FN IO Module

Dell FN IO Module User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell FN IO Module User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell PowerEdge FN I/O Module
Configuration Guide
9.10(0.0)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how
to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property
laws. Dell and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and
names mentioned herein may be trademarks of their respective companies.
2016 - 04
Rev. A00
Contents
1 About this Guide..................................................................................................................... 34
Audience.................................................................................................................................... 34
Conventions.............................................................................................................................. 34
Information Symbols............................................................................................................... 35
Related Documents................................................................................................................. 35
2 Before You Start......................................................................................................................36
Operational Modes.................................................................................................................. 36
Standalone mode............................................................................................................... 36
VLT mode.............................................................................................................................36
Programmable MUX mode...............................................................................................36
Stacking mode.....................................................................................................................37
Full Switch mode................................................................................................................ 37
Default Settings.........................................................................................................................37
Other Auto-Configured Settings...........................................................................................38
Data Center Bridging Support............................................................................................... 38
FCoE Connectivity and FIP Snooping.................................................................................. 39
iSCSI Operation.........................................................................................................................39
Link Aggregation.......................................................................................................................39
Link Tracking............................................................................................................................. 40
Configuring VLANs...................................................................................................................40
Uplink LAG........................................................................................................................... 40
Server-Facing LAGs............................................................................................................40
Where to Go From Here.........................................................................................................40
3 Configuration Fundamentals............................................................................................... 42
Accessing the Command Line...............................................................................................42
CLI Modes.................................................................................................................................. 43
Navigating CLI Modes....................................................................................................... 44
The do Command....................................................................................................................45
Undoing Commands............................................................................................................... 45
Obtaining Help..........................................................................................................................46
Entering and Editing Commands..........................................................................................46
Command History....................................................................................................................47
Filtering show Command Outputs....................................................................................... 47
Multiple Users in Configuration Mode.................................................................................49
4 Getting Started....................................................................................................................... 50
Configuration Guide
3
Console Access.........................................................................................................................51
Serial Console...................................................................................................................... 51
External Serial Port with a USB Connector................................................................... 53
Accessing the CLI Interface and Running Scripts Using SSH..........................................53
Entering CLI commands Using an SSH Connection...................................................53
Executing Local CLI Scripts Using an SSH Connection............................................. 54
Boot Process............................................................................................................................. 54
Default Configuration..............................................................................................................56
Configuring a Host Name.......................................................................................................56
Configuring a Unique Host Name on the System............................................................. 57
Accessing the System Remotely........................................................................................... 57
Accessing the Switch Remotely.......................................................................................57
Configure the Management Port IP Address................................................................ 57
Configure a Management Route.....................................................................................58
Configuring a Username and Password........................................................................58
Configuring the Enable Password........................................................................................ 59
Configuration File Management........................................................................................... 59
Copy Files to and from the System................................................................................ 60
Save the Running-Configuration.....................................................................................61
Viewing Files........................................................................................................................ 62
Managing the File System.......................................................................................................63
View the Command History...................................................................................................64
Using HTTP for File Transfers................................................................................................ 65
Upgrading and Downgrading the Dell Networking OS................................................... 66
Verify Software Images Before Installation.........................................................................66
Deploying FN I/O Module.......................................................................................................67
Ensuring the FN IOM system is in Standalone Mode..................................................68
Configuration Examples....................................................................................................69
Configure Interfaces and Port Channel......................................................................... 71
Verifying the Configurations.............................................................................................71
5 Management............................................................................................................................73
Configuring Privilege Levels...................................................................................................73
Creating a Custom Privilege Level.................................................................................. 74
Customizing a Privilege Level.......................................................................................... 75
Applying a Privilege Level to a Username......................................................................76
Applying a Privilege Level to a Terminal Line............................................................... 76
Configuring Logging................................................................................................................ 77
Audit and Security Logs..................................................................................................... 77
Configuring Logging Format ..........................................................................................79
Setting Up a Secure Connection to a Syslog Server...................................................80
Display the Logging Buffer and the Logging Configuration............................................81
Configuration Guide
4
Log Messages in the Internal Buffer.....................................................................................82
Configuration Task List for System Log Management............................................... 82
Disabling System Logging...................................................................................................... 82
Sending System Messages to a Syslog Server....................................................................83
Configuring a UNIX System as a Syslog Server............................................................83
Changing System Logging Settings......................................................................................83
Display the Logging Buffer and the Logging Configuration...........................................84
Configuring a UNIX Logging Facility Level..........................................................................85
Synchronizing Log Messages................................................................................................ 86
Enabling Timestamp on Syslog Messages.......................................................................... 87
Enabling Secure Management Mode................................................................................... 87
File Transfer Services...............................................................................................................88
Configuration Task List for File Transfer Services....................................................... 88
Enabling the FTP Server.................................................................................................... 88
Configuring FTP Server Parameters............................................................................... 89
Configuring FTP Client Parameters................................................................................89
Terminal Lines...........................................................................................................................90
Denying and Permitting Access to a Terminal Line....................................................90
Configuring Login Authentication for Terminal Lines.................................................91
Setting Time Out of EXEC Privilege Mode.......................................................................... 92
Using Telnet to get to Another Network Device............................................................... 92
Lock CONFIGURATION Mode...............................................................................................93
Viewing the Configuration Lock Status......................................................................... 93
Limit Concurrent Login Sessions..........................................................................................94
Restrictions for Limiting the Number of Concurrent Sessions.................................94
Configuring Concurrent Session Limit.......................................................................... 95
Enabling the System to Clear Existing Sessions...........................................................95
Track Login Activity..................................................................................................................96
Restrictions for Tracking Login Activity......................................................................... 96
Configuring Login Activity Tracking............................................................................... 96
Display Login Statistics...................................................................................................... 97
Recovering from a Forgotten Password............................................................................. 99
Recovering from a Forgotten Enable Password..............................................................100
Recovering from a Failed Start............................................................................................100
6 802.1X.....................................................................................................................................102
The Port-Authentication Process....................................................................................... 105
EAP over RADIUS.............................................................................................................. 107
Configuring 802.1X................................................................................................................ 107
Related Configuration Tasks..........................................................................................108
Important Points to Remember.......................................................................................... 108
Enabling 802.1X...................................................................................................................... 109
Configuration Guide
5
Configuring Request Identity Re-Transmissions........................................................ 111
Configuring a Quiet Period after a Failed Authentication.........................................111
Forcibly Authorizing or Unauthorizing a Port...................................................................112
Re-Authenticating a Port.......................................................................................................113
Configuring Timeouts............................................................................................................114
Configuring Dynamic VLAN Assignment with Port Authentication............................. 115
Guest and Authentication-Fail VLANs.......................................................................... 116
Configuring a Guest VLAN.............................................................................................. 117
Configuring an Authentication-Fail VLAN....................................................................117
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory
(CAM)..........................................................................................................................................119
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................... 119
Guidelines for Configuring ACL VLAN groups................................................................. 120
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters...121
Configuring ACL VLAN Groups......................................................................................121
Configuring FP Blocks for VLAN Parameters..............................................................122
Viewing CAM Usage...............................................................................................................123
Allocating FP Blocks for VLAN Processes..........................................................................125
8 Access Control Lists (ACLs)................................................................................................ 126
IP Access Control Lists (ACLs)..............................................................................................127
Implementing ACL on the Dell Networking OS...............................................................128
ACLs and VLANs......................................................................................................................128
ACL Optimization................................................................................................................... 128
Determine the Order in which ACLs are Used to Classify Traffic................................ 129
Example of the order Keyword to Determine ACL Sequence................................ 129
IP Fragment Handling............................................................................................................130
IP Fragments ACL Examples................................................................................................ 130
Layer 4 ACL Rules Examples.................................................................................................131
Configure a Standard IP ACL................................................................................................131
Configuring a Standard IP ACL Filter..................................................................................133
Configure an Extended IP ACL............................................................................................ 134
Configuring Filters with a Sequence Number.................................................................. 134
Configuring Filters Without a Sequence Number........................................................... 135
Established Flag.......................................................................................................................135
Configure Layer 2 and Layer 3 ACLs.................................................................................. 136
Assign an IP ACL to an Interface......................................................................................... 136
Applying an IP ACL................................................................................................................. 137
Counting ACL Hits..................................................................................................................138
Configure Ingress ACLs.........................................................................................................138
Configure Egress ACLs..........................................................................................................139
Configuration Guide
6
Applying Egress Layer 3 ACLs (Control-Plane)................................................................ 139
IP Prefix Lists............................................................................................................................140
Implementation Information.......................................................................................... 141
Configuration Task List for Prefix Lists............................................................................... 141
Creating a Prefix List...............................................................................................................141
Creating a Prefix List Without a Sequence Number........................................................142
Viewing Prefix Lists.................................................................................................................143
Applying a Prefix List for Route Redistribution.................................................................144
Applying a Filter to a Prefix List (OSPF).............................................................................. 144
ACL Resequencing................................................................................................................. 145
Resequencing an ACL or Prefix List....................................................................................146
Route Maps.............................................................................................................................. 147
Implementation Information..........................................................................................147
Important Points to Remember.......................................................................................... 148
Configuration Task List for Route Maps............................................................................ 148
Creating a Route Map............................................................................................................148
Configure Route Map Filters................................................................................................ 150
Configuring Match Routes....................................................................................................151
Configuring Set Conditions..................................................................................................152
Configure a Route Map for Route Redistribution............................................................152
Configure a Route Map for Route Tagging.......................................................................153
Continue Clause..................................................................................................................... 154
Logging of ACL Processes....................................................................................................154
Guidelines for Configuring ACL Logging...........................................................................155
Configuring ACL Logging..................................................................................................... 156
Flow-Based Monitoring Support for ACLs........................................................................ 156
Behavior of Flow-Based Monitoring.............................................................................157
Enabling Flow-Based Monitoring........................................................................................159
9 Bidirectional Forwarding Detection (BFD).......................................................................161
How BFD Works......................................................................................................................162
BFD Packet Format...........................................................................................................163
BFD Sessions......................................................................................................................165
BFD Three-Way Handshake........................................................................................... 165
Session State Changes.....................................................................................................167
Important Points to Remember...........................................................................................167
Configure BFD........................................................................................................................ 168
Configure BFD for Physical Ports..................................................................................168
Enabling BFD Globally..................................................................................................... 168
Establishing a Session on Physical Ports..................................................................... 169
Changing Physical Port Session Parameters.............................................................. 170
Disabling and Re-Enabling BFD..................................................................................... 171
Configuration Guide
7
Configure BFD for Static Routes......................................................................................... 172
Related Configuration Tasks...........................................................................................172
Establishing Sessions for Static Routes........................................................................ 173
Changing Static Route Session Parameters................................................................174
Disabling BFD for Static Routes..................................................................................... 174
Configure BFD for OSPF....................................................................................................... 174
Related Configuration Tasks.......................................................................................... 174
Establishing Sessions with OSPF Neighbors............................................................... 175
Changing OSPF Session Parameters............................................................................ 176
Disabling BFD for OSPF................................................................................................... 177
Configure BFD for OSPFv3................................................................................................... 177
Related Configuration Tasks...........................................................................................177
Establishing Sessions with OSPFv3 Neighbors........................................................... 177
Changing OSPFv3 Session Parameters........................................................................178
Disabling BFD for OSPFv3...............................................................................................178
Configure BFD for BGP......................................................................................................... 179
Prerequisites.......................................................................................................................179
Establishing Sessions with BGP Neighbors................................................................. 179
Disabling BFD for BGP.....................................................................................................182
Use BFD in a BGP Peer Group....................................................................................... 182
Displaying BFD for BGP Information............................................................................182
Configure BFD for VRRP....................................................................................................... 186
Related Configuration Tasks.......................................................................................... 187
Establishing Sessions with All VRRP Neighbors..........................................................187
Establishing VRRP Sessions on VRRP Neighbors.......................................................188
Changing VRRP Session Parameters............................................................................189
Disabling BFD for VRRP...................................................................................................189
Configure BFD for VLANs.....................................................................................................190
Related Configuration Task............................................................................................190
Establish Sessions with VLAN Neighbors.................................................................... 190
Changing VLAN Session Parameters............................................................................ 191
Disabling BFD for VLANs................................................................................................. 191
Configure BFD for Port-Channels...................................................................................... 192
Related Configuration Tasks.......................................................................................... 192
Establish Sessions on Port-Channels........................................................................... 193
Changing Physical Port Session Parameters.............................................................. 194
Disabling BFD for Port-Channels..................................................................................194
Configuring Protocol Liveness............................................................................................ 194
Troubleshooting BFD.............................................................................................................195
10 Border Gateway Protocol IPv4 (BGPv4)........................................................................ 196
Autonomous Systems (AS)................................................................................................... 196
Configuration Guide
8
Sessions and Peers.................................................................................................................199
Establish a Session............................................................................................................199
Route Reflectors.................................................................................................................... 200
Communities.....................................................................................................................201
BGP Attributes.........................................................................................................................201
Best Path Selection Criteria............................................................................................201
Weight................................................................................................................................ 203
Local Preference.............................................................................................................. 204
Multi-Exit Discriminators (MEDs)..................................................................................204
Origin.................................................................................................................................. 205
AS Path............................................................................................................................... 206
Next Hop............................................................................................................................206
Multiprotocol BGP................................................................................................................. 207
Implement BGP with the Dell Networking OS.................................................................207
Additional Path (Add-Path) Support............................................................................. 207
Advertise IGP Cost as MED for Redistributed Routes...............................................208
Ignore Router-ID for Some Best-Path Calculations................................................ 208
Four-Byte AS Numbers...................................................................................................209
AS4 Number Representation.........................................................................................209
AS Number Migration.......................................................................................................211
BGP4 Management Information Base (MIB)............................................................... 213
Important Points to Remember.....................................................................................213
Configuration Information................................................................................................... 214
BGP Configuration................................................................................................................. 214
Enabling BGP..................................................................................................................... 215
Enabling MBGP Configurations.....................................................................................248
BGP Regular Expression Optimization.............................................................................. 249
Debugging BGP......................................................................................................................249
Storing Last and Bad PDUs.............................................................................................250
PDU Counters....................................................................................................................251
Sample Configurations..........................................................................................................251
11 Configuration Cloning.......................................................................................................261
Cloning Configuration Output Status................................................................................262
12 Content Addressable Memory (CAM)............................................................................. 265
CAM Allocation.......................................................................................................................265
Test CAM Usage..................................................................................................................... 266
View CAM-ACL Settings....................................................................................................... 267
CAM Optimization..................................................................................................................267
13 Control Plane Policing (CoPP).........................................................................................268
Configuration Guide
9
Configure Control Plane Policing.......................................................................................270
Configuring CoPP for Protocols................................................................................... 270
Configuring CoPP for CPU Queues............................................................................. 272
Show Commands.............................................................................................................273
14 Data Center Bridging (DCB)..............................................................................................275
Supported Modes...................................................................................................................275
Ethernet Enhancements in Data Center Bridging........................................................... 275
Priority-Based Flow Control................................................................................................ 276
Enhanced Transmission Selection......................................................................................278
Data Center Bridging Exchange Protocol (DCBx)...........................................................279
Creating a DCB Map..............................................................................................................280
Important Points to Remember....................................................................................280
Applying a DCB Map on Server-Facing Ethernet Ports............................................ 281
Data Center Bridging: Default Configuration...................................................................281
Data Center Bridging in a Traffic Flow.............................................................................. 282
Data Center Bridging: Auto-DCB-Enable Mode............................................................. 282
Configuring Priority-Based Flow Control.........................................................................284
How Priority-Based Flow Control is Implemented...................................................286
Configuring Lossless Queues........................................................................................ 287
Configuring the PFC Buffer in a Switch Stack............................................................288
Configuring Enhanced Transmission Selection.............................................................. 289
How Enhanced Transmission Selection is Implemented........................................290
ETS Operation with DCBx...............................................................................................291
Hierarchical Scheduling in ETS Output Policies.............................................................. 291
DCBx Operation..................................................................................................................... 292
DCBx Operation............................................................................................................... 292
DCBx Port Roles............................................................................................................... 293
DCB Configuration Exchange....................................................................................... 294
Configuration Source Election......................................................................................295
Propagation of DCB Information..................................................................................295
Auto-Detection of the DCBx Version..........................................................................296
DCBx Example.................................................................................................................. 296
DCBx Prerequisites and Restrictions............................................................................297
DCBx Error Messages......................................................................................................298
Debugging DCBx on an Interface................................................................................ 298
Verifying the DCB Configuration........................................................................................299
QoS dot1p Traffic Classification and Queue Assignment............................................. 309
Troubleshooting PFC, ETS, and DCBx Operation........................................................... 310
15 Dynamic Host Configuration Protocol (DHCP)............................................................ 312
Supported Modes................................................................................................................... 312
Configuration Guide
10
Assigning an IP Address using DHCP................................................................................. 313
Debugging DHCP Client Operation................................................................................... 314
DHCP Client.............................................................................................................................317
How DHCP Client is Implemented..................................................................................... 317
DHCP Client on a Management Interface........................................................................ 318
DHCP Client on a VLAN........................................................................................................318
DHCP Packet Format and Options.....................................................................................319
Option 82.................................................................................................................................320
Releasing and Renewing DHCP-based IP Addresses..................................................... 321
Viewing DHCP Statistics and Lease Information............................................................. 321
16 Equal Cost Multi-Path (ECMP)......................................................................................... 323
ECMP for Flow-Based Affinity............................................................................................. 323
Enabling Deterministic ECMP Next Hop..................................................................... 323
Link Bundle Monitoring.........................................................................................................324
Managing ECMP Group Paths............................................................................................. 324
17 FC FPORT............................................................................................................................. 326
FC FPORT.................................................................................................................................327
Configuring Switch Mode to FCF Port Mode...................................................................328
Name Server............................................................................................................................328
FCoE Maps...............................................................................................................................329
Creating an FCoE Map..........................................................................................................330
Zoning.......................................................................................................................................331
Creating Zone and Adding Members.................................................................................332
Creating Zone Alias and Adding Members....................................................................... 332
Creating Zonesets..................................................................................................................333
Activating a Zoneset.............................................................................................................. 333
Displaying the Fabric Parameters....................................................................................... 334
18 FCoE Transit........................................................................................................................ 337
Supported Modes...................................................................................................................337
Fibre Channel over Ethernet................................................................................................337
Ensure Robustness in a Converged Ethernet Network..................................................338
FIP Snooping on Ethernet Bridges..................................................................................... 339
FIP Snooping in a Switch Stack...........................................................................................342
Using FIP Snooping................................................................................................................342
Important Points to Remember.................................................................................... 342
Enabling the FCoE Transit Feature............................................................................... 343
Enable FIP Snooping on VLANs.....................................................................................343
Configure the FC-MAP Value........................................................................................ 343
Configure a Port for a Bridge-to-Bridge Link............................................................ 344
Configuration Guide
11
Configure a Port for a Bridge-to-FCF Link.................................................................344
Impact on Other Software Features.............................................................................344
FIP Snooping Prerequisites.............................................................................................345
FIP Snooping Restrictions...............................................................................................345
Configuring FIP Snooping.............................................................................................. 345
Displaying FIP Snooping Information................................................................................346
FCoE Transit Configuration Example.................................................................................353
19 FIPS Cryptography............................................................................................................. 355
Preparing the System............................................................................................................ 355
Enabling FIPS Mode............................................................................................................... 355
Generating Host-Keys...........................................................................................................356
Monitoring FIPS Mode Status.............................................................................................. 356
Disabling FIPS Mode.............................................................................................................. 357
20 Force10 Resilient Ring Protocol (FRRP).........................................................................359
Protocol Overview................................................................................................................. 359
Ring Status.........................................................................................................................360
Multiple FRRP Rings......................................................................................................... 361
Important FRRP Points.................................................................................................... 363
Important FRRP Concepts..............................................................................................363
Implementing FRRP...............................................................................................................364
FRRP Configuration............................................................................................................... 365
Creating the FRRP Group............................................................................................... 365
Configuring the Control VLAN...................................................................................... 365
Configuring and Adding the Member VLANs............................................................. 367
Setting the FRRP Timers................................................................................................. 368
Clearing the FRRP Counters.......................................................................................... 368
Viewing the FRRP Configuration.................................................................................. 369
Viewing the FRRP Information...................................................................................... 369
Troubleshooting FRRP.......................................................................................................... 369
Configuration Checks..................................................................................................... 369
Sample Configuration and Topology................................................................................ 370
21 GARP VLAN Registration Protocol (GVRP).................................................................... 372
Important Points to Remember.......................................................................................... 372
Configure GVRP......................................................................................................................373
Related Configuration Tasks.......................................................................................... 374
Enabling GVRP Globally........................................................................................................374
Enabling GVRP on a Layer 2 Interface............................................................................... 374
Configure GVRP Registration...............................................................................................375
Configure a GARP Timer.......................................................................................................375
Configuration Guide
12
22 FIP Snooping....................................................................................................................... 377
Supported Modes................................................................................................................... 377
Fibre Channel over Ethernet................................................................................................ 377
Ensuring Robustness in a Converged Ethernet Network...............................................377
FIP Snooping on Ethernet Bridges......................................................................................379
How FIP Snooping is Implemented....................................................................................381
FIP Snooping on VLANs...................................................................................................381
FC-MAP Value................................................................................................................... 381
Bridge-to-FCF Links.........................................................................................................381
Impact on other Software Features............................................................................. 382
FIP Snooping Prerequisites.............................................................................................382
FIP Snooping Restrictions...............................................................................................382
Configuring FIP Snooping....................................................................................................383
Displaying FIP Snooping Information................................................................................384
FIP Snooping Example..........................................................................................................390
Debugging FIP Snooping......................................................................................................391
23 Internet Group Management Protocol (IGMP).............................................................392
IGMP Overview.......................................................................................................................392
IGMP Version 2....................................................................................................................... 392
Joining a Multicast Group.............................................................................................. 393
Leaving a Multicast Group..............................................................................................393
IGMP Version 3.......................................................................................................................394
Joining and Filtering Groups and Sources..................................................................395
Leaving and Staying in Groups......................................................................................395
IGMP Snooping.......................................................................................................................396
How IGMP Snooping is Implemented on an Aggregator..............................................396
Disabling Multicast Flooding................................................................................................397
Displaying IGMP Information...............................................................................................397
24 Interfaces............................................................................................................................ 400
Basic Interface Configuration............................................................................................. 400
Advanced Interface Configuration.....................................................................................400
Interface Types....................................................................................................................... 401
View Basic Interface Information....................................................................................... 402
Configuring the Default Interface...................................................................................... 404
Enabling a Physical Interface...............................................................................................404
Physical Interfaces.................................................................................................................405
Configuration Task List for Physical Interfaces..........................................................405
Overview of Layer Modes...............................................................................................406
Configuring Layer 2 (Data Link) Mode.........................................................................406
Configuration Guide
13
Configuring Layer 2 (Interface) Mode..........................................................................407
Configuring Layer 3 (Network) Mode.......................................................................... 407
Configuring Layer 3 (Interface) Mode......................................................................... 408
Management Interfaces....................................................................................................... 409
Configuring Management Interfaces on the MXL Switch.......................................409
VLAN Interfaces.......................................................................................................................411
Loopback Interfaces...............................................................................................................411
Null Interfaces......................................................................................................................... 412
VLAN Membership..................................................................................................................412
Default VLAN .................................................................................................................... 413
Port-Based VLANs............................................................................................................ 413
VLANs and Port Tagging................................................................................................. 413
Configuring VLAN Membership.....................................................................................414
Displaying VLAN Membership........................................................................................415
Adding an Interface to a Tagged VLAN........................................................................415
Adding an Interface to an Untagged VLAN.................................................................416
VLAN Configuration on Physical Ports and Port-Channels.................................... 416
Port Channel Interfaces........................................................................................................ 418
Port Channel Definition and Standards....................................................................... 418
Port Channel Benefits......................................................................................................418
Port Channel Implementation.......................................................................................419
100/1000/10000 Mbps Interfaces in Port Channels................................................ 419
Configuration Tasks for Port Channel Interfaces......................................................420
Creating a Port Channel.................................................................................................420
Adding a Physical Interface to a Port Channel...........................................................421
Reassigning an Interface to a New Port Channel..................................................... 423
Configuring the Minimum Oper Up Links in a Port Channel..................................423
Adding or Removing a Port Channel from a VLAN...................................................424
Assigning an IP Address to a Port Channel.................................................................424
Deleting or Disabling a Port Channel.......................................................................... 425
Load Balancing through Port Channels............................................................................ 425
Changing the Hash Algorithm.............................................................................................425
Server Ports..............................................................................................................................427
Default Configuration without Start-up Config.........................................................427
Bulk Configuration.................................................................................................................428
Interface Range................................................................................................................ 428
Bulk Configuration Examples........................................................................................ 428
Defining Interface Range Macros.......................................................................................430
Define the Interface Range............................................................................................430
Choosing an Interface-Range Macro..........................................................................430
Monitoring and Maintaining Interfaces..............................................................................431
Maintenance Using TDR................................................................................................. 432
Configuration Guide
14
Splitting QSFP Ports to SFP+ Ports.....................................................................................433
Merging SFP+ Ports to QSFP 40G Ports..................................................................... 433
Configure the MTU Size on an Interface.................................................................... 434
Configuring wavelength for 10–Gigabit SFP+ optics.................................................... 434
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..........................................435
Important Points to Remember.................................................................................... 436
Example Scenarios...........................................................................................................436
Layer 2 Flow Control Using Ethernet Pause Frames......................................................436
Enabling Pause Frames................................................................................................... 437
Configure MTU Size on an Interface................................................................................. 438
Port-Pipes................................................................................................................................439
Auto-Negotiation on Ethernet Interfaces.........................................................................439
Setting the Speed and Duplex Mode of Ethernet Interfaces.................................. 439
View Advanced Interface Information...............................................................................442
Configuring the Interface Sampling Size.................................................................... 442
Dynamic Counters...........................................................................................................444
Enhanced Control of Remote Fault Indication Processing.......................................... 445
25 Internet Protocol Security (IPSec)..................................................................................446
Configuring IPSec .................................................................................................................446
26 IPv4 Routing....................................................................................................................... 448
IP Addresses............................................................................................................................448
Implementation Information.........................................................................................449
Configuration Tasks for IP Addresses..........................................................................449
IPv4 Path MTU Discovery Overview...................................................................................452
Using the Configured Source IP Address in ICMP Messages....................................... 453
Configuring the ICMP Source Interface......................................................................453
Configuring the Duration to Establish a TCP Connection............................................453
Enabling Directed Broadcast...............................................................................................454
Resolution of Host Names...................................................................................................454
Enabling Dynamic Resolution of Host Names...........................................................454
Specifying the Local System Domain and a List of Domains..................................455
Configuring DNS with Traceroute................................................................................456
ARP............................................................................................................................................ 457
Configuration Tasks for ARP.......................................................................................... 457
ARP Learning via Gratuitous ARP........................................................................................459
ARP Learning via ARP Request............................................................................................ 459
Configuring ARP Retries.......................................................................................................460
ICMP..........................................................................................................................................461
Configuration Tasks for ICMP........................................................................................461
UDP Helper..............................................................................................................................461
Configuration Guide
15
Configure UDP Helper.....................................................................................................461
Important Points to Remember.................................................................................... 462
Enabling UDP Helper.......................................................................................................462
Configurations Using UDP Helper......................................................................................462
UDP Helper with Broadcast-All Addresses.................................................................463
UDP Helper with Subnet Broadcast Addresses......................................................... 464
UDP Helper with Configured Broadcast Addresses................................................. 464
UDP Helper with No Configured Broadcast Addresses...........................................465
Troubleshooting UDP Helper..............................................................................................465
27 IPv6 Routing........................................................................................................................467
Protocol Overview................................................................................................................. 467
Extended Address Space................................................................................................ 468
Stateless Autoconfiguration...........................................................................................468
IPv6 Header Fields................................................................................................................. 469
Version (4 bits).................................................................................................................. 470
Traffic Class (8 bits)..........................................................................................................470
Flow Label (20 bits)..........................................................................................................470
Payload Length (16 bits)..................................................................................................470
Next Header (8 bits).........................................................................................................470
Hop Limit (8 bits)...............................................................................................................471
Source Address (128 bits)................................................................................................471
Destination Address (128 bits)........................................................................................471
Extension Header Fields........................................................................................................471
Hop-by-Hop Options Header....................................................................................... 472
Addressing............................................................................................................................... 472
Link-local Addresses........................................................................................................473
Static and Dynamic Addressing.....................................................................................473
Implementing IPv6 with the Dell Networking OS...........................................................474
ICMPv6..................................................................................................................................... 476
Path MTU Discovery.............................................................................................................. 476
IPv6 Neighbor Discovery...................................................................................................... 477
IPv6 Neighbor Discovery of MTU Packets.................................................................. 478
Configuration Task List for IPv6 RDNSS............................................................................478
Configuring the IPv6 Recursive DNS Server...............................................................479
Displaying IPv6 RDNSS Information.............................................................................479
Debugging IPv6 RDNSS Information Sent to the Host ...........................................480
IPv6 Multicast......................................................................................................................... 480
Configuration Task List for IPv6......................................................................................... 480
Adjusting Your CAM-Profile........................................................................................... 481
Assigning an IPv6 Address to an Interface..................................................................482
Assigning a Static IPv6 Route........................................................................................ 482
Configuration Guide
16
Configuring Telnet with IPv6.........................................................................................483
SNMP over IPv6................................................................................................................ 483
Showing IPv6 Information............................................................................................. 484
Showing an IPv6 Interface............................................................................................. 484
Showing IPv6 Routes.......................................................................................................485
Showing the Running-Configuration for an Interface.............................................486
Clearing IPv6 Routes.......................................................................................................486
Secure Shell (SSH) Over an IPv6 Transport...................................................................... 487
28 iSCSI Optimization............................................................................................................ 488
Supported Modes.................................................................................................................. 488
iSCSI Optimization Overview.............................................................................................. 488
Monitoring iSCSI Traffic Flows............................................................................................490
Information Monitored in iSCSI Traffic Flows.................................................................. 491
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.......................... 491
iSCSI Optimization: Operation............................................................................................ 491
Configuring iSCSI Optimization..........................................................................................492
Displaying iSCSI Optimization Information......................................................................494
29 Intermediate System to Intermediate System..............................................................496
IS-IS Protocol Overview....................................................................................................... 496
IS-IS Addressing......................................................................................................................497
Multi-Topology IS-IS.............................................................................................................497
Transition Mode............................................................................................................... 498
Interface Support............................................................................................................. 498
Adjacencies....................................................................................................................... 498
Graceful Restart......................................................................................................................499
Timers.................................................................................................................................499
Implementation Information...............................................................................................499
Configuration Information...................................................................................................500
Configuration Tasks for IS-IS......................................................................................... 501
IS-IS Metric Styles................................................................................................................... 517
Configure Metric Values........................................................................................................517
Maximum Values in the Routing Table........................................................................ 518
Change the IS-IS Metric Style in One Level Only...................................................... 518
Leaks from One Level to Another.................................................................................520
Sample Configurations......................................................................................................... 520
30 Isolated Networks for Aggregators................................................................................ 525
Configuring and Verifying Isolated Network Settings.................................................... 525
31 Link Aggregation................................................................................................................ 526
Configuration Guide
17
Supported Modes...................................................................................................................526
How the LACP is Implemented on an Aggregator..........................................................527
Uplink LAG..........................................................................................................................527
Server-Facing LAGs..........................................................................................................527
LACP Modes...................................................................................................................... 528
Auto-Configured LACP Timeout.................................................................................. 528
Link Aggregation Control Protocol (LACP).......................................................................528
Configuration Tasks for Port Channel Interfaces......................................................528
Creating a Port Channel................................................................................................. 529
Adding a Physical Interface to a Port Channel.......................................................... 529
Reassigning an Interface to a New Port Channel...................................................... 531
Configuring the Minimum Oper Up Links in a Port Channel..................................532
Configuring VLAN Tags for Member Interfaces.........................................................533
Deleting or Disabling a Port Channel...........................................................................533
Configuring Auto LAG...........................................................................................................534
Configuring the Minimum Number of Links to be Up for Uplink LAGs to be
Active........................................................................................................................................ 536
Optimizing Traffic Disruption Over LAG Interfaces On IOA Switches in VLT
Mode......................................................................................................................................... 537
Preserving LAG and Port Channel Settings in Nonvolatile Storage.............................537
Enabling the LACP link fallback member.......................................................................... 537
Enabling the Verification of Member Links Utilization in a LAG Bundle.....................538
Monitoring the Member Links of a LAG Bundle.............................................................. 538
Verifying LACP Operation and LAG Configuration......................................................... 539
Multiple Uplink LAGs with 10G Member Ports.................................................................542
32 Layer 2..................................................................................................................................544
Supported Modes...................................................................................................................544
Managing the MAC Address Table..................................................................................... 544
Clearing the MAC Address Entries................................................................................544
Displaying the MAC Address Table...............................................................................545
Disabling MAC Address Learning on the System.......................................................545
Network Interface Controller (NIC) Teaming.................................................................. 546
MAC Address Station Move............................................................................................ 547
MAC Move Optimization................................................................................................ 548
33 Link Layer Discovery Protocol (LLDP)............................................................................549
Supported Modes...................................................................................................................549
Protocol Data Units............................................................................................................... 550
Configure LLDP.......................................................................................................................551
Related Configuration Tasks.......................................................................................... 551
Important Points to Remember.....................................................................................551
Configuration Guide
18
CONFIGURATION versus INTERFACE Configurations...................................................552
Enabling LLDP.........................................................................................................................552
Disabling and Undoing LLDP......................................................................................... 553
Advertising TLVs..................................................................................................................... 553
Optional TLVs..........................................................................................................................554
Management TLVs........................................................................................................... 554
IEEE Organizationally Specific TLVs............................................................................. 555
LLDP-MED Capabilities TLV........................................................................................... 557
LLDP-MED Network Policies TLV................................................................................. 558
Extended Power via MDI TLV.........................................................................................559
LLDP Operation......................................................................................................................560
Viewing the LLDP Configuration........................................................................................ 560
Viewing Information Advertised by Adjacent LLDP Agents...........................................561
Configuring LLDPDU Intervals............................................................................................ 562
Configuring a Time to Live...................................................................................................562
Clearing LLDP Counters....................................................................................................... 563
Debugging LLDP.................................................................................................................... 563
Relevant Management Objects...........................................................................................564
34 Microsoft Network Load Balancing................................................................................570
NLB Unicast Mode Scenario................................................................................................ 570
NLB Multicast Mode Scenario..............................................................................................571
Limitations With Enabling NLB on Switches..................................................................... 571
Benefits and Working of Microsoft Clustering................................................................. 571
Enable and Disable VLAN Flooding ................................................................................... 572
Configuring a Switch for NLB .............................................................................................572
Multicast NLB Mode.........................................................................................................572
35 Multicast Source Discovery Protocol (MSDP)...............................................................574
Protocol Overview................................................................................................................. 574
Anycast RP................................................................................................................................577
Implementation Information................................................................................................577
Configure the Multicast Source Discovery Protocol...................................................... 577
Related Configuration Tasks.......................................................................................... 578
Enabling MSDP....................................................................................................................... 582
Manage the Source-Active Cache..................................................................................... 583
Viewing the Source-Active Cache................................................................................583
Limiting the Source-Active Cache............................................................................... 584
Clearing the Source-Active Cache...............................................................................584
Enabling the Rejected Source-Active Cache.............................................................584
Accept Source-Active Messages that Fail the RFP Check.............................................585
Specifying Source-Active Messages.................................................................................. 589
Configuration Guide
19
Limiting the Source-Active Messages from a Peer.........................................................590
Preventing MSDP from Caching a Local Source.............................................................590
Preventing MSDP from Caching a Remote Source.........................................................591
Preventing MSDP from Advertising a Local Source........................................................592
Logging Changes in Peership States..................................................................................593
Terminating a Peership......................................................................................................... 593
Clearing Peer Statistics......................................................................................................... 594
Debugging MSDP...................................................................................................................594
MSDP with Anycast RP..........................................................................................................595
Configuring Anycast RP........................................................................................................596
Reducing Source-Active Message Flooding...............................................................597
Specifying the RP Address Used in SA Messages.......................................................597
MSDP Sample Configurations.............................................................................................600
36 Multiple Spanning Tree Protocol (MSTP)...................................................................... 603
Protocol Overview.................................................................................................................603
Spanning Tree Variations......................................................................................................605
Implementation Information...............................................................................................605
Configure Multiple Spanning Tree Protocol.................................................................... 605
Related Configuration Tasks..........................................................................................606
Enable Multiple Spanning Tree Globally...........................................................................606
Creating Multiple Spanning Tree Instances......................................................................607
Influencing MSTP Root Selection.......................................................................................608
Interoperate with Non-Dell Networking OS Bridges.....................................................608
Changing the Region Name or Revision.......................................................................... 609
Modifying Global Parameters..............................................................................................609
Enable BPDU Filtering Globally............................................................................................611
Modifying the Interface Parameters................................................................................... 611
Configuring an EdgePort...................................................................................................... 612
Flush MAC Addresses after a Topology Change..............................................................613
MSTP Sample Configurations.............................................................................................. 614
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3
Running-ConfigurationSFTOS Example Running-Configuration..........................614
Debugging and Verifying MSTP Configurations.............................................................. 617
37 Multicast Features..............................................................................................................620
Enabling IP Multicast.............................................................................................................620
Implementation Information...............................................................................................620
First Packet Forwarding for Lossless Multicast.................................................................621
Multicast Policies.................................................................................................................... 621
IPv4 Multicast Policies...........................................................................................................622
Limiting the Number of Multicast Routes...................................................................622
Configuration Guide
20
/