Dell Networking S3100 Series User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell Networking S3100 Series User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S3100
Series
9.10(0.0)
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how
to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property
laws. Dell and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and
names mentioned herein may be trademarks of their respective companies.
2016 - 04
Rev. A00
Contents
1 About this Guide..................................................................................................................... 35
Audience.....................................................................................................................................35
Conventions.............................................................................................................................. 35
Related Documents................................................................................................................. 36
2 Configuration Fundamentals................................................................................................37
Accessing the Command Line...............................................................................................37
CLI Modes.................................................................................................................................. 38
Navigating CLI Modes........................................................................................................39
The do Command....................................................................................................................43
Undoing Commands............................................................................................................... 43
Obtaining Help..........................................................................................................................44
Entering and Editing Commands..........................................................................................44
Command History....................................................................................................................45
Filtering show Command Outputs.......................................................................................46
Example of the grep Keyword......................................................................................... 46
Multiple Users in Configuration Mode................................................................................. 47
3 Getting Started....................................................................................................................... 48
Console Access........................................................................................................................ 49
Serial Console..................................................................................................................... 49
Accessing the CLI Interface and Running Scripts Using SSH......................................... 50
Entering CLI commands Using an SSH Connection...................................................50
Executing Local CLI Scripts Using an SSH Connection..............................................51
Default Configuration.............................................................................................................. 51
Configuring a Host Name....................................................................................................... 51
Accessing the System Remotely........................................................................................... 52
Accessing the System Remotely..................................................................................... 52
Configure the Management Port IP Address................................................................52
Configure a Management Route.....................................................................................53
Configuring a Username and Password........................................................................ 53
Configuring the Enable Password.........................................................................................53
Configuration File Management........................................................................................... 54
Copy Files to and from the System................................................................................ 54
Mounting an NFS File System...........................................................................................55
Save the Running-Configuration.....................................................................................57
Configure the Overload Bit for a Startup Scenario......................................................57
Viewing Files........................................................................................................................ 57
9.10(0.0)
3
Compressing Configuration Files....................................................................................59
Managing the File System.......................................................................................................62
Enabling Software Features on Devices Using a Command Option.............................62
View Command History..........................................................................................................63
Upgrading Dell Networking OS.............................................................................................63
Verify Software Images Before Installation.........................................................................64
Using HTTP for File Transfers................................................................................................ 65
4 Management............................................................................................................................67
Configuring Privilege Levels...................................................................................................67
Creating a Custom Privilege Level..................................................................................68
Removing a Command from EXEC Mode.................................................................... 68
Moving a Command from EXEC Privilege Mode to EXEC Mode.............................68
Allowing Access to CONFIGURATION Mode Commands........................................ 68
Allowing Access to Different Modes.............................................................................. 69
Applying a Privilege Level to a Username...................................................................... 71
Applying a Privilege Level to a Terminal Line................................................................71
Configuring Logging................................................................................................................ 71
Audit and Security Logs.....................................................................................................72
Configuring Logging Format ..........................................................................................73
Display the Logging Buffer and the Logging Configuration......................................74
Setting Up a Secure Connection to a Syslog Server................................................... 75
Sending System Messages to a Syslog Server.............................................................. 76
Track Login Activity..................................................................................................................76
Restrictions for Tracking Login Activity......................................................................... 76
Configuring Login Activity Tracking................................................................................77
Display Login Statistics.......................................................................................................77
Limit Concurrent Login Sessions.......................................................................................... 79
Restrictions for Limiting the Number of Concurrent Sessions.................................79
Configuring Concurrent Session Limit...........................................................................79
Enabling the System to Clear Existing Sessions...........................................................80
Log Messages in the Internal Buffer..................................................................................... 81
Configuration Task List for System Log Management................................................81
Disabling System Logging.......................................................................................................81
Sending System Messages to a Syslog Server....................................................................82
Configuring a UNIX System as a Syslog Server............................................................82
Changing System Logging Settings......................................................................................82
Display the Logging Buffer and the Logging Configuration........................................... 83
Configuring a UNIX Logging Facility Level......................................................................... 84
Synchronizing Log Messages.................................................................................................85
Enabling Timestamp on Syslog Messages.......................................................................... 86
File Transfer Services...............................................................................................................86
9.10(0.0)
4
Configuration Task List for File Transfer Services........................................................87
Enabling the FTP Server.....................................................................................................87
Configuring FTP Server Parameters................................................................................87
Configuring FTP Client Parameters................................................................................88
Terminal Lines...........................................................................................................................88
Denying and Permitting Access to a Terminal Line.................................................... 89
Configuring Login Authentication for Terminal Lines................................................90
Setting Timeout for EXEC Privilege Mode...........................................................................91
Using Telnet to get to Another Network Device............................................................... 92
Lock CONFIGURATION Mode...............................................................................................92
Viewing the Configuration Lock Status......................................................................... 93
5 802.1ag.....................................................................................................................................94
Ethernet CFM............................................................................................................................ 94
Maintenance Domains............................................................................................................ 95
Maintenance Points................................................................................................................. 96
Maintenance End Points......................................................................................................... 96
Implementation Information..................................................................................................97
Configuring the CFM............................................................................................................... 97
Related Configuration Tasks............................................................................................98
Enable Ethernet CFM...............................................................................................................98
Creating a Maintenance Domain..........................................................................................98
Creating a Maintenance Association....................................................................................99
Create Maintenance Points....................................................................................................99
Creating a Maintenance End Point.................................................................................99
Creating a Maintenance Intermediate Point.............................................................. 100
Displaying the MP Databases.........................................................................................100
Continuity Check Messages................................................................................................. 101
Enabling CCM....................................................................................................................102
Enabling Cross-Checking...............................................................................................103
Sending Loopback Messages and Responses..................................................................103
Sending Linktrace Messages and Responses................................................................... 104
Caching Link Trace...........................................................................................................105
Enabling CFM SNMP Traps...................................................................................................106
Displaying Ethernet CFM Statistics..................................................................................... 107
6 802.1X.....................................................................................................................................109
Port-Authentication Process................................................................................................ 111
EAP over RADIUS...............................................................................................................113
Configuring 802.1X.................................................................................................................113
Related Configuration Tasks...........................................................................................113
Important Points to Remember...........................................................................................114
9.10(0.0)
5
Enabling 802.1X.......................................................................................................................115
Configuring dot1x Profile .....................................................................................................116
Configuring MAC addresses for a do1x Profile.................................................................117
Configuring the Static MAB and MAB Profile ...................................................................118
Configuring Critical VLAN ....................................................................................................119
Configuring Request Identity Re-Transmissions.............................................................120
Configuring a Quiet Period after a Failed Authentication........................................120
Forcibly Authorizing or Unauthorizing a Port...................................................................121
Re-Authenticating a Port...................................................................................................... 122
Configuring Timeouts............................................................................................................123
Configuring Dynamic VLAN Assignment with Port Authentication.............................124
Guest and Authentication-Fail VLANs................................................................................125
Configuring a Guest VLAN..............................................................................................126
Configuring an Authentication-Fail VLAN...................................................................126
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory
(CAM)..........................................................................................................................................128
Optimizing CAM Utilization During the Attachment of ACLs to VLANs..................... 128
Guidelines for Configuring ACL VLAN Groups.................................................................129
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters..130
Configuring ACL VLAN Groups..................................................................................... 130
Configuring FP Blocks for VLAN Parameters.............................................................. 131
Viewing CAM Usage...............................................................................................................132
Allocating FP Blocks for VLAN Processes..........................................................................133
8 Access Control Lists (ACLs).................................................................................................135
IP Access Control Lists (ACLs)............................................................................................. 136
CAM Usage.........................................................................................................................137
Implementing ACLs on Dell Networking OS.............................................................. 138
Important Points to Remember.......................................................................................... 139
Configuration Task List for Route Maps...................................................................... 140
Configuring Match Routes..............................................................................................142
Configuring Set Conditions............................................................................................144
Configure a Route Map for Route Redistribution......................................................145
Configure a Route Map for Route Tagging.................................................................145
Continue Clause............................................................................................................... 146
IP Fragment Handling............................................................................................................146
IP Fragments ACL Examples...........................................................................................147
Layer 4 ACL Rules Examples...........................................................................................147
Configure a Standard IP ACL............................................................................................... 148
Configuring a Standard IP ACL Filter............................................................................149
Configure an Extended IP ACL............................................................................................150
9.10(0.0)
6
Configuring Filters with a Sequence Number............................................................ 150
Configuring Filters Without a Sequence Number......................................................152
Configure Layer 2 and Layer 3 ACLs.................................................................................. 153
Assign an IP ACL to an Interface......................................................................................... 153
Applying an IP ACL................................................................................................................. 154
Counting ACL Hits............................................................................................................ 155
Configure Ingress ACLs.........................................................................................................155
Configure Egress ACLs..........................................................................................................156
Applying Egress Layer 3 ACLs (Control-Plane)...........................................................157
IP Prefix Lists............................................................................................................................ 157
Implementation Information..........................................................................................158
Configuration Task List for Prefix Lists.........................................................................158
ACL Resequencing................................................................................................................. 162
Resequencing an ACL or Prefix List..............................................................................163
Route Maps..............................................................................................................................164
Implementation Information..........................................................................................164
Logging of ACL Processes....................................................................................................164
Guidelines for Configuring ACL Logging.................................................................... 166
Configuring ACL Logging............................................................................................... 166
Flow-Based Monitoring Support for ACLs........................................................................ 167
Behavior of Flow-Based Monitoring.............................................................................167
Enabling Flow-Based Monitoring..................................................................................169
9 Bidirectional Forwarding Detection (BFD).......................................................................171
How BFD Works...................................................................................................................... 171
BFD Packet Format...........................................................................................................173
BFD Sessions......................................................................................................................175
BFD Three-Way Handshake............................................................................................175
Session State Changes.....................................................................................................177
Important Points to Remember...........................................................................................177
Configure BFD.........................................................................................................................178
Configure BFD for Physical Ports..................................................................................178
Configure BFD for Static Routes....................................................................................181
Configure BFD for OSPF................................................................................................. 183
Configure BFD for OSPFv3.............................................................................................186
Configure BFD for IS-IS...................................................................................................187
Configure BFD for BGP................................................................................................... 190
Configure BFD for VRRP..................................................................................................197
Configuring Protocol Liveness......................................................................................200
Troubleshooting BFD......................................................................................................200
10 Border Gateway Protocol IPv4 (BGPv4)........................................................................ 202
9.10(0.0)
7
Autonomous Systems (AS)...................................................................................................202
Sessions and Peers.................................................................................................................205
Establish a Session........................................................................................................... 205
Route Reflectors.................................................................................................................... 206
BGP Attributes.........................................................................................................................207
Best Path Selection Criteria............................................................................................207
Weight.................................................................................................................................210
Local Preference...............................................................................................................210
Multi-Exit Discriminators (MEDs)................................................................................... 211
Origin...................................................................................................................................212
AS Path................................................................................................................................ 212
Next Hop.............................................................................................................................213
Multiprotocol BGP..................................................................................................................213
Implement BGP with Dell Networking OS........................................................................214
Additional Path (Add-Path) Support............................................................................. 214
Advertise IGP Cost as MED for Redistributed Routes............................................... 214
Ignore Router-ID in Best-Path Calculation.................................................................215
Four-Byte AS Numbers....................................................................................................215
AS4 Number Representation..........................................................................................216
AS Number Migration.......................................................................................................217
BGP4 Management Information Base (MIB)...............................................................219
Important Points to Remember.....................................................................................219
Configuration Information...................................................................................................220
BGP Configuration................................................................................................................. 221
Enabling BGP.....................................................................................................................222
Configuring AS4 Number Representations.................................................................225
Configuring Peer Groups................................................................................................227
Configuring BGP Fast Fall-Over....................................................................................230
Configuring Passive Peering...........................................................................................231
Maintaining Existing AS Numbers During an AS Migration......................................232
Allowing an AS Number to Appear in its Own AS Path............................................ 233
Enabling Graceful Restart...............................................................................................234
Enabling Neighbor Graceful Restart.............................................................................235
Filtering on an AS-Path Attribute.................................................................................. 236
Regular Expressions as Filters........................................................................................ 237
Redistributing Routes...................................................................................................... 239
Enabling Additional Paths...............................................................................................240
Configuring IP Community Lists...................................................................................240
Configuring an IP Extended Community List............................................................. 241
Filtering Routes with Community Lists........................................................................242
Manipulating the COMMUNITY Attribute....................................................................243
Changing MED Attributes............................................................................................... 245
9.10(0.0)
8
Changing the LOCAL_PREFERENCE Attribute.......................................................... 245
Changing the NEXT_HOP Attribute............................................................................. 246
Changing the WEIGHT Attribute...................................................................................246
Enabling Multipath........................................................................................................... 247
Filtering BGP Routes........................................................................................................247
Filtering BGP Routes Using Route Maps..................................................................... 249
Filtering BGP Routes Using AS-PATH Information................................................... 249
Configuring BGP Route Reflectors...............................................................................250
Aggregating Routes..........................................................................................................251
Configuring BGP Confederations................................................................................. 251
Enabling Route Flap Dampening.................................................................................. 252
Changing BGP Timers..................................................................................................... 255
Enabling BGP Neighbor Soft-Reconfiguration.......................................................... 255
Route Map Continue........................................................................................................257
Enabling MBGP Configurations...........................................................................................257
BGP Regular Expression Optimization.............................................................................. 258
Debugging BGP......................................................................................................................258
Storing Last and Bad PDUs.............................................................................................259
Capturing PDUs................................................................................................................260
PDU Counters................................................................................................................... 262
Sample Configurations......................................................................................................... 262
11 Content Addressable Memory (CAM)............................................................................. 269
CAM Allocation.......................................................................................................................269
Test CAM Usage......................................................................................................................271
View CAM-ACL Settings........................................................................................................272
View CAM Usage.................................................................................................................... 274
CAM Optimization..................................................................................................................274
Troubleshoot CAM Profiling................................................................................................ 274
CAM Profile Mismatches.................................................................................................274
QoS CAM Region Limitation.......................................................................................... 275
12 Control Plane Policing (CoPP)......................................................................................... 276
Configure Control Plane Policing.......................................................................................278
Configuring CoPP for Protocols................................................................................... 278
Configuring CoPP for CPU Queues.............................................................................280
CoPP for OSPFv3 Packets...............................................................................................281
Configuring CoPP for OSPFv3.......................................................................................285
Displaying CoPP Configuration ................................................................................... 286
13 Dynamic Host Configuration Protocol (DHCP)............................................................288
DHCP Packet Format and Options.................................................................................... 288
9.10(0.0)
9
Assign an IP Address using DHCP...................................................................................... 290
Implementation Information................................................................................................291
Configure the System to be a DHCP Server.....................................................................292
Configuring the Server for Automatic Address Allocation...................................... 293
Specifying a Default Gateway........................................................................................294
Configure a Method of Hostname Resolution.......................................................... 294
Using DNS for Address Resolution............................................................................... 295
Using NetBIOS WINS for Address Resolution............................................................ 295
Creating Manual Binding Entries...................................................................................295
Debugging the DHCP Server.........................................................................................296
Using DHCP Clear Commands..................................................................................... 296
Configure the System to be a Relay Agent.......................................................................296
Configure the System to be a DHCP Client.....................................................................298
Configuring the DHCP Client System..........................................................................299
DHCP Client on a Management Interface..................................................................300
DHCP Client Operation with Other Features............................................................. 301
Configure the System for User Port Stacking (Option 230)......................................... 302
Configure Secure DHCP.......................................................................................................302
Option 82...........................................................................................................................302
DHCP Snooping............................................................................................................... 303
Drop DHCP Packets on Snooped VLANs Only..........................................................307
Dynamic ARP Inspection................................................................................................ 307
Configuring Dynamic ARP Inspection.........................................................................308
Source Address Validation....................................................................................................310
Enabling IP Source Address Validation........................................................................ 310
DHCP MAC Source Address Validation........................................................................ 311
Enabling IP+MAC Source Address Validation............................................................. 311
Viewing the Number of SAV Dropped Packets.......................................................... 312
Clearing the Number of SAV Dropped Packets..........................................................312
14 Equal Cost Multi-Path (ECMP)......................................................................................... 313
ECMP for Flow-Based Affinity..............................................................................................313
Configuring the Hash Algorithm................................................................................... 313
Enabling Deterministic ECMP Next Hop......................................................................313
Configuring the Hash Algorithm Seed......................................................................... 314
Link Bundle Monitoring.........................................................................................................314
Managing ECMP Group Paths........................................................................................315
Creating an ECMP Group Bundle..................................................................................316
Modifying the ECMP Group Threshold........................................................................316
15 FIPS Cryptography..............................................................................................................318
Configuration Tasks............................................................................................................... 318
9.10(0.0)
10
Preparing the System.............................................................................................................319
Enabling FIPS Mode............................................................................................................... 319
Generating Host-Keys...........................................................................................................320
Monitoring FIPS Mode Status.............................................................................................. 320
Disabling FIPS Mode...............................................................................................................321
16 Force10 Resilient Ring Protocol (FRRP).........................................................................322
Protocol Overview................................................................................................................. 322
Ring Status......................................................................................................................... 323
Multiple FRRP Rings......................................................................................................... 324
Important FRRP Points.................................................................................................... 325
Important FRRP Concepts..............................................................................................326
Implementing FRRP............................................................................................................... 327
FRRP Configuration............................................................................................................... 328
Creating the FRRP Group............................................................................................... 328
Configuring the Control VLAN...................................................................................... 328
Configuring and Adding the Member VLANs.............................................................329
Setting the FRRP Timers..................................................................................................331
Clearing the FRRP Counters...........................................................................................331
Viewing the FRRP Configuration................................................................................... 331
Viewing the FRRP Information.......................................................................................331
Troubleshooting FRRP.......................................................................................................... 332
Configuration Checks..................................................................................................... 332
Sample Configuration and Topology.................................................................................332
17 GARP VLAN Registration Protocol (GVRP).................................................................... 335
Important Points to Remember.......................................................................................... 335
Configure GVRP......................................................................................................................337
Related Configuration Tasks..........................................................................................338
Enabling GVRP Globally........................................................................................................338
Enabling GVRP on a Layer 2 Interface...............................................................................338
Configure GVRP Registration.............................................................................................. 339
Configure a GARP Timer...................................................................................................... 339
RPM Redundancy...................................................................................................................340
18 High Availability (HA)......................................................................................................... 341
Component Redundancy..................................................................................................... 341
Automatic and Manual Stack Unit Failover.................................................................342
Synchronization between Management and Standby Units...................................343
Forcing an Stack Unit Failover.......................................................................................343
Disabling Auto-Reboot................................................................................................... 343
Manually Synchronizing Management and Standby Units......................................343
9.10(0.0)
11
Pre-Configuring a Stack Unit Slot...................................................................................... 344
Removing a Provisioned Logical Stack Unit.....................................................................344
Hitless Behavior...................................................................................................................... 345
Graceful Restart......................................................................................................................345
Software Resiliency................................................................................................................346
Software Component Health Monitoring...................................................................346
System Health Monitoring..............................................................................................346
Failure and Event Logging..............................................................................................346
Hot-Lock Behavior.................................................................................................................347
19 Internet Group Management Protocol (IGMP).............................................................348
IGMP Implementation Information....................................................................................348
IGMP Protocol Overview......................................................................................................349
IGMP Version 2................................................................................................................. 349
IGMP Version 3................................................................................................................. 350
Configure IGMP......................................................................................................................354
Related Configuration Tasks..........................................................................................354
Viewing IGMP Enabled Interfaces.......................................................................................354
Selecting an IGMP Version................................................................................................... 355
Viewing IGMP Groups........................................................................................................... 355
Adjusting Timers.....................................................................................................................356
Adjusting Query and Response Timers........................................................................356
Preventing a Host from Joining a Group.......................................................................... 357
Enabling IGMP Immediate-Leave.......................................................................................360
IGMP Snooping...................................................................................................................... 360
IGMP Snooping Implementation Information........................................................... 360
Configuring IGMP Snooping.......................................................................................... 361
Removing a Group-Port Association........................................................................... 361
Disabling Multicast Flooding..........................................................................................362
Specifying a Port as Connected to a Multicast Router............................................ 362
Configuring the Switch as Querier...............................................................................362
Fast Convergence after MSTP Topology Changes.........................................................363
Egress Interface Selection (EIS) for HTTP and IGMP Applications.............................. 363
Protocol Separation.........................................................................................................364
Enabling and Disabling Management Egress Interface Selection..........................365
Handling of Management Route Configuration........................................................367
Handling of Switch-Initiated Traffic............................................................................. 367
Handling of Switch-Destined Traffic........................................................................... 368
Handling of Transit Traffic (Traffic Separation)..........................................................369
Mapping of Management Applications and Traffic Type.........................................369
Behavior of Various Applications for Switch-Initiated Traffic ................................370
Behavior of Various Applications for Switch-Destined Traffic ...............................371
9.10(0.0)
12
Interworking of EIS With Various Applications...........................................................372
Designating a Multicast Router Interface..........................................................................373
20 Interfaces.............................................................................................................................374
Basic Interface Configuration..............................................................................................374
Advanced Interface Configuration..................................................................................... 374
Interface Types....................................................................................................................... 375
Optional Modules...................................................................................................................376
View Basic Interface Information........................................................................................376
Resetting an Interface to its Factory Default State..........................................................378
Enabling Energy Efficient Ethernet.....................................................................................378
Enabling a Physical Interface............................................................................................... 379
Physical Interfaces................................................................................................................. 379
Configuration Task List for Physical Interfaces..........................................................379
Overview of Layer Modes...............................................................................................380
Configuring Layer 2 (Data Link) Mode.........................................................................380
Configuring Layer 2 (Interface) Mode.......................................................................... 381
Configuring Layer 3 (Network) Mode...........................................................................381
Configuring Layer 3 (Interface) Mode..........................................................................382
Egress Interface Selection (EIS)...........................................................................................382
Important Points to Remember.................................................................................... 383
Configuring EIS.................................................................................................................383
Management Interfaces........................................................................................................383
Configuring Management Interfaces...........................................................................383
Configuring a Management Interface on an Ethernet Port.................................... 385
VLAN Interfaces......................................................................................................................386
Loopback Interfaces.............................................................................................................. 387
Null Interfaces.........................................................................................................................387
Port Channel Interfaces........................................................................................................387
Port Channel Definition and Standards.......................................................................388
Port Channel Benefits..................................................................................................... 388
Port Channel Implementation.......................................................................................388
Interfaces in Port Channels............................................................................................389
Configuration Tasks for Port Channel Interfaces......................................................389
Creating a Port Channel.................................................................................................390
Adding a Physical Interface to a Port Channel.......................................................... 390
Reassigning an Interface to a New Port Channel......................................................392
Configuring the Minimum Oper Up Links in a Port Channel..................................393
Adding or Removing a Port Channel from a VLAN...................................................393
Assigning an IP Address to a Port Channel.................................................................394
Deleting or Disabling a Port Channel.......................................................................... 395
Load Balancing Through Port Channels..................................................................... 395
9.10(0.0)
13
Load-Balancing Method................................................................................................. 395
Changing the Hash Algorithm.......................................................................................396
Bulk Configuration.................................................................................................................397
Interface Range.................................................................................................................397
Bulk Configuration Examples........................................................................................ 398
Defining Interface Range Macros.......................................................................................399
Define the Interface Range............................................................................................400
Choosing an Interface-Range Macro..........................................................................400
Monitoring and Maintaining Interfaces.............................................................................400
Maintenance Using TDR................................................................................................. 401
Link Dampening..................................................................................................................... 402
Important Points to Remember....................................................................................402
Enabling Link Dampening.............................................................................................. 403
Link Bundle Monitoring........................................................................................................ 404
Using Ethernet Pause Frames for Flow Control..............................................................405
Enabling Pause Frames...................................................................................................406
Configure the MTU Size on an Interface..........................................................................406
Port-Pipes................................................................................................................................407
Auto-Negotiation on Ethernet Interfaces........................................................................ 408
Setting the Speed and Duplex Mode of Ethernet Interfaces..................................408
Set Auto-Negotiation Options.......................................................................................410
Provisioning Combo Ports....................................................................................................411
View Advanced Interface Information............................................................................... 412
Configuring the Interface Sampling Size.....................................................................412
Dynamic Counters................................................................................................................. 414
Clearing Interface Counters...........................................................................................414
21 Internet Protocol Security (IPSec)...................................................................................416
Configuring IPSec ..................................................................................................................417
22 IPv4 Routing........................................................................................................................418
IP Addresses.............................................................................................................................419
Implementation Information..........................................................................................419
Configuration Tasks for IP Addresses................................................................................ 419
Assigning IP Addresses to an Interface............................................................................. 420
Configuring Static Routes.....................................................................................................421
Configure Static Routes for the Management Interface............................................... 422
IPv4 Path MTU Discovery Overview...................................................................................422
Using the Configured Source IP Address in ICMP Messages....................................... 423
Configuring the ICMP Source Interface......................................................................423
Configuring the Duration to Establish a TCP Connection............................................424
Enabling Directed Broadcast...............................................................................................424
9.10(0.0)
14
Resolution of Host Names................................................................................................... 425
Enabling Dynamic Resolution of Host Names.................................................................425
Specifying the Local System Domain and a List of Domains....................................... 426
Configuring DNS with Traceroute......................................................................................426
ARP............................................................................................................................................ 427
Configuration Tasks for ARP................................................................................................427
Configuring Static ARP Entries............................................................................................428
Enabling Proxy ARP............................................................................................................... 428
Clearing ARP Cache.............................................................................................................. 429
ARP Learning via Gratuitous ARP........................................................................................429
Enabling ARP Learning via Gratuitous ARP.......................................................................430
ARP Learning via ARP Request............................................................................................430
Configuring ARP Retries........................................................................................................431
ICMP..........................................................................................................................................432
Configuration Tasks for ICMP............................................................................................. 432
Enabling ICMP Unreachable Messages............................................................................. 432
UDP Helper..............................................................................................................................433
Configure UDP Helper.................................................................................................... 433
Important Points to Remember.................................................................................... 433
Enabling UDP Helper.............................................................................................................433
Configuring a Broadcast Address.......................................................................................434
Configurations Using UDP Helper......................................................................................434
UDP Helper with Broadcast-All Addresses.......................................................................435
UDP Helper with Subnet Broadcast Addresses............................................................... 436
UDP Helper with Configured Broadcast Addresses....................................................... 436
UDP Helper with No Configured Broadcast Addresses.................................................437
Troubleshooting UDP Helper.............................................................................................. 437
23 IPv6 Routing....................................................................................................................... 439
Protocol Overview.................................................................................................................439
Extended Address Space................................................................................................ 440
Stateless Autoconfiguration.......................................................................................... 440
IPv6 Headers......................................................................................................................441
IPv6 Header Fields............................................................................................................441
Extension Header Fields..................................................................................................443
Addressing......................................................................................................................... 444
Implementing IPv6 with Dell Networking OS..................................................................445
ICMPv6.....................................................................................................................................448
Path MTU Discovery..............................................................................................................448
IPv6 Neighbor Discovery......................................................................................................449
IPv6 Neighbor Discovery of MTU Packets..................................................................450
Configuration Task List for IPv6 RDNSS............................................................................450
9.10(0.0)
15
Configuring the IPv6 Recursive DNS Server............................................................... 451
Debugging IPv6 RDNSS Information Sent to the Host ............................................451
Displaying IPv6 RDNSS Information.............................................................................452
Secure Shell (SSH) Over an IPv6 Transport.......................................................................453
Configuration Tasks for IPv6............................................................................................... 453
Adjusting Your CAM-Profile...........................................................................................453
Assigning an IPv6 Address to an Interface..................................................................454
Assigning a Static IPv6 Route.........................................................................................455
Configuring Telnet with IPv6.........................................................................................455
SNMP over IPv6................................................................................................................ 456
Displaying IPv6 Information...........................................................................................456
Displaying an IPv6 Interface Information....................................................................457
Showing IPv6 Routes.......................................................................................................458
Showing the Running-Configuration for an Interface.............................................459
Clearing IPv6 Routes....................................................................................................... 459
Configuring IPv6 RA Guard..................................................................................................460
Configuring IPv6 RA Guard on an Interface...............................................................462
Monitoring IPv6 RA Guard..............................................................................................462
24 iSCSI Optimization............................................................................................................ 463
iSCSI Optimization Overview.............................................................................................. 463
Monitoring iSCSI Traffic Flows...................................................................................... 465
Application of Quality of Service to iSCSI Traffic Flows...........................................465
Information Monitored in iSCSI Traffic Flows............................................................465
Detection and Auto-Configuration for Dell EqualLogic Arrays............................. 466
Configuring Detection and Ports for Dell Compellent Arrays................................467
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................... 467
Enable and Disable iSCSI Optimization.......................................................................468
Default iSCSI Optimization Values..................................................................................... 469
iSCSI Optimization Prerequisites........................................................................................469
Configuring iSCSI Optimization..........................................................................................469
Displaying iSCSI Optimization Information...................................................................... 472
25 Intermediate System to Intermediate System..............................................................474
IS-IS Protocol Overview....................................................................................................... 474
IS-IS Addressing......................................................................................................................475
Multi-Topology IS-IS............................................................................................................. 475
Transition Mode................................................................................................................476
Interface Support..............................................................................................................476
Adjacencies........................................................................................................................476
Graceful Restart......................................................................................................................476
Timers................................................................................................................................. 477
9.10(0.0)
16
Implementation Information............................................................................................... 477
Configuration Information...................................................................................................478
Configuration Tasks for IS-IS.........................................................................................479
Configuring the Distance of a Route........................................................................... 487
Changing the IS-Type.....................................................................................................488
Redistributing IPv4 Routes..............................................................................................491
Redistributing IPv6 Routes............................................................................................. 492
Configuring Authentication Passwords.......................................................................492
Setting the Overload Bit..................................................................................................493
Debugging IS-IS............................................................................................................... 494
IS-IS Metric Styles.................................................................................................................. 495
Configure Metric Values.......................................................................................................495
Maximum Values in the Routing Table........................................................................496
Change the IS-IS Metric Style in One Level Only......................................................496
Leaks from One Level to Another................................................................................ 498
Sample Configurations......................................................................................................... 498
26 Link Aggregation Control Protocol (LACP)...................................................................501
Introduction to Dynamic LAGs and LACP.........................................................................501
Important Points to Remember.................................................................................... 501
LACP Modes...................................................................................................................... 502
Configuring LACP Commands......................................................................................502
LACP Configuration Tasks....................................................................................................503
Creating a LAG..................................................................................................................503
Configuring the LAG Interfaces as Dynamic..............................................................504
Setting the LACP Long Timeout................................................................................... 504
Monitoring and Debugging LACP.................................................................................505
Shared LAG State Tracking...................................................................................................505
Configuring Shared LAG State Tracking......................................................................506
Important Points about Shared LAG State Tracking.................................................508
LACP Basic Configuration Example................................................................................... 508
Configure a LAG on ALPHA........................................................................................... 508
27 Layer 2...................................................................................................................................517
Manage the MAC Address Table..........................................................................................517
Clearing the MAC Address Table...................................................................................517
Setting the Aging Time for Dynamic Entries............................................................... 517
Configuring a Static MAC Address................................................................................518
Displaying the MAC Address Table............................................................................... 518
MAC Learning Limit................................................................................................................518
Setting the MAC Learning Limit.....................................................................................519
mac learning-limit Dynamic...........................................................................................519
9.10(0.0)
17
mac learning-limit mac-address-sticky......................................................................520
mac learning-limit station-move..................................................................................520
mac learning-limit no-station-move...........................................................................520
Learning Limit Violation Actions....................................................................................521
Setting Station Move Violation Actions........................................................................521
Recovering from Learning Limit and Station Move Violations............................... 522
Disabling MAC Address Learning on the System.......................................................522
NIC Teaming........................................................................................................................... 523
Configure Redundant Pairs..................................................................................................524
Important Points about Configuring Redundant Pairs.............................................526
Far-End Failure Detection.................................................................................................... 527
FEFD State Changes.........................................................................................................528
Configuring FEFD.............................................................................................................530
Enabling FEFD on an Interface.......................................................................................531
Debugging FEFD...............................................................................................................532
28 Link Layer Discovery Protocol (LLDP)............................................................................ 533
802.1AB (LLDP) Overview.....................................................................................................533
Protocol Data Units..........................................................................................................533
Optional TLVs..........................................................................................................................534
Management TLVs............................................................................................................535
TIA-1057 (LLDP-MED) Overview.........................................................................................537
TIA Organizationally Specific TLVs............................................................................... 537
Configure LLDP...................................................................................................................... 542
Related Configuration Tasks..........................................................................................542
Important Points to Remember.................................................................................... 542
LLDP Compatibility.......................................................................................................... 542
CONFIGURATION versus INTERFACE Configurations...................................................542
Enabling LLDP.........................................................................................................................543
Disabling and Undoing LLDP.........................................................................................543
Enabling LLDP on Management Ports...............................................................................544
Disabling and Undoing LLDP on Management Ports...............................................544
Advertising TLVs..................................................................................................................... 544
Viewing the LLDP Configuration........................................................................................ 546
Viewing Information Advertised by Adjacent LLDP Agents.......................................... 546
Configuring LLDPDU Intervals.............................................................................................547
Configuring Transmit and Receive Mode.........................................................................548
Configuring the Time to Live Value................................................................................... 549
Debugging LLDP.................................................................................................................... 550
Relevant Management Objects........................................................................................... 551
29 Microsoft Network Load Balancing................................................................................557
9.10(0.0)
18
NLB Unicast Mode Scenario................................................................................................ 557
NLB Multicast Mode Scenario............................................................................................. 558
Limitations of the NLB Feature............................................................................................558
Microsoft Clustering..............................................................................................................558
Enable and Disable VLAN Flooding ...................................................................................559
Configuring a Switch for NLB .............................................................................................559
Enabling a Switch for Multicast NLB............................................................................ 559
30 Multicast Source Discovery Protocol (MSDP)...............................................................561
Protocol Overview................................................................................................................. 561
Anycast RP...............................................................................................................................564
Implementation Information...............................................................................................564
Configure Multicast Source Discovery Protocol.............................................................564
Related Configuration Tasks..........................................................................................565
Enable MSDP...........................................................................................................................569
Manage the Source-Active Cache......................................................................................570
Viewing the Source-Active Cache................................................................................570
Limiting the Source-Active Cache................................................................................ 571
Clearing the Source-Active Cache................................................................................571
Enabling the Rejected Source-Active Cache..............................................................571
Accept Source-Active Messages that Fail the RFP Check............................................. 572
Specifying Source-Active Messages...................................................................................575
Limiting the Source-Active Messages from a Peer.........................................................576
Preventing MSDP from Caching a Local Source.............................................................576
Preventing MSDP from Caching a Remote Source.........................................................577
Preventing MSDP from Advertising a Local Source........................................................578
Logging Changes in Peership States..................................................................................579
Terminating a Peership......................................................................................................... 579
Clearing Peer Statistics......................................................................................................... 580
Debugging MSDP...................................................................................................................580
MSDP with Anycast RP.......................................................................................................... 581
Configuring Anycast RP........................................................................................................582
Reducing Source-Active Message Flooding...............................................................583
Specifying the RP Address Used in SA Messages...................................................... 583
MSDP Sample Configurations............................................................................................. 586
31 Multiple Spanning Tree Protocol (MSTP).......................................................................589
Protocol Overview.................................................................................................................589
Spanning Tree Variations...................................................................................................... 591
Implementation Information..........................................................................................591
Configure Multiple Spanning Tree Protocol.....................................................................591
Related Configuration Tasks.......................................................................................... 591
9.10(0.0)
19
Enable Multiple Spanning Tree Globally........................................................................... 592
Adding and Removing Interfaces........................................................................................592
Creating Multiple Spanning Tree Instances......................................................................593
Influencing MSTP Root Selection.......................................................................................594
Interoperate with Non-Dell Bridges...................................................................................595
Changing the Region Name or Revision...........................................................................595
Modifying Global Parameters..............................................................................................596
Modifying the Interface Parameters...................................................................................597
Configuring an EdgePort......................................................................................................598
Flush MAC Addresses after a Topology Change.............................................................599
MSTP Sample Configurations............................................................................................. 600
Router 1 Running-ConfigurationRouter 2 Running-ConfigurationRouter 3
Running-ConfigurationSFTOS Example Running-Configuration......................... 600
Debugging and Verifying MSTP Configurations..............................................................603
32 Multicast Features..............................................................................................................606
Enabling IP Multicast.............................................................................................................606
Implementation Information...............................................................................................606
Multicast Policies....................................................................................................................607
IPv4 Multicast Policies.....................................................................................................607
33 Object Tracking.................................................................................................................. 615
Object Tracking Overview....................................................................................................615
Track Layer 2 Interfaces.................................................................................................. 616
Track Layer 3 Interfaces.................................................................................................. 617
Track IPv4 and IPv6 Routes............................................................................................ 617
Set Tracking Delays..........................................................................................................618
VRRP Object Tracking..................................................................................................... 618
Object Tracking Configuration............................................................................................619
Tracking a Layer 2 Interface...........................................................................................619
Tracking a Layer 3 Interface.......................................................................................... 620
Track an IPv4/IPv6 Route............................................................................................... 622
Displaying Tracked Objects................................................................................................. 626
34 Open Shortest Path First (OSPFv2 and OSPFv3).......................................................... 628
Protocol Overview.................................................................................................................628
Autonomous System (AS) Areas....................................................................................629
Area Types......................................................................................................................... 630
Networks and Neighbors................................................................................................630
Router Types.....................................................................................................................630
Designated and Backup Designated Routers.............................................................632
Link-State Advertisements (LSAs)..................................................................................633
9.10(0.0)
20
/