................215
Enabling Route Flap Dampening................................................................................................ 215
Changing BGP Timers.................................................................................................................218
Enabling BGP Neighbor Soft-Reconfiguration.......................................................................... 218
Route Map Continue...................................................................................................................220
Enabling MBGP Configurations........................................................................................................220
BGP Regular Expression Optimization............................................................................................. 221
Debugging BGP.................................................................................................................................221
Storing Last and Bad PDUs......................................................................................................... 222
Capturing PDUs...........................................................................................................................223
PDU Counters............................................................................................................................. 224
Sample Configurations..................................................................................................................... 225
11 Content Addressable Memory (CAM).............................................................231
CAM Allocation..................................................................................................................................231
Test CAM Usage................................................................................................................................233
View CAM Profiles.............................................................................................................................234
View CAM-ACL Settings................................................................................................................... 234
View CAM Usage...............................................................................................................................236
CAM Optimization.............................................................................................................................237
Troubleshoot CAM Profiling............................................................................................................. 237
CAM Profile Mismatches.............................................................................................................237
QoS CAM Region Limitation.......................................................................................................237
12 Control Plane Policing (CoPP)........................................................................ 239
Configure Control Plane Policing....................................................................................................240
Configuring CoPP for Protocols.................................................................................................241
Configuring CoPP for CPU Queues...........................................................................................243
CoPP for OSPFv3 Packets.......................................................................................................... 244
Configuring CoPP for OSPFv3....................................................................................................247
Show Commands....................................................................................................................... 248
13 Dynamic Host Configuration Protocol (DHCP)..........................................250
DHCP Packet Format and Options.................................................................................................. 250
Assign an IP Address using DHCP.................................................................................................... 252
Implementation Information............................................................................................................253
Configure the System to be a DHCP Server....................................................................................254
Configuring the Server for Automatic Address Allocation........................................................ 254
Specifying a Default Gateway.....................................................................................................256
Configure a Method of Hostname Resolution.......................................................................... 256
Using DNS for Address Resolution.............................................................................................256
Using NetBIOS WINS for Address Resolution............................................................................ 256
Creating Manual Binding Entries................................................................................................ 257
Debugging the DHCP Server...................................................................................................... 257
Using DHCP Clear Commands...................................................................................................257
Configure the System to be a Relay Agent......................................................................................258
Configure the System to be a DHCP Client.................................................................................... 260
DHCP Client on a Management Interface.................................................................................260
DHCP Client Operation with Other Features.............................................................................261
Configure the System for User Port Stacking (Option 230)............................................................262
Configure Secure DHCP...................................................................................................................262
Option 82.................................................................................................................................... 262
DHCP Snooping..........................................................................................................................263
Drop DHCP Packets on Snooped VLANs Only..........................................................................265
Dynamic ARP Inspection............................................................................................................ 265
Configuring Dynamic ARP Inspection........................................................................................267
Source Address Validation................................................................................................................268
Enabling IP Source Address Validation...................................................................................... 268
DHCP MAC Source Address Validation......................................................................................268
Enabling IP+MAC Source Address Validation............................................................................269
14 Equal Cost Multi-Path (ECMP)........................................................................ 270
ECMP for Flow-Based Affinity.......................................................................................................... 270
Configuring the Hash Algorithm................................................................................................ 270
Enabling Deterministic ECMP Next Hop....................................................................................270
Configuring the Hash Algorithm Seed........................................................................................271
Link Bundle Monitoring..................................................................................................................... 271
Managing ECMP Group Paths.................................................................................................... 272
Creating an ECMP Group Bundle...............................................................................................273
Modifying the ECMP Group Threshold...................................................................................... 273
15 Enabling FIPS Cryptography............................................................................275
Configuration Tasks.......................................................................................................................... 275
Preparing the System........................................................................................................................275
Enabling FIPS Mode.......................................................................................................................... 276
Generating Host-Keys...................................................................................................................... 276
Monitoring FIPS Mode Status............................................................................................................277
Disabling FIPS Mode..........................................................................................................................277
16 Force10 Resilient Ring Protocol (FRRP)........................................................279
Protocol Overview............................................................................................................................ 279
Ring Status.................................................................................................................................. 280
Multiple FRRP Rings.....................................................................................................................281
Important FRRP Points................................................................................................................ 281
Important FRRP Concepts.......................................................................................................... 281
Implementing FRRP.......................................................................................................................... 283
FRRP Configuration.......................................................................................................................... 283
Creating the FRRP Group........................................................................................................... 283
Configuring the Control VLAN...................................................................................................284
Configuring and Adding the Member VLANs.............................................................................285
Setting the FRRP Timers..............................................................................................................287
Clearing the FRRP Counters....................................................................................................... 287
Viewing the FRRP Configuration................................................................................................ 287
Viewing the FRRP Information....................................................................................................287
Troubleshooting FRRP......................................................................................................................288
Configuration Checks.................................................................................................................288
Sample Configuration and Topology.............................................................................................. 288
17 GARP VLAN Registration Protocol (GVRP)...................................................291
Important Points to Remember........................................................................................................291
Configure GVRP................................................................................................................................292
Related Configuration Tasks.......................................................................................................292
Enabling GVRP Globally....................................................................................................................293
Enabling GVRP on a Layer 2 Interface............................................................................................. 293
Configure GVRP Registration........................................................................................................... 293
Configure a GARP Timer.................................................................................................................. 294
18 Internet Group Management Protocol (IGMP)...........................................296
IGMP Implementation Information..................................................................................................296
IGMP Protocol Overview..................................................................................................................296
IGMP Version 2............................................................................................................................296
IGMP Version 3........................................................................................................................... 298
Configure IGMP.................................................................................................................................301
Related Configuration Tasks.......................................................................................................301
Viewing IGMP Enabled Interfaces....................................................................................................302
Selecting an IGMP Version............................................................................................................... 302
Viewing IGMP Groups...................................................................................................................... 303
Adjusting Timers............................................................................................................................... 303
Adjusting Query and Response Timers......................................................................................303
Adjusting the IGMP Querier Timeout Value.............................................................................. 304
Configuring a Static IGMP Group.................................................................................................... 304
Enabling IGMP Immediate-Leave.................................................................................................... 305
IGMP Snooping.................................................................................................................................305
IGMP Snooping Implementation Information...........................................................................305
Configuring IGMP Snooping...................................................................................................... 305
Removing a Group-Port Association.........................................................................................306
Disabling Multicast Flooding...................................................................................................... 306
Specifying a Port as Connected to a Multicast Router..............................................................307
Configuring the Switch as Querier.............................................................................................307
Fast Convergence after MSTP Topology Changes......................................................................... 308
Egress Interface Selection (EIS) for HTTP and IGMP Applications................................................. 308
Protocol Separation....................................................................................................................309
Enabling and Disabling Management Egress Interface Selection.............................................310
Handling of Management Route Configuration.........................................................................311
Handling of Switch-Initiated Traffic............................................................................................311
Handling of Switch-Destined Traffic.......................................................................................... 312
Handling of Transit Traffic (Traffic Separation).......................................................................... 313
Mapping of Management Applications and Traffic Type...........................................................313
Behavior of Various Applications for Switch-Initiated Traffic ...................................................314
Behavior of Various Applications for Switch-Destined Traffic ................................................. 315
Interworking of EIS With Various Applications...........................................................................316
Designating a Multicast Router Interface......................................................................................... 317
19 Interfaces..............................................................................................................318
Basic Interface Configuration...........................................................................................................318
Advanced Interface Configuration................................................................................................... 318
Interface Types..................................................................................................................................319
View Basic Interface Information..................................................................................................... 319
Enabling a Physical Interface............................................................................................................ 321
Physical Interfaces.............................................................................................................................321
Configuration Task List for Physical Interfaces..........................................................................322
Overview of Layer Modes........................................................................................................... 322
Configuring Layer 2 (Data Link) Mode........................................................................................322
Configuring Layer 2 (Interface) Mode........................................................................................ 323
Configuring Layer 3 (Network) Mode.........................................................................................323
Configuring Layer 3 (Interface) Mode........................................................................................ 324
Egress Interface Selection (EIS)........................................................................................................324
Important Points to Remember..................................................................................................325
Configuring EIS............................................................................................................................325
Management Interfaces....................................................................................................................325
Configuring Management Interfaces......................................................................................... 325
Configuring Management Interfaces on the S-Series...............................................................326
VLAN Interfaces.................................................................................................................................327
Loopback Interfaces......................................................................................................................... 328
Null Interfaces...................................................................................................................................328
Port Channel Interfaces....................................................................................................................328
Port Channel Definition and Standards......................................................................................329
Port Channel Benefits.................................................................................................................329
Port Channel Implementation....................................................................................................329
10/100/1000 Mbps Interfaces in Port Channels........................................................................330
Configuration Tasks for Port Channel Interfaces......................................................................330
Creating a Port Channel..............................................................................................................331
Adding a Physical Interface to a Port Channel...........................................................................331
Reassigning an Interface to a New Port Channel......................................................................333
Configuring the Minimum Oper Up Links in a Port Channel....................................................334
..................................................................................................................................................... 334
Assigning an IP Address to a Port Channel................................................................................ 335
Deleting or Disabling a Port Channel.........................................................................................335
Load Balancing Through Port Channels.................................................................................... 335
Load-Balancing on the S- Series................................................................................................336
Changing the Hash Algorithm....................................................................................................336
Bulk Configuration............................................................................................................................338
Interface Range...........................................................................................................................338
Bulk Configuration Examples..................................................................................................... 338
Defining Interface Range Macros.................................................................................................... 340
Define the Interface Range........................................................................................................ 340
Choosing an Interface-Range Macro........................................................................................ 340
Monitoring and Maintaining Interfaces............................................................................................ 341
Maintenance Using TDR............................................................................................................. 342
Splitting QSFP Ports to SFP+ Ports.................................................................................................. 342
Link Dampening................................................................................................................................343
Important Points to Remember................................................................................................. 344
Enabling Link Dampening...........................................................................................................344
Link Bundle Monitoring.................................................................................................................... 345
Using Ethernet Pause Frames for Flow Control.............................................................................. 346
Threshold Settings...................................................................................................................... 346
Enabling Pause Frames............................................................................................................... 347
Configure the MTU Size on an Interface......................................................................................... 348
Port-Pipes......................................................................................................................................... 349
Auto-Negotiation on Ethernet Interfaces........................................................................................349
Setting the Speed and Duplex Mode of Ethernet Interfaces.....................................................349
Set Auto-Negotiation Options....................................................................................................351
View Advanced Interface Information..............................................................................................351
Configuring the Interface Sampling Size................................................................................... 352
Dynamic Counters............................................................................................................................354
Clearing Interface Counters....................................................................................................... 354
Enhanced Validation of Interface Ranges........................................................................................355
20 Internet Protocol Security (IPSec).................................................................356
Configuring IPSec ............................................................................................................................ 357
21 IPv4 Routing........................................................................................................ 358
IP Addresses...................................................................................................................................... 358
Implementation Information......................................................................................................358
Configuration Tasks for IP Addresses.............................................................................................. 358
Assigning IP Addresses to an Interface............................................................................................ 359
Configuring Static Routes................................................................................................................ 360
Configure Static Routes for the Management Interface................................................................. 361
IPv4 Path MTU Discovery Overview.................................................................................................362
Using the Configured Source IP Address in ICMP Messages..........................................................363
Configuring the ICMP Source Interface.....................................................................................363
Configuring the Duration to Establish a TCP Connection..............................................................363
Enabling Directed Broadcast............................................................................................................364
Resolution of Host Names............................................................................................................... 364
Enabling Dynamic Resolution of Host Names................................................................................ 364
Specifying the Local System Domain and a List of Domains..........................................................365
Configuring DNS with Traceroute................................................................................................... 365
ARP.................................................................................................................................................... 366
Configuration Tasks for ARP.............................................................................................................367
Configuring Static ARP Entries......................................................................................................... 367
Enabling Proxy ARP...........................................................................................................................368
Clearing ARP Cache..........................................................................................................................368
ARP Learning via Gratuitous ARP..................................................................................................... 368
Enabling ARP Learning via Gratuitous ARP......................................................................................369
ARP Learning via ARP Request......................................................................................................... 369
Configuring ARP Retries................................................................................................................... 370
ICMP...................................................................................................................................................371
Configuration Tasks for ICMP...........................................................................................................371
Enabling ICMP Unreachable Messages............................................................................................ 371
UDP Helper........................................................................................................................................ 371
Configure UDP Helper.................................................................................................................371
Important Points to Remember..................................................................................................372
Enabling UDP Helper........................................................................................................................ 372
Configuring a Broadcast Address.....................................................................................................372
Configurations Using UDP Helper....................................................................................................373
UDP Helper with Broadcast-All Addresses...................................................................................... 373
UDP Helper with Subnet Broadcast Addresses................................................................................374
UDP Helper with Configured Broadcast Addresses.........................................................................375
UDP Helper with No Configured Broadcast Addresses...................................................................375
Troubleshooting UDP Helper........................................................................................................... 375
22 IPv6 Routing........................................................................................................ 377
Protocol Overview............................................................................................................................ 377
Extended Address Space.............................................................................................................377
Stateless Autoconfiguration........................................................................................................377
IPv6 Headers................................................................................................................................378
IPv6 Header Fields.......................................................................................................................379
Extension Header Fields............................................................................................................. 380
Addressing................................................................................................................................... 381
Implementing IPv6 with Dell Networking OS..................................................................................383
ICMPv6.............................................................................................................................................. 385
Path MTU Discovery......................................................................................................................... 385
IPv6 Neighbor Discovery..................................................................................................................386
IPv6 Neighbor Discovery of MTU Packets................................................................................. 387
Configuration Task List for IPv6 RDNSS...........................................................................................387
Configuring the IPv6 Recursive DNS Server.............................................................................. 387
Debugging IPv6 RDNSS Information Sent to the Host ............................................................ 388
Displaying IPv6 RDNSS Information...........................................................................................389
Secure Shell (SSH) Over an IPv6 Transport..................................................................................... 390
Configuration Tasks for IPv6............................................................................................................390
Adjusting Your CAM-Profile....................................................................................................... 390
Assigning an IPv6 Address to an Interface................................................................................. 391
Assigning a Static IPv6 Route......................................................................................................391
Configuring Telnet with IPv6......................................................................................................392
SNMP over IPv6...........................................................................................................................392
Showing IPv6 Information.......................................................................................................... 393
Showing an IPv6 Interface..........................................................................................................393
Showing IPv6 Routes..................................................................................................................394
Showing the Running-Configuration for an Interface.............................................................. 395
Clearing IPv6 Routes...................................................................................................................396
23 Intermediate System to Intermediate System............................................ 397
IS-IS Protocol Overview................................................................................................................... 397
IS-IS Addressing................................................................................................................................ 397
Multi-Topology IS-IS........................................................................................................................ 398
Transition Mode.......................................................................................................................... 399
Interface Support........................................................................................................................ 399
Adjacencies................................................................................................................................. 399
Graceful Restart................................................................................................................................ 399
Timers......................................................................................................................................... 400
Implementation Information........................................................................................................... 400
Configuration Information............................................................................................................... 401
Configuration Tasks for IS-IS......................................................................................................401
Configuring the Distance of a Route..........................................................................................410
Changing the IS-Type.................................................................................................................410
Redistributing IPv4 Routes..........................................................................................................413
Redistributing IPv6 Routes..........................................................................................................414
Configuring Authentication Passwords......................................................................................415
Setting the Overload Bit..............................................................................................................416
Debugging IS-IS.......................................................................................................................... 416
IS-IS Metric Styles..............................................................................................................................417
Configure Metric Values................................................................................................................... 418
Maximum Values in the Routing Table.......................................................................................418
Change the IS-IS Metric Style in One Level Only...................................................................... 418
Leaks from One Level to Another.............................................................................................. 420
Sample Configurations..................................................................................................................... 421
24 Link Aggregation Control Protocol (LACP).................................................424
Introduction to Dynamic LAGs and LACP....................................................................................... 424
Important Points to Remember................................................................................................. 424
LACP Modes................................................................................................................................ 425
Configuring LACP Commands................................................................................................... 425
LACP Configuration Tasks................................................................................................................426
Creating a LAG............................................................................................................................ 426
Configuring the LAG Interfaces as Dynamic..............................................................................427
Setting the LACP Long Timeout................................................................................................. 427
Monitoring and Debugging LACP.............................................................................................. 428
Shared LAG State Tracking...............................................................................................................428
Configuring Shared LAG State Tracking.................................................................................... 429
Important Points about Shared LAG State Tracking..................................................................430
LACP Basic Configuration Example..................................................................................................431
Configure a LAG on ALPHA........................................................................................................ 431
Setting Up a Threshold for Utilization of High-Gigabit Port Channels.......................................... 438
Guidelines for Monitoring High-Gigabit Port Channels........................................................... 440
Enabling the Verification of Member Links Utilization in a High-Gigabit Port Channel................ 441
Viewing Buffer Utilization and Queue Statistics on High-Gigabit Ethernet Backplane Ports........441
25 Layer 2...................................................................................................................443
Manage the MAC Address Table...................................................................................................... 443
Clearing the MAC Address Table................................................................................................443
Setting the Aging Time for Dynamic Entries..............................................................................443
Configuring a Static MAC Address............................................................................................. 444
Displaying the MAC Address Table............................................................................................ 444
MAC Learning Limit.......................................................................................................................... 444
Setting the MAC Learning Limit..................................................................................................445
mac learning-limit Dynamic.......................................................................................................445
mac learning-limit mac-address-sticky.................................................................................... 446
mac learning-limit station-move...............................................................................................446
mac learning-limit no-station-move.........................................................................................446
Learning Limit Violation Actions.................................................................................................447
Setting Station Move Violation Actions......................................................................................447
Recovering from Learning Limit and Station Move Violations................................................. 448
NIC Teaming.....................................................................................................................................448
Configure Redundant Pairs.............................................................................................................. 449
Important Points about Configuring Redundant Pairs.............................................................. 451
Far-End Failure Detection................................................................................................................ 452
FEFD State Changes....................................................................................................................453
Configuring FEFD........................................................................................................................454
Enabling FEFD on an Interface................................................................................................... 455
Debugging FEFD......................................................................................................................... 456
26 Link Layer Discovery Protocol (LLDP).......................................................... 458
802.1AB (LLDP) Overview.................................................................................................................458
Protocol Data Units.................................................................................................................... 458
Optional TLVs....................................................................................................................................459
Management TLVs...................................................................................................................... 459
TIA-1057 (LLDP-MED) Overview...................................................................................................... 461
TIA Organizationally Specific TLVs.............................................................................................462
Configure LLDP................................................................................................................................ 466
Related Configuration Tasks...................................................................................................... 466
Important Points to Remember................................................................................................. 467
LLDP Compatibility..................................................................................................................... 467
CONFIGURATION versus INTERFACE Configurations....................................................................467
Enabling LLDP...................................................................................................................................468
Disabling and Undoing LLDP......................................................................................................468
Enabling LLDP on Management Ports.............................................................................................468
Disabling and Undoing LLDP on Management Ports................................................................468
Advertising TLVs................................................................................................................................469
Viewing the LLDP Configuration......................................................................................................470
Viewing Information Advertised by Adjacent LLDP Agents............................................................. 471
Configuring LLDPDU Intervals..........................................................................................................472
Configuring Transmit and Receive Mode........................................................................................ 472
Configuring a Time to Live............................................................................................................... 473
Debugging LLDP...............................................................................................................................474
Relevant Management Objects........................................................................................................ 475
27 Microsoft Network Load Balancing...............................................................481
NLB Unicast Mode Scenario.............................................................................................................481
NLB Multicast Mode Scenario..........................................................................................................482
Limitations With Enabling NLB on Switches....................................................................................482
Benefits and Working of Microsoft Clustering................................................................................ 482
Enable and Disable VLAN Flooding .................................................................................................483
Configuring a Switch for NLB ..........................................................................................................483
.....................................................................................................................................................483
28 Multicast Source Discovery Protocol (MSDP)............................................ 484
Protocol Overview............................................................................................................................484
Anycast RP........................................................................................................................................ 486
Implementation Information............................................................................................................486
Configure Multicast Source Discovery Protocol.............................................................................486
Related Configuration Tasks...................................................................................................... 486
Enable MSDP.................................................................................................................................... 490
Manage the Source-Active Cache................................................................................................... 491
Viewing the Source-Active Cache..............................................................................................491
Limiting the Source-Active Cache............................................................................................. 492
Clearing the Source-Active Cache.............................................................................................492
Enabling the Rejected Source-Active Cache.............................................................................492
Accept Source-Active Messages that Fail the RFP Check.............................................................. 492
Specifying Source-Active Messages................................................................................................ 496
Limiting the Source-Active Messages from a Peer......................................................................... 497
Preventing MSDP from Caching a Local Source.............................................................................497
Preventing MSDP from Caching a Remote Source........................................................................ 498
Preventing MSDP from Advertising a Local Source........................................................................ 499
Logging Changes in Peership States............................................................................................... 500
Terminating a Peership.................................................................................................................... 500
Clearing Peer Statistics.....................................................................................................................500
Debugging MSDP..............................................................................................................................501
MSDP with Anycast RP......................................................................................................................501
Configuring Anycast RP....................................................................................................................503
Reducing Source-Active Message Flooding..............................................................................503
Specifying the RP Address Used in SA Messages.......................................................................503
MSDP Sample Configurations..........................................................................................................506
29 Multiple Spanning Tree Protocol (MSTP).................................................... 509
Protocol Overview............................................................................................................................509
Spanning Tree Variations.................................................................................................................. 510
Implementation Information...................................................................................................... 510
Configure Multiple Spanning Tree Protocol.................................................................................... 510
Related Configuration Tasks.......................................................................................................510
Enable Multiple Spanning Tree Globally...........................................................................................511
Adding and Removing Interfaces......................................................................................................511
Creating Multiple Spanning Tree Instances......................................................................................511
Influencing MSTP Root Selection..................................................................................................... 513
Interoperate with Non-Dell Networking OS Bridges.......................................................................513
Changing the Region Name or Revision..........................................................................................514
Modifying Global Parameters........................................................................................................... 514
Modifying the Interface Parameters................................................................................................. 516
Configuring an EdgePort.................................................................................................................. 516
Flush MAC Addresses after a Topology Change..............................................................................517
MSTP Sample Configurations........................................................................................................... 518
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3 Running-
ConfigurationSFTOS Example Running-Configuration.............................................................518
Debugging and Verifying MSTP Configurations.............................................................................. 521
30 Multicast Features............................................................................................. 524
Enabling IP Multicast.........................................................................................................................524
Multicast with ECMP.........................................................................................................................524
Implementation Information............................................................................................................525
First Packet Forwarding for Lossless Multicast................................................................................ 526
Multicast Policies.............................................................................................................................. 526
IPv4 Multicast Policies................................................................................................................ 526
31 Open Shortest Path First (OSPFv2 and OSPFv3).........................................534
Protocol Overview............................................................................................................................534
Autonomous System (AS) Areas................................................................................................. 534
Area Types................................................................................................................................... 535
Networks and Neighbors............................................................................................................536
Router Types............................................................................................................................... 536
Designated and Backup Designated Routers............................................................................ 538
Link-State Advertisements (LSAs)...............................................................................................538
Router Priority and Cost.............................................................................................................540
OSPF with Dell Networking OS........................................................................................................540
Graceful Restart...........................................................................................................................541
Fast Convergence (OSPFv2, IPv4 Only)..................................................................................... 542
Multi-Process OSPFv2 (IPv4 only)..............................................................................................542
RFC-2328 Compliant OSPF Flooding........................................................................................ 543
OSPF ACK Packing......................................................................................................................544
Setting OSPF Adjacency with Cisco Routers............................................................................. 544
Configuration Information............................................................................................................... 545
Configuration Task List for OSPFv2 (OSPF for IPv4)..................................................................545
Sample Configurations for OSPFv2................................................................................................. 560
Basic OSPFv2 Router Topology................................................................................................. 560
OSPF Area 0 — Gl 1/1 and 1/2.....................................................................................................561
OSPF Area 0 — Gl 3/1 and 3/2.................................................................................................... 561
OSPF Area 0 — Gl 2/1 and 2/2....................................................................................................562
Configuration Task List for OSPFv3 (OSPF for IPv6)........................................................................562
Enabling IPv6 Unicast Routing................................................................................................... 562
Assigning IPv6 Addresses on an Interface................................................................................. 563
Assigning Area ID on an Interface.............................................................................................. 563
Assigning OSPFv3 Process ID and Router ID Globally.............................................................. 563
Configuring Stub Areas...............................................................................................................564
Configuring Passive-Interface....................................................................................................564
Redistributing Routes..................................................................................................................565
Configuring a Default Route.......................................................................................................565
Enabling OSPFv3 Graceful Restart............................................................................................. 565
OSPFv3 Authentication Using IPsec...........................................................................................568
Troubleshooting OSPFv3............................................................................................................ 575
32 Policy-based Routing (PBR).............................................................................577
Overview............................................................................................................................................577
Implementing Policy-based Routing with Dell Networking OS..................................................... 579
Configuration Task List for Policy-based Routing...........................................................................579
PBR Exceptions (Permit)............................................................................................................. 582
Sample Configuration.......................................................................................................................584
Create the Redirect-List GOLDAssign Redirect-List GOLD to Interface 2/11View
Redirect-List GOLD.....................................................................................................................585
33 PIM Sparse-Mode (PIM-SM).............................................................................587
Implementation Information............................................................................................................587
Protocol Overview............................................................................................................................ 587
Requesting Multicast Traffic....................................................................................................... 587
Refuse Multicast Traffic.............................................................................................................. 588
Send Multicast Traffic................................................................................................................. 588
Configuring PIM-SM.........................................................................................................................589
Related Configuration Tasks...................................................................................................... 589
Enable PIM-SM..................................................................................................................................589
Configuring S,G Expiry Timers......................................................................................................... 590
Configuring a Static Rendezvous Point........................................................................................... 592
Overriding Bootstrap Router Updates........................................................................................592
Configuring a Designated Router.................................................................................................... 592
Creating Multicast Boundaries and Domains.................................................................................. 593
Enabling PIM-SM Graceful Restart...................................................................................................593
34 PIM Source-Specific Mode (PIM-SSM)......................................................... 595
Implementation Information............................................................................................................595
Important Points to Remember..................................................................................................595
Configure PIM-SMM.........................................................................................................................596
Related Configuration Tasks...................................................................................................... 596
Enabling PIM-SSM............................................................................................................................ 596
Use PIM-SSM with IGMP Version 2 Hosts....................................................................................... 596
Configuring PIM-SSM with IGMPv2............................................................................................597
35 Port Monitoring..................................................................................................599
Important Points to Remember....................................................................................................... 599
Port Monitoring................................................................................................................................ 600
Configuring Port Monitoring............................................................................................................602
Enabling Flow-Based Monitoring.................................................................................................... 603
Remote Port Mirroring..................................................................................................................... 604
Remote Port Mirroring Example................................................................................................ 605
Configuring Remote Port Mirroring...........................................................................................605
Displaying Remote-Port Mirroring Configurations................................................................... 607
Configuring the Sample Remote Port Mirroring....................................................................... 608
Configuring the Encapsulated Remote Port Mirroring.................................................................... 611
Configuration steps for ERPM ....................................................................................................611
ERPM Behavior on a typical Dell Networking OS ........................................................................... 613
/