Dell PowerSwitch S6010-ON Quick start guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6010-ON Quick start guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Conguration Guide for the S6010–ON
System
9.14.2.2
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks
may be trademarks of their respective owners.
2019 - 07
Rev. A00
Contents
1 About this Guide...........................................................................................................................................37
Audience............................................................................................................................................................................37
Conventions...................................................................................................................................................................... 37
Related Documents..........................................................................................................................................................37
2 Conguration Fundamentals........................................................................................................................ 38
Accessing the Command Line........................................................................................................................................38
CLI Modes.........................................................................................................................................................................38
Navigating CLI Modes...............................................................................................................................................39
The do Command............................................................................................................................................................ 42
Undoing Commands........................................................................................................................................................ 42
Obtaining Help..................................................................................................................................................................42
Entering and Editing Commands....................................................................................................................................42
Command History............................................................................................................................................................ 43
Filtering show Command Outputs.................................................................................................................................43
Example of the grep Keyword.................................................................................................................................. 44
Multiple Users in Conguration Mode...........................................................................................................................44
3 Getting Started............................................................................................................................................45
Console Access................................................................................................................................................................46
Serial Console.............................................................................................................................................................46
Default Conguration.......................................................................................................................................................47
Conguring a Host Name................................................................................................................................................47
Accessing the System Remotely....................................................................................................................................47
Accessing the System Remotely..............................................................................................................................47
Congure the Management Port IP Address......................................................................................................... 48
Congure a Management Route..............................................................................................................................48
Conguring a Username and Password..................................................................................................................48
Conguring the Enable Password..................................................................................................................................49
Conguration File Management.....................................................................................................................................50
Copy Files to and from the System.........................................................................................................................50
Mounting an NFS File System...................................................................................................................................51
Save the Running-Conguration..............................................................................................................................52
Congure the Overload Bit for a Startup Scenario............................................................................................... 53
Viewing Files...............................................................................................................................................................53
Managing the File System.............................................................................................................................................. 54
View Command History.................................................................................................................................................. 54
Upgrading Dell EMC Networking OS............................................................................................................................ 55
Using HTTP for File Transfers........................................................................................................................................55
Verify Software Images Before Installation...................................................................................................................56
4 Management............................................................................................................................................... 58
Contents
3
Conguring Privilege Levels........................................................................................................................................... 58
Creating a Custom Privilege Level...........................................................................................................................59
Removing a Command from EXEC Mode.............................................................................................................. 59
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................59
Allowing Access to CONFIGURATION Mode Commands....................................................................................59
Allowing Access to Dierent Modes........................................................................................................................59
Applying a Privilege Level to a Username...............................................................................................................60
Applying a Privilege Level to a Terminal Line.......................................................................................................... 60
Conguring Logging......................................................................................................................................................... 61
Audit and Security Logs.............................................................................................................................................61
Conguring Logging Format ...................................................................................................................................63
Setting Up a Secure Connection to a Syslog Server.............................................................................................63
Log Messages in the Internal Buer..............................................................................................................................65
Conguration Task List for System Log Management..........................................................................................65
Disabling System Logging...............................................................................................................................................65
Sending System Messages to a Syslog Server............................................................................................................65
Conguring a UNIX System as a Syslog Server.....................................................................................................65
Track Login Activity......................................................................................................................................................... 66
Restrictions for Tracking Login Activity.................................................................................................................. 66
Conguring Login Activity Tracking.........................................................................................................................66
Display Login Statistics..............................................................................................................................................67
Limit Concurrent Login Sessions....................................................................................................................................68
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 68
Conguring Concurrent Session Limit.....................................................................................................................68
Enabling the System to Clear Existing Sessions.................................................................................................... 69
Enabling Secured CLI Mode........................................................................................................................................... 70
Changing System Logging Settings...............................................................................................................................70
Display the Logging Buer and the Logging Conguration.........................................................................................71
Conguring a UNIX Logging Facility Level.................................................................................................................... 72
Synchronizing Log Messages......................................................................................................................................... 73
Enabling Timestamp on Syslog Messages.................................................................................................................... 73
File Transfer Services.......................................................................................................................................................74
Conguration Task List for File Transfer Services..................................................................................................75
Enabling the FTP Server...........................................................................................................................................75
Conguring FTP Server Parameters....................................................................................................................... 75
Conguring FTP Client Parameters......................................................................................................................... 76
Terminal Lines................................................................................................................................................................... 76
Denying and Permitting Access to a Terminal Line................................................................................................76
Conguring Login Authentication for Terminal Lines............................................................................................. 77
Setting Timeout for EXEC Privilege Mode................................................................................................................... 78
Using Telnet to get to Another Network Device..........................................................................................................79
Lock CONFIGURATION Mode....................................................................................................................................... 79
Viewing the Conguration Lock Status...................................................................................................................80
Restoring the Factory Default Settings........................................................................................................................ 80
Important Points to Remember................................................................................................................................80
4
Contents
Restoring Factory Default Environment Variables................................................................................................. 80
Viewing the Reason for Last System Reboot............................................................................................................... 81
Disabling Syslog Messages for SNMP Authentication Failure Events....................................................................... 81
5 802.1X..........................................................................................................................................................82
Port-Authentication Process.......................................................................................................................................... 84
EAP over RADIUS......................................................................................................................................................84
Conguring 802.1X...........................................................................................................................................................85
Related Conguration Tasks..................................................................................................................................... 85
Important Points to Remember......................................................................................................................................85
Enabling 802.1X................................................................................................................................................................ 86
Conguring Request Identity Re-Transmissions...........................................................................................................86
Conguring a Quiet Period after a Failed Authentication......................................................................................87
Forcibly Authorizing or Unauthorizing a Port................................................................................................................87
Re-Authenticating a Port................................................................................................................................................88
Conguring Timeouts......................................................................................................................................................88
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................89
Guest and Authentication-Fail VLANs.......................................................................................................................... 90
Conguring a Guest VLAN....................................................................................................................................... 90
Conguring an Authentication-Fail VLAN...............................................................................................................90
6 Access Control Lists (ACLs)......................................................................................................................... 91
IP Access Control Lists (ACLs)...................................................................................................................................... 92
CAM Usage.................................................................................................................................................................93
Implementing ACLs on Dell EMC Networking OS................................................................................................. 93
Important Points to Remember......................................................................................................................................94
Conguration Task List for Route Maps................................................................................................................. 95
Conguring Match Routes........................................................................................................................................96
Conguring Set Conditions.......................................................................................................................................98
Congure a Route Map for Route Redistribution.................................................................................................. 99
Congure a Route Map for Route Tagging.............................................................................................................99
Continue Clause....................................................................................................................................................... 100
IP Fragment Handling.................................................................................................................................................... 100
IP Fragments ACL Examples...................................................................................................................................100
Layer 4 ACL Rules Examples................................................................................................................................... 101
Congure a Standard IP ACL.........................................................................................................................................101
Conguring a Standard IP ACL Filter..................................................................................................................... 102
Congure an Extended IP ACL.....................................................................................................................................103
Conguring Filters with a Sequence Number.......................................................................................................103
Conguring Filters Without a Sequence Number................................................................................................ 105
Congure Layer 2 and Layer 3 ACLs........................................................................................................................... 105
Assign an IP ACL to an Interface..................................................................................................................................106
Applying an IP ACL.........................................................................................................................................................106
Counting ACL Hits....................................................................................................................................................107
Congure Ingress ACLs..................................................................................................................................................107
Congure Egress ACLs.................................................................................................................................................. 107
Contents
5
Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 108
IP Prex Lists.................................................................................................................................................................. 108
Implementation Information.................................................................................................................................... 109
Conguration Task List for Prex Lists..................................................................................................................109
ACL Remarks................................................................................................................................................................... 112
Conguring a Remark............................................................................................................................................... 112
Deleting a Remark.....................................................................................................................................................113
ACL Resequencing..........................................................................................................................................................114
Resequencing an ACL or Prex List........................................................................................................................114
Route Maps......................................................................................................................................................................115
Implementation Information..................................................................................................................................... 115
Flow-Based Monitoring.................................................................................................................................................. 116
Behavior of Flow-Based Monitoring....................................................................................................................... 116
Enabling Flow-Based Monitoring.............................................................................................................................117
Conguring IP Mirror Access Group.............................................................................................................................118
Sample Conguration............................................................................................................................................... 118
Example of viewing IP mirror–access–group applied to an Interface................................................................ 118
7 Bidirectional Forwarding Detection (BFD)................................................................................................... 119
How BFD Works..............................................................................................................................................................119
BFD Packet Format..................................................................................................................................................120
BFD Sessions............................................................................................................................................................. 121
BFD Three-Way Handshake.................................................................................................................................... 122
Session State Changes............................................................................................................................................ 124
Important Points to Remember.................................................................................................................................... 124
Congure BFD................................................................................................................................................................ 125
Congure BFD for Physical Ports...........................................................................................................................125
Congure BFD for Static Routes............................................................................................................................126
Congure BFD for IPv6 Static Routes...................................................................................................................130
Congure BFD for OSPF.........................................................................................................................................132
Congure BFD for OSPFv3.....................................................................................................................................137
Congure BFD for IS-IS...........................................................................................................................................140
Congure BFD for BGP........................................................................................................................................... 142
Congure BFD for VRRP.........................................................................................................................................148
Conguring Protocol Liveness.................................................................................................................................151
8 Border Gateway Protocol (BGP)................................................................................................................ 152
BGP IP version 4 (BGPv4) Overview.......................................................................................................................... 152
BGP Autonomous Systems.....................................................................................................................................152
AS4 Number Representation.................................................................................................................................. 154
Four-Byte AS Numbers........................................................................................................................................... 156
BGP router ID............................................................................................................................................................156
Sessions and Peers.................................................................................................................................................. 156
Establish a Session................................................................................................................................................... 157
BGP Attributes for selecting Best Path.................................................................................................................157
Multiprotocol BGP....................................................................................................................................................162
6
Contents
BGP global and address family conguration........................................................................................................163
Implement BGP with Dell EMC Networking OS...................................................................................................164
Conguration Information........................................................................................................................................167
Basic BGP conguration tasks......................................................................................................................................168
Prerequisite for conguring a BGP network......................................................................................................... 168
Restrictions............................................................................................................................................................... 168
Enabling BGP............................................................................................................................................................ 168
Enabling four-byte autonomous system numbers.................................................................................................171
Changing a BGP router ID........................................................................................................................................171
Conguring AS4 Number Representations........................................................................................................... 172
Conguring a BGP peer...........................................................................................................................................173
Example-Conguring BGP routing between peers...............................................................................................174
BGP peer group........................................................................................................................................................ 175
Advanced BGP conguration tasks.............................................................................................................................. 181
Route-refresh and Soft-reconguration.................................................................................................................181
Aggregating Routes..................................................................................................................................................184
Filtering BGP.............................................................................................................................................................186
Conguring BGP Fast Fall-Over.............................................................................................................................192
Conguring Passive Peering................................................................................................................................... 193
Enabling Graceful Restart........................................................................................................................................194
Redistributing Routes.............................................................................................................................................. 195
Enabling Additional Paths........................................................................................................................................ 196
Conguring IP Community Lists............................................................................................................................. 197
Conguring an IP Extended Community List........................................................................................................198
Congure BGP attributes........................................................................................................................................199
Enabling Multipath...................................................................................................................................................203
Route Reectors......................................................................................................................................................204
Enabling Route Flap Dampening............................................................................................................................205
Changing BGP keepalive and hold timers............................................................................................................. 207
Setting the extended timer.................................................................................................................................... 208
Enabling or disabling BGP neighbors.....................................................................................................................209
Route Map Continue................................................................................................................................................210
Conguring BGP Confederations............................................................................................................................211
Conguring a BGP VRF address family..................................................................................................................211
Maintaining Existing AS Numbers During an AS Migration................................................................................. 213
Allowing an AS Number to Appear in its Own AS Path....................................................................................... 213
Enabling MBGP Congurations.............................................................................................................................. 214
MBGP support for IPv6...........................................................................................................................................215
Conguring IPv6 MBGP between peers............................................................................................................... 215
Example-Conguring IPv4 and IPv6 neighbors....................................................................................................216
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor.......................................... 218
BGP Regular Expression Optimization..................................................................................................................220
Debugging BGP....................................................................................................................................................... 220
9 Content Addressable Memory (CAM)........................................................................................................ 223
CAM Allocation...............................................................................................................................................................223
Contents
7
Test CAM Usage............................................................................................................................................................225
View CAM Proles.........................................................................................................................................................225
View CAM-ACL Settings.............................................................................................................................................. 225
View CAM Usage...........................................................................................................................................................226
Conguring CAM Threshold and Silence Period........................................................................................................226
Setting CAM Threshold and Silence Period......................................................................................................... 226
CAM Optimization..........................................................................................................................................................227
Troubleshoot CAM Proling..........................................................................................................................................227
CAM Prole Mismatches........................................................................................................................................ 227
QoS CAM Region Limitation...................................................................................................................................228
Syslog Error When the Table is Full....................................................................................................................... 228
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................228
Syslog Warning for Discrepancies Between Congured Extended Prexes....................................................228
Unied Forwarding Table (UFT) Modes......................................................................................................................228
Conguring UFT Modes......................................................................................................................................... 229
10 Control Plane Policing (CoPP)................................................................................................................. 230
Congure Control Plane Policing.................................................................................................................................. 231
Conguring CoPP for Protocols............................................................................................................................. 231
Conguring CoPP for CPU Queues...................................................................................................................... 233
Displaying CoPP Conguration ............................................................................................................................. 234
11 Data Center Bridging (DCB)......................................................................................................................236
Ethernet Enhancements in Data Center Bridging..................................................................................................... 236
Priority-Based Flow Control....................................................................................................................................237
Enhanced Transmission Selection..........................................................................................................................238
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................239
Data Center Bridging in a Trac Flow...................................................................................................................240
Enabling Data Center Bridging.....................................................................................................................................240
DCB Maps and its Attributes.................................................................................................................................. 241
Data Center Bridging: Default Conguration...............................................................................................................241
Conguring Priority-Based Flow Control.................................................................................................................... 242
Conguring Lossless Queues................................................................................................................................. 243
Conguring PFC in a DCB Map................................................................................................................................... 244
PFC Conguration Notes........................................................................................................................................244
PFC Prerequisites and Restrictions....................................................................................................................... 245
Applying a DCB Map on a Port.................................................................................................................................... 245
Conguring PFC without a DCB Map.........................................................................................................................246
Conguring Lossless QueuesExample:..................................................................................................................246
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................247
Pause and Resume of Trac..................................................................................................................................247
Buer Sizes for Lossless or PFC Packets.............................................................................................................248
Behavior of Tagged Packets.........................................................................................................................................248
Conguration Example for DSCP and PFC Priorities................................................................................................249
SNMP Support for PFC and Buer Statistics Tracking........................................................................................... 250
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................250
8
Contents
PFC and ETS Conguration Examples........................................................................................................................ 251
Using PFC to Manage Converged Ethernet Trac...................................................................................................252
Operations on Untagged Packets................................................................................................................................252
Generation of PFC for a Priority for Untagged Packets...........................................................................................252
Congure Enhanced Transmission Selection..............................................................................................................252
ETS Prerequisites and Restrictions....................................................................................................................... 252
Creating an ETS Priority Group..............................................................................................................................253
ETS Operation with DCBx......................................................................................................................................254
Conguring Bandwidth Allocation for DCBx CIN................................................................................................ 254
Conguring ETS in a DCB Map............................................................................................................................. 255
Hierarchical Scheduling in ETS Output Policies.........................................................................................................256
Using ETS to Manage Converged Ethernet Trac................................................................................................... 257
Applying DCB Policies in a Switch Stack.................................................................................................................... 257
Congure a DCBx Operation........................................................................................................................................ 257
DCBx Operation....................................................................................................................................................... 257
DCBx Port Roles......................................................................................................................................................258
DCB Conguration Exchange................................................................................................................................ 259
Conguration Source Election............................................................................................................................... 259
Propagation of DCB Information........................................................................................................................... 260
Auto-Detection and Manual Conguration of the DCBx Version...................................................................... 260
DCBx Example.......................................................................................................................................................... 261
DCBx Prerequisites and Restrictions..................................................................................................................... 261
Conguring DCBx.....................................................................................................................................................261
Verifying the DCB Conguration................................................................................................................................. 265
QoS dot1p Trac Classication and Queue Assignment..........................................................................................269
Conguring the Dynamic Buer Method....................................................................................................................270
Sample DCB Conguration............................................................................................................................................271
PFC and ETS Conguration Command Examples...............................................................................................272
12 Dynamic Host Conguration Protocol (DHCP)......................................................................................... 273
DHCP Packet Format and Options..............................................................................................................................273
Assign an IP Address using DHCP............................................................................................................................... 275
Implementation Information..........................................................................................................................................276
Congure the System to be a DHCP Server..............................................................................................................276
Conguring the Server for Automatic Address Allocation.................................................................................. 277
Specifying a Default Gateway................................................................................................................................ 278
Congure a Method of Hostname Resolution......................................................................................................279
Using DNS for Address Resolution........................................................................................................................ 279
Using NetBIOS WINS for Address Resolution......................................................................................................279
Creating Manual Binding Entries............................................................................................................................279
Debugging the DHCP Server.................................................................................................................................280
Using DHCP Clear Commands.............................................................................................................................. 280
Congure the System to be a DHCP Client............................................................................................................... 280
Conguring the DHCP Client System....................................................................................................................281
DHCP Client on a Management Interface............................................................................................................ 282
DHCP Client Operation with Other Features.......................................................................................................282
Contents
9
DHCP Relay When DHCP Server and Client are in Dierent VRFs........................................................................ 283
Conguring Route Leaking between VRFs on DHCP Relay Agent................................................................... 284
Non-default VRF conguration for DHCPv6 helper address...................................................................................285
Conguring DHCP relay source interface...................................................................................................................285
Global DHCP relay source IPv4 or IPv6 conguration ....................................................................................... 285
Interface level DHCP relay source IPv4 or IPv6 conguration ..........................................................................286
Congure the System for User Port Stacking (Option 230)....................................................................................287
Congure Secure DHCP............................................................................................................................................... 287
Option 82 (DHCPv4 relay options)........................................................................................................................287
DHCPv6 relay agent options..................................................................................................................................288
DHCP Snooping.......................................................................................................................................................289
Drop DHCP Packets on Snooped VLANs Only....................................................................................................293
Dynamic ARP Inspection.........................................................................................................................................293
Conguring Dynamic ARP Inspection................................................................................................................... 293
Source Address Validation............................................................................................................................................ 295
Enabling IP Source Address Validation..................................................................................................................295
DHCP MAC Source Address Validation................................................................................................................ 296
Enabling IP+MAC Source Address Validation.......................................................................................................296
Viewing the Number of SAV Dropped Packets....................................................................................................297
Clearing the Number of SAV Dropped Packets................................................................................................... 297
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 298
ECMP for Flow-Based Anity.....................................................................................................................................298
Conguring the Hash Algorithm............................................................................................................................ 298
Enabling Deterministic ECMP Next Hop.............................................................................................................. 298
Conguring the Hash Algorithm Seed.................................................................................................................. 299
Link Bundle Monitoring................................................................................................................................................. 299
Managing ECMP Group Paths...............................................................................................................................299
Creating an ECMP Group Bundle..........................................................................................................................300
Modifying the ECMP Group Threshold................................................................................................................ 300
....................................................................................................................................................................................301
Support for ECMP in host table.............................................................................................................................301
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes .........................................................................301
14 FIP Snooping............................................................................................................................................302
Fibre Channel over Ethernet........................................................................................................................................ 302
Ensure Robustness in a Converged Ethernet Network............................................................................................302
FIP Snooping on Ethernet Bridges..............................................................................................................................304
FIP Snooping in a Switch Stack...................................................................................................................................306
Using FIP Snooping....................................................................................................................................................... 306
FIP Snooping Prerequisites.....................................................................................................................................306
Important Points to Remember............................................................................................................................. 306
Enabling the FCoE Transit Feature........................................................................................................................ 307
Enable FIP Snooping on VLANs.............................................................................................................................307
Congure the FC-MAP Value................................................................................................................................ 308
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................308
10
Contents
Congure a Port for a Bridge-to-FCF Link...........................................................................................................308
Impact on Other Software Features..................................................................................................................... 308
FIP Snooping Restrictions...................................................................................................................................... 309
Conguring FIP Snooping.......................................................................................................................................309
Displaying FIP Snooping Information............................................................................................................................310
FCoE Transit Conguration Example........................................................................................................................... 314
15 Flex Hash and Optimized Boot-Up............................................................................................................ 316
Flex Hash Capability Overview..................................................................................................................................... 316
Conguring the Flex Hash Mechanism........................................................................................................................316
Conguring Fast Boot and LACP Fast Switchover....................................................................................................317
Optimizing the Boot Time..............................................................................................................................................317
Booting Process When Optimized Boot Time Mechanism is Enabled...............................................................317
Guidelines for Conguring Optimized Booting Mechanism.................................................................................318
Interoperation of Applications with Fast Boot and System States...........................................................................319
LACP and IPv4 Routing...........................................................................................................................................319
LACP and IPv6 Routing...........................................................................................................................................319
BGP Graceful Restart............................................................................................................................................. 320
Cold Boot Caused by Power Cycling the System................................................................................................320
Unexpected Reload of the System........................................................................................................................320
Software Upgrade................................................................................................................................................... 320
LACP Fast Switchover............................................................................................................................................320
Changes to BGP Multipath..................................................................................................................................... 321
Delayed Installation of ECMP Routes Into BGP....................................................................................................321
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................ 321
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 322
16 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 323
Protocol Overview......................................................................................................................................................... 323
Ring Status............................................................................................................................................................... 324
Multiple FRRP Rings................................................................................................................................................324
Important FRRP Points...........................................................................................................................................325
Important FRRP Concepts..................................................................................................................................... 326
Implementing FRRP.......................................................................................................................................................327
FRRP Conguration.......................................................................................................................................................327
Creating the FRRP Group.......................................................................................................................................327
Conguring the Control VLAN............................................................................................................................... 327
Conguring and Adding the Member VLANs.......................................................................................................329
Setting the FRRP Timers........................................................................................................................................330
Clearing the FRRP Counters..................................................................................................................................330
Viewing the FRRP Conguration...........................................................................................................................330
Viewing the FRRP Information.............................................................................................................................. 330
Troubleshooting FRRP................................................................................................................................................... 331
Conguration Checks...............................................................................................................................................331
Sample Conguration and Topology.............................................................................................................................331
FRRP Support on VLT................................................................................................................................................... 331
Contents
11
Example Scenario.................................................................................................................................................... 332
Important Points to Remember..............................................................................................................................333
17 GARP VLAN Registration Protocol (GVRP).............................................................................................. 334
Important Points to Remember....................................................................................................................................334
Congure GVRP............................................................................................................................................................ 335
Related Conguration Tasks...................................................................................................................................335
Enabling GVRP Globally................................................................................................................................................ 336
Enabling GVRP on a Layer 2 Interface........................................................................................................................336
Congure GVRP Registration...................................................................................................................................... 336
Congure a GARP Timer.............................................................................................................................................. 336
18 Internet Group Management Protocol (IGMP)......................................................................................... 338
IGMP Implementation Information...............................................................................................................................338
IGMP Protocol Overview..............................................................................................................................................338
IGMP Version 2........................................................................................................................................................ 338
IGMP Version 3........................................................................................................................................................ 340
Congure IGMP............................................................................................................................................................. 343
Related Conguration Tasks................................................................................................................................... 343
Viewing IGMP Enabled Interfaces............................................................................................................................... 344
Selecting an IGMP Version........................................................................................................................................... 344
Viewing IGMP Groups...................................................................................................................................................344
Adjusting Timers............................................................................................................................................................ 345
Adjusting Query and Response Timers................................................................................................................. 345
Enabling IGMP Immediate-Leave.................................................................................................................................346
IGMP Snooping..............................................................................................................................................................346
IGMP Snooping Implementation Information....................................................................................................... 346
Conguring IGMP Snooping...................................................................................................................................346
Removing a Group-Port Association..................................................................................................................... 347
Disabling Multicast Flooding................................................................................................................................... 347
Specifying a Port as Connected to a Multicast Router...................................................................................... 348
Conguring the Switch as Querier........................................................................................................................ 348
Fast Convergence after MSTP Topology Changes...................................................................................................349
Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................349
Protocol Separation.................................................................................................................................................349
Enabling and Disabling Management Egress Interface Selection......................................................................350
Handling of Management Route Conguration....................................................................................................351
Handling of Switch-Initiated Trac....................................................................................................................... 352
Handling of Switch-Destined Trac......................................................................................................................352
Handling of Transit Trac (Trac Separation).................................................................................................... 353
Mapping of Management Applications and Trac Type.....................................................................................353
Behavior of Various Applications for Switch-Initiated Trac ............................................................................ 354
Behavior of Various Applications for Switch-Destined Trac .......................................................................... 355
Interworking of EIS With Various Applications.....................................................................................................356
Designating a Multicast Router Interface...................................................................................................................356
12
Contents
19 Interfaces.................................................................................................................................................358
Basic Interface Conguration.......................................................................................................................................358
Advanced Interface Conguration...............................................................................................................................358
Interface Types...............................................................................................................................................................359
View Basic Interface Information.................................................................................................................................359
Resetting an Interface to its Factory Default State...................................................................................................360
Enabling a Physical Interface........................................................................................................................................360
Physical Interfaces......................................................................................................................................................... 361
Conguration Task List for Physical Interfaces.....................................................................................................361
40G to 1G Breakout Cable Adaptor........................................................................................................................361
Overview of Layer Modes...................................................................................................................................... 362
Conguring Layer 2 (Data Link) Mode..................................................................................................................362
Conguring Layer 2 (Interface) Mode.................................................................................................................. 363
Conguring Layer 3 (Network) Mode...................................................................................................................363
Conguring Layer 3 (Interface) Mode.................................................................................................................. 363
Automatic recovery of an Err-disabled interface....................................................................................................... 364
Conguring an automatic recovery for an Err-disabled interface......................................................................365
Egress Interface Selection (EIS)..................................................................................................................................365
Important Points to Remember............................................................................................................................. 365
Conguring EIS........................................................................................................................................................ 366
Management Interfaces................................................................................................................................................366
Conguring Management Interfaces.................................................................................................................... 366
Conguring a Management Interface on an Ethernet Port............................................................................... 366
VLAN Interfaces.............................................................................................................................................................367
Loopback Interfaces...................................................................................................................................................... 367
Null Interfaces................................................................................................................................................................ 368
Port Channel Interfaces................................................................................................................................................368
Port Channel Denition and Standards.................................................................................................................368
Port Channel Benets.............................................................................................................................................369
Port Channel Implementation.................................................................................................................................369
Interfaces in Port Channels.................................................................................................................................... 369
Conguration Tasks for Port Channel Interfaces.................................................................................................370
Creating a Port Channel..........................................................................................................................................370
Adding a Physical Interface to a Port Channel.....................................................................................................370
Reassigning an Interface to a New Port Channel.................................................................................................371
Conguring the Minimum Oper Up Links in a Port Channel...............................................................................372
Adding or Removing a Port Channel from a VLAN..............................................................................................372
Assigning an IP Address to a Port Channel...........................................................................................................373
Deleting or Disabling a Port Channel..................................................................................................................... 373
Load Balancing Through Port Channels................................................................................................................ 374
Changing the Hash Algorithm................................................................................................................................ 374
Bulk Conguration..........................................................................................................................................................374
Interface Range........................................................................................................................................................374
Bulk Conguration Examples..................................................................................................................................375
Dening Interface Range Macros................................................................................................................................ 376
Contents
13
Dene the Interface Range.....................................................................................................................................377
Choosing an Interface-Range Macro.....................................................................................................................377
Monitoring and Maintaining Interfaces........................................................................................................................377
Maintenance Using TDR..........................................................................................................................................377
Non Dell-Qualied Transceivers................................................................................................................................... 378
Splitting 40G Ports without Reload.............................................................................................................................378
Splitting QSFP Ports to SFP+ Ports........................................................................................................................... 379
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................380
Important Points to Remember............................................................................................................................. 380
Example Scenarios................................................................................................................................................... 381
Link Dampening.............................................................................................................................................................. 381
Important Points to Remember..............................................................................................................................382
Conguration Example of Link Dampening...........................................................................................................382
Enabling Link Dampening........................................................................................................................................384
Link Bundle Monitoring................................................................................................................................................. 385
Using Ethernet Pause Frames for Flow Control........................................................................................................ 385
Enabling Pause Frames...........................................................................................................................................386
Congure the MTU Size on an Interface....................................................................................................................386
Port-Pipes.......................................................................................................................................................................387
Auto-Negotiation on Ethernet Interfaces................................................................................................................... 387
Setting the Speed of Ethernet Interfaces............................................................................................................ 388
Set Auto-Negotiation Options............................................................................................................................... 389
View Advanced Interface Information.........................................................................................................................389
Conguring the Interface Sampling Size.............................................................................................................. 389
Conguring the Trac Sampling Size Globally.......................................................................................................... 390
Dynamic Counters.......................................................................................................................................................... 391
Clearing Interface Counters....................................................................................................................................392
Compressing Conguration Files................................................................................................................................. 392
Discard Counters........................................................................................................................................................... 393
Display discard counters......................................................................................................................................... 393
20 IPv4 Routing............................................................................................................................................395
IP Addresses...................................................................................................................................................................396
Implementation Information....................................................................................................................................396
Conguration Tasks for IP Addresses......................................................................................................................... 396
Assigning IP Addresses to an Interface.......................................................................................................................396
Conguring Static Routes.............................................................................................................................................397
Adding description for IPv4 and IPv6 static routes.............................................................................................398
Congure Static Routes for the Management Interface..........................................................................................398
IPv4 Path MTU Discovery Overview.......................................................................................................................... 399
Packet handling during MTU mismatch................................................................................................................399
Using the Congured Source IP Address in ICMP Messages..................................................................................399
Conguring the ICMP Source Interface............................................................................................................... 400
Conguring the Duration to Establish a TCP Connection........................................................................................ 400
Enabling Directed Broadcast........................................................................................................................................ 400
Resolution of Host Names............................................................................................................................................ 401
14
Contents
Enabling Dynamic Resolution of Host Names.............................................................................................................401
Specifying the Local System Domain and a List of Domains.................................................................................... 401
Conguring DNS with Traceroute................................................................................................................................402
ARP................................................................................................................................................................................. 403
Conguration Tasks for ARP........................................................................................................................................ 403
Conguring Static ARP Entries....................................................................................................................................403
Enabling Proxy ARP.......................................................................................................................................................404
Clearing ARP Cache......................................................................................................................................................404
ARP Learning via Gratuitous ARP............................................................................................................................... 404
Enabling ARP Learning via Gratuitous ARP................................................................................................................404
ARP Learning via ARP Request...................................................................................................................................405
Conguring ARP Retries...............................................................................................................................................405
ICMP............................................................................................................................................................................... 406
Conguration Tasks for ICMP......................................................................................................................................406
Enabling ICMP Unreachable Messages...................................................................................................................... 406
ICMP Redirects..............................................................................................................................................................406
UDP Helper.....................................................................................................................................................................408
Congure UDP Helper............................................................................................................................................ 408
Important Points to Remember............................................................................................................................. 408
Enabling UDP Helper.....................................................................................................................................................408
Congurations Using UDP Helper............................................................................................................................... 408
UDP Helper with Broadcast-All Addresses.................................................................................................................408
UDP Helper with Subnet Broadcast Addresses.........................................................................................................409
UDP Helper with Congured Broadcast Addresses...................................................................................................410
UDP Helper with No Congured Broadcast Addresses............................................................................................ 410
Troubleshooting UDP Helper.........................................................................................................................................410
21 IPv6 Routing............................................................................................................................................. 412
Protocol Overview..........................................................................................................................................................412
Extended Address Space.........................................................................................................................................413
Stateless Autoconguration.................................................................................................................................... 413
IPv6 Headers.............................................................................................................................................................413
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support.................................................................... 414
IPv6 Header Fields................................................................................................................................................... 414
Extension Header Fields.......................................................................................................................................... 416
Addressing................................................................................................................................................................. 417
Implementing IPv6 with Dell EMC Networking OS....................................................................................................418
ICMPv6............................................................................................................................................................................418
Path MTU discovery...................................................................................................................................................... 418
IPv6 Neighbor Discovery...............................................................................................................................................419
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................420
Conguring the IPv6 Recursive DNS Server....................................................................................................... 420
Debugging IPv6 RDNSS Information Sent to the Host ......................................................................................421
Displaying IPv6 RDNSS Information.......................................................................................................................421
Secure Shell (SSH) Over an IPv6 Transport...............................................................................................................421
Conguration Tasks for IPv6.........................................................................................................................................421
Contents
15
Adjusting Your CAM-Prole.....................................................................................................................................421
Assigning an IPv6 Address to an Interface........................................................................................................... 422
Assigning a Static IPv6 Route................................................................................................................................423
Conguring Telnet with IPv6..................................................................................................................................423
SNMP over IPv6......................................................................................................................................................424
Displaying IPv6 Information.................................................................................................................................... 424
Displaying an IPv6 Interface Information.............................................................................................................. 424
Showing IPv6 Routes..............................................................................................................................................425
Showing the Running-Conguration for an Interface.........................................................................................426
Clearing IPv6 Routes...............................................................................................................................................426
Disabling ND Entry Timeout....................................................................................................................................427
Conguring IPv6 RA Guard...........................................................................................................................................427
Conguring IPv6 RA Guard on an Interface.........................................................................................................429
Monitoring IPv6 RA Guard......................................................................................................................................429
22 iSCSI Optimization...................................................................................................................................430
iSCSI Optimization Overview.......................................................................................................................................430
Monitoring iSCSI Trac Flows...............................................................................................................................432
Application of Quality of Service to iSCSI Trac Flows......................................................................................432
Information Monitored in iSCSI Trac Flows.......................................................................................................432
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 433
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................433
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................434
Enable and Disable iSCSI Optimization................................................................................................................. 434
Default iSCSI Optimization Values...............................................................................................................................435
iSCSI Optimization Prerequisites................................................................................................................................. 435
Conguring iSCSI Optimization................................................................................................................................... 435
Displaying iSCSI Optimization Information..................................................................................................................437
23 Intermediate System to Intermediate System.......................................................................................... 439
IS-IS Protocol Overview................................................................................................................................................439
IS-IS Addressing.............................................................................................................................................................439
Multi-Topology IS-IS...................................................................................................................................................... 440
Transition Mode....................................................................................................................................................... 440
Interface Support..................................................................................................................................................... 441
Adjacencies................................................................................................................................................................441
Graceful Restart............................................................................................................................................................. 441
Timers........................................................................................................................................................................ 441
Implementation Information.......................................................................................................................................... 441
Conguration Information.............................................................................................................................................442
Conguration Tasks for IS-IS..................................................................................................................................443
Conguring the Distance of a Route.....................................................................................................................449
Changing the IS-Type.............................................................................................................................................. 449
Redistributing IPv4 Routes.....................................................................................................................................452
Redistributing IPv6 Routes.....................................................................................................................................453
Conguring Authentication Passwords.................................................................................................................453
16
Contents
Setting the Overload Bit......................................................................................................................................... 454
Debugging IS-IS.......................................................................................................................................................455
IS-IS Metric Styles.........................................................................................................................................................456
Congure Metric Values............................................................................................................................................... 456
Maximum Values in the Routing Table.................................................................................................................. 456
Change the IS-IS Metric Style in One Level Only................................................................................................456
Leaks from One Level to Another..........................................................................................................................458
Sample Congurations..................................................................................................................................................459
24 Link Aggregation Control Protocol (LACP)............................................................................................... 461
Introduction to Dynamic LAGs and LACP................................................................................................................... 461
Important Points to Remember.............................................................................................................................. 461
LACP Modes............................................................................................................................................................ 462
Conguring LACP Commands............................................................................................................................... 462
LACP Conguration Tasks............................................................................................................................................ 463
Creating a LAG.........................................................................................................................................................463
Conguring the LAG Interfaces as Dynamic........................................................................................................ 463
Setting the LACP Long Timeout............................................................................................................................463
Monitoring and Debugging LACP..........................................................................................................................464
Shared LAG State Tracking.......................................................................................................................................... 464
Conguring Shared LAG State Tracking...............................................................................................................465
Important Points about Shared LAG State Tracking........................................................................................... 466
LACP Basic Conguration Example............................................................................................................................ 466
Congure a LAG on ALPHA................................................................................................................................... 466
25 Layer 2.....................................................................................................................................................473
Manage the MAC Address Table..................................................................................................................................473
Clearing the MAC Address Table........................................................................................................................... 473
Setting the Aging Time for Dynamic Entries........................................................................................................ 473
Conguring a Static MAC Address........................................................................................................................ 474
Displaying the MAC Address Table.........................................................................................................................474
MAC Learning Limit....................................................................................................................................................... 474
Setting the MAC Learning Limit.............................................................................................................................475
mac learning-limit Dynamic.....................................................................................................................................475
mac learning-limit mac-address-sticky................................................................................................................. 475
mac learning-limit station-move.............................................................................................................................476
mac learning-limit no-station-move.......................................................................................................................476
Learning Limit Violation Actions............................................................................................................................. 476
Setting Station Move Violation Actions................................................................................................................ 476
Recovering from Learning Limit and Station Move Violations............................................................................477
Enabling port security..............................................................................................................................................477
NIC Teaming................................................................................................................................................................... 478
Congure Redundant Pairs...........................................................................................................................................479
Important Points about Conguring Redundant Pairs......................................................................................... 481
Far-End Failure Detection..............................................................................................................................................481
FEFD State Changes...............................................................................................................................................482
Contents
17
Conguring FEFD.................................................................................................................................................... 482
Enabling FEFD on an Interface...............................................................................................................................483
Debugging FEFD......................................................................................................................................................484
26 Link Layer Discovery Protocol (LLDP)..................................................................................................... 485
802.1AB (LLDP) Overview............................................................................................................................................485
Protocol Data Units................................................................................................................................................. 485
Optional TLVs.................................................................................................................................................................486
Management TLVs.................................................................................................................................................. 486
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 488
TIA Organizationally Specic TLVs........................................................................................................................ 488
Congure LLDP..............................................................................................................................................................492
Related Conguration Tasks...................................................................................................................................492
Important Points to Remember............................................................................................................................. 492
LLDP Compatibility..................................................................................................................................................493
CONFIGURATION versus INTERFACE Congurations............................................................................................ 493
Enabling LLDP................................................................................................................................................................493
Disabling and Undoing LLDP.................................................................................................................................. 493
Enabling LLDP on Management Ports........................................................................................................................493
Disabling and Undoing LLDP on Management Ports.......................................................................................... 494
Advertising TLVs............................................................................................................................................................ 494
Storing and Viewing Unrecognized LLDP TLVs.........................................................................................................495
Reserved Unrecognized LLDP TLVs..................................................................................................................... 495
Organizational Specic Unrecognized LLDP TLVs..............................................................................................495
Viewing Unrecognized LLDP TLVs........................................................................................................................ 496
Viewing the LLDP Conguration................................................................................................................................. 496
Viewing Information Advertised by Adjacent LLDP Neighbors................................................................................496
Examples of Viewing Information Advertised by Neighbors...............................................................................497
Conguring LLDPDU Intervals.....................................................................................................................................499
Conguring LLDP Notication Interval.......................................................................................................................500
Conguring LLDP Notication Interval.......................................................................................................................500
Conguring Transmit and Receive Mode................................................................................................................... 500
Conguring the Time to Live Value..............................................................................................................................501
Debugging LLDP............................................................................................................................................................502
Relevant Management Objects................................................................................................................................... 503
27 Microsoft Network Load Balancing.......................................................................................................... 508
NLB Unicast Mode Scenario........................................................................................................................................508
NLB Multicast Mode Scenario.....................................................................................................................................508
Limitations of the NLB Feature....................................................................................................................................509
Microsoft Clustering......................................................................................................................................................509
Enable and Disable VLAN Flooding ............................................................................................................................ 509
Conguring a Switch for NLB .....................................................................................................................................509
Enabling a Switch for Multicast NLB.....................................................................................................................510
28 Multicast Source Discovery Protocol (MSDP).......................................................................................... 511
18
Contents
Protocol Overview...........................................................................................................................................................511
Anycast RP......................................................................................................................................................................512
Implementation Information.......................................................................................................................................... 513
Congure Multicast Source Discovery Protocol.........................................................................................................513
Related Conguration Tasks....................................................................................................................................513
Enable MSDP.................................................................................................................................................................. 517
Manage the Source-Active Cache...............................................................................................................................518
Viewing the Source-Active Cache......................................................................................................................... 518
Limiting the Source-Active Cache..........................................................................................................................518
Clearing the Source-Active Cache.........................................................................................................................519
Enabling the Rejected Source-Active Cache........................................................................................................519
Accept Source-Active Messages that Fail the RFP Check...................................................................................... 519
Specifying Source-Active Messages...........................................................................................................................522
Limiting the Source-Active Messages from a Peer...................................................................................................523
Preventing MSDP from Caching a Local Source.......................................................................................................523
Preventing MSDP from Caching a Remote Source.................................................................................................. 524
Preventing MSDP from Advertising a Local Source..................................................................................................524
Logging Changes in Peership States...........................................................................................................................525
Terminating a Peership..................................................................................................................................................525
Clearing Peer Statistics.................................................................................................................................................526
Debugging MSDP.......................................................................................................................................................... 526
MSDP with Anycast RP................................................................................................................................................527
Conguring Anycast RP................................................................................................................................................528
Reducing Source-Active Message Flooding.........................................................................................................529
Specifying the RP Address Used in SA Messages.............................................................................................. 529
MSDP Sample Congurations......................................................................................................................................529
32 Multicast Listener Discovery Protocol...................................................................................................... 531
MLD Version 1................................................................................................................................................................. 531
MLD Querier Router.......................................................................................................................................................531
Joining a Multicast Group.............................................................................................................................................532
Leaving a Multicast Group............................................................................................................................................532
MLD version 2................................................................................................................................................................532
MLD timers.....................................................................................................................................................................534
Reducing Host Response Burstiness.................................................................................................................... 535
Conguring MLD Version............................................................................................................................................. 535
Clearing MLD groups.................................................................................................................................................... 535
Debugging MLD.............................................................................................................................................................535
Explicit Tracking............................................................................................................................................................. 535
Reducing Leave Latency...............................................................................................................................................536
Displaying MLD groups table........................................................................................................................................536
Displaying MLD Interfaces............................................................................................................................................536
30 Multiple Spanning Tree Protocol (MSTP).................................................................................................537
Protocol Overview......................................................................................................................................................... 537
Spanning Tree Variations.............................................................................................................................................. 538
Contents
19
Implementation Information....................................................................................................................................538
Congure Multiple Spanning Tree Protocol................................................................................................................538
Related Conguration Tasks...................................................................................................................................539
Enable Multiple Spanning Tree Globally...................................................................................................................... 539
Adding and Removing Interfaces.................................................................................................................................539
Creating Multiple Spanning Tree Instances................................................................................................................ 540
Inuencing MSTP Root Selection................................................................................................................................540
Interoperate with Non-Dell Bridges..............................................................................................................................541
Changing the Region Name or Revision......................................................................................................................541
Modifying Global Parameters....................................................................................................................................... 542
Modifying the Interface Parameters............................................................................................................................543
Setting STP path cost as constant............................................................................................................................. 544
Conguring an EdgePort.............................................................................................................................................. 544
Flush MAC Addresses after a Topology Change....................................................................................................... 545
MSTP Sample Congurations......................................................................................................................................545
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration.......................................................................................545
Debugging and Verifying MSTP Congurations........................................................................................................ 547
31 Multicast Features....................................................................................................................................548
Enabling IP Multicast.....................................................................................................................................................548
Implementation Information..........................................................................................................................................548
Multicast Policies...........................................................................................................................................................549
IPv4 Multicast Policies............................................................................................................................................549
Understanding Multicast Traceroute (mtrace).......................................................................................................... 556
Important Points to Remember..............................................................................................................................557
Printing Multicast Traceroute (mtrace) Paths........................................................................................................... 557
Supported Error Codes.................................................................................................................................................558
mtrace Scenarios...........................................................................................................................................................559
32 Multicast Listener Discovery Protocol..................................................................................................... 565
MLD Version 1................................................................................................................................................................ 565
MLD Querier Router......................................................................................................................................................565
Joining a Multicast Group.............................................................................................................................................566
Leaving a Multicast Group............................................................................................................................................566
MLD version 2................................................................................................................................................................566
MLD timers.....................................................................................................................................................................568
Reducing Host Response Burstiness.................................................................................................................... 569
Clearing MLD groups.................................................................................................................................................... 569
Debugging MLD.............................................................................................................................................................569
Explicit Tracking.............................................................................................................................................................569
Reducing Leave Latency...............................................................................................................................................569
Displaying MLD groups table........................................................................................................................................ 570
Displaying MLD Interfaces............................................................................................................................................ 570
MLD Snooping................................................................................................................................................................570
Enable MLD Snooping.............................................................................................................................................570
20
Contents
/