Dell PowerSwitch S6000 ON Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S6000 ON Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Configuration Guide for the S6000 ON
System
9.13.0.0
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other
trademarks may be trademarks of their respective owners.
2017 - 12
Rev. A00
Contents
1 About this Guide...........................................................................................................................................35
Audience........................................................................................................................................................................... 35
Conventions......................................................................................................................................................................35
Related Documents......................................................................................................................................................... 35
2 Conguration Fundamentals........................................................................................................................ 36
Accessing the Command Line........................................................................................................................................36
CLI Modes.........................................................................................................................................................................36
Navigating CLI Modes............................................................................................................................................... 38
The do Command............................................................................................................................................................. 41
Undoing Commands.........................................................................................................................................................41
Obtaining Help..................................................................................................................................................................42
Entering and Editing Commands....................................................................................................................................42
Command History............................................................................................................................................................ 43
Filtering show Command Outputs.................................................................................................................................43
Example of the grep Keyword.................................................................................................................................. 43
Multiple Users in Conguration Mode...........................................................................................................................44
3 Getting Started............................................................................................................................................45
Console Access................................................................................................................................................................46
Serial Console.............................................................................................................................................................46
Default Conguration.......................................................................................................................................................47
Conguring a Host Name................................................................................................................................................47
Accessing the System Remotely....................................................................................................................................47
Accessing the System Remotely..............................................................................................................................48
Congure the Management Port IP Address......................................................................................................... 48
Congure a Management Route..............................................................................................................................48
Conguring a Username and Password..................................................................................................................48
Conguring the Enable Password..................................................................................................................................49
Conguration File Management.....................................................................................................................................50
Copy Files to and from the System.........................................................................................................................50
Mounting an NFS File System...................................................................................................................................51
Save the Running-Conguration..............................................................................................................................52
Congure the Overload Bit for a Startup Scenario............................................................................................... 53
Viewing Files...............................................................................................................................................................53
Managing the File System.............................................................................................................................................. 54
View Command History.................................................................................................................................................. 54
Upgrading Dell EMC Networking OS............................................................................................................................ 55
Using HTTP for File Transfers........................................................................................................................................55
Verify Software Images Before Installation...................................................................................................................56
4 Management................................................................................................................................................57
Contents
3
Conguring Privilege Levels............................................................................................................................................57
Creating a Custom Privilege Level...........................................................................................................................58
Removing a Command from EXEC Mode.............................................................................................................. 58
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................58
Allowing Access to CONFIGURATION Mode Commands....................................................................................58
Allowing Access to Dierent Modes........................................................................................................................58
Applying a Privilege Level to a Username...............................................................................................................60
Applying a Privilege Level to a Terminal Line.......................................................................................................... 60
Conguring Logging........................................................................................................................................................ 60
Audit and Security Logs.............................................................................................................................................61
Conguring Logging Format ...................................................................................................................................62
Setting Up a Secure Connection to a Syslog Server.............................................................................................62
Log Messages in the Internal Buer..............................................................................................................................64
Conguration Task List for System Log Management.......................................................................................... 64
Disabling System Logging............................................................................................................................................... 64
Sending System Messages to a Syslog Server............................................................................................................64
Conguring a UNIX System as a Syslog Server.....................................................................................................64
Track Login Activity......................................................................................................................................................... 65
Restrictions for Tracking Login Activity.................................................................................................................. 65
Conguring Login Activity Tracking.........................................................................................................................65
Display Login Statistics..............................................................................................................................................66
Limit Concurrent Login Sessions....................................................................................................................................67
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................67
Conguring Concurrent Session Limit.....................................................................................................................67
Enabling the System to Clear Existing Sessions.................................................................................................... 68
Enabling Secured CLI Mode........................................................................................................................................... 69
Changing System Logging Settings.............................................................................................................................. 69
Display the Logging Buer and the Logging Conguration........................................................................................ 70
Conguring a UNIX Logging Facility Level....................................................................................................................70
Synchronizing Log Messages..........................................................................................................................................71
Enabling Timestamp on Syslog Messages.................................................................................................................... 72
File Transfer Services.......................................................................................................................................................72
Conguration Task List for File Transfer Services..................................................................................................73
Enabling the FTP Server........................................................................................................................................... 73
Conguring FTP Server Parameters........................................................................................................................73
Conguring FTP Client Parameters......................................................................................................................... 74
Terminal Lines................................................................................................................................................................... 74
Denying and Permitting Access to a Terminal Line................................................................................................ 74
Conguring Login Authentication for Terminal Lines.............................................................................................75
Setting Timeout for EXEC Privilege Mode................................................................................................................... 76
Using Telnet to get to Another Network Device.......................................................................................................... 77
Lock CONFIGURATION Mode....................................................................................................................................... 77
Viewing the Conguration Lock Status................................................................................................................... 77
Reloading the system...................................................................................................................................................... 78
Restoring the Factory Default Settings.........................................................................................................................79
4
Contents
Important Points to Remember................................................................................................................................79
Restoring Factory Default Environment Variables................................................................................................. 79
Viewing the Reason for Last System Reboot............................................................................................................... 81
5 802.1X..........................................................................................................................................................82
Port-Authentication Process.......................................................................................................................................... 84
EAP over RADIUS......................................................................................................................................................84
Conguring 802.1X...........................................................................................................................................................85
Related Conguration Tasks..................................................................................................................................... 85
Important Points to Remember......................................................................................................................................85
Enabling 802.1X................................................................................................................................................................ 86
Conguring dot1x Prole ................................................................................................................................................ 87
Conguring MAC addresses for a do1x Prole.............................................................................................................88
Conguring the Static MAB and MAB Prole .............................................................................................................88
Conguring Critical VLAN ..............................................................................................................................................89
Conguring Request Identity Re-Transmissions...........................................................................................................90
Conguring a Quiet Period after a Failed Authentication..................................................................................... 90
Forcibly Authorizing or Unauthorizing a Port................................................................................................................91
Re-Authenticating a Port................................................................................................................................................92
Conguring Timeouts...................................................................................................................................................... 93
Conguring Dynamic VLAN Assignment with Port Authentication...........................................................................94
Guest and Authentication-Fail VLANs.......................................................................................................................... 95
Conguring a Guest VLAN....................................................................................................................................... 95
Conguring an Authentication-Fail VLAN...............................................................................................................95
6 Access Control Lists (ACLs).........................................................................................................................97
IP Access Control Lists (ACLs)...................................................................................................................................... 98
CAM Usage................................................................................................................................................................ 99
Implementing ACLs on Dell EMC Networking OS................................................................................................. 99
Congure ACL Range Proles................................................................................................................................. 101
Important Points to Remember.................................................................................................................................... 102
Conguration Task List for Route Maps................................................................................................................ 102
Conguring Match Routes...................................................................................................................................... 104
Conguring Set Conditions.....................................................................................................................................105
Congure a Route Map for Route Redistribution.................................................................................................106
Congure a Route Map for Route Tagging............................................................................................................107
Continue Clause........................................................................................................................................................107
IP Fragment Handling.....................................................................................................................................................107
IP Fragments ACL Examples...................................................................................................................................108
Layer 4 ACL Rules Examples...................................................................................................................................108
Congure a Standard IP ACL........................................................................................................................................109
Conguring a Standard IP ACL Filter......................................................................................................................110
Congure an Extended IP ACL.......................................................................................................................................111
Conguring Filters with a Sequence Number.........................................................................................................111
Conguring Filters Without a Sequence Number................................................................................................. 114
Congure Layer 2 and Layer 3 ACLs............................................................................................................................ 114
Contents
5
Assign an IP ACL to an Interface...................................................................................................................................115
Applying an IP ACL..........................................................................................................................................................115
Counting ACL Hits.................................................................................................................................................... 116
Congure Ingress ACLs.................................................................................................................................................. 116
Congure Egress ACLs...................................................................................................................................................117
Applying Egress Layer 3 ACLs (Control-Plane)..................................................................................................... 117
IP Prex Lists...................................................................................................................................................................118
Implementation Information..................................................................................................................................... 118
Conguration Task List for Prex Lists...................................................................................................................119
ACL Resequencing......................................................................................................................................................... 122
Resequencing an ACL or Prex List.......................................................................................................................123
Route Maps..................................................................................................................................................................... 124
Implementation Information.....................................................................................................................................124
Flow-Based Monitoring..................................................................................................................................................124
Behavior of Flow-Based Monitoring.......................................................................................................................124
Enabling Flow-Based Monitoring............................................................................................................................126
Conguring IP Mirror Access Group.............................................................................................................................127
Sample Conguration...............................................................................................................................................128
Example of viewing IP mirror–access–group applied to an Interface................................................................128
7 Bidirectional Forwarding Detection (BFD).................................................................................................. 129
How BFD Works............................................................................................................................................................. 129
BFD Packet Format..................................................................................................................................................130
BFD Sessions............................................................................................................................................................. 131
BFD Three-Way Handshake.................................................................................................................................... 132
Session State Changes............................................................................................................................................134
Important Points to Remember.................................................................................................................................... 134
Congure BFD................................................................................................................................................................ 134
Congure BFD for Physical Ports...........................................................................................................................135
Congure BFD for Static Routes............................................................................................................................137
Congure BFD for OSPF.........................................................................................................................................139
Congure BFD for OSPFv3.....................................................................................................................................143
Congure BFD for IS-IS...........................................................................................................................................146
Congure BFD for BGP........................................................................................................................................... 148
Congure BFD for VRRP.........................................................................................................................................156
Conguring Protocol Liveness................................................................................................................................158
8 Border Gateway Protocol IPv4 (BGPv4).................................................................................................... 159
Autonomous Systems (AS)...........................................................................................................................................159
Sessions and Peers......................................................................................................................................................... 161
Establish a Session....................................................................................................................................................161
Route Reectors.............................................................................................................................................................162
BGP Attributes................................................................................................................................................................163
Best Path Selection Criteria....................................................................................................................................163
Weight........................................................................................................................................................................165
Local Preference.......................................................................................................................................................165
6
Contents
Multi-Exit Discriminators (MEDs)...........................................................................................................................166
Origin..........................................................................................................................................................................167
AS Path......................................................................................................................................................................168
Next Hop................................................................................................................................................................... 168
Multiprotocol BGP..........................................................................................................................................................168
Implement BGP with Dell EMC Networking OS.........................................................................................................169
Additional Path (Add-Path) Support......................................................................................................................169
Advertise IGP Cost as MED for Redistributed Routes........................................................................................ 169
Ignore Router-ID in Best-Path Calculation............................................................................................................ 170
Four-Byte AS Numbers............................................................................................................................................170
AS4 Number Representation.................................................................................................................................. 170
AS Number Migration...............................................................................................................................................172
BGP4 Management Information Base (MIB)........................................................................................................173
Important Points to Remember.............................................................................................................................. 173
Conguration Information..............................................................................................................................................174
BGP Conguration..........................................................................................................................................................174
Enabling BGP............................................................................................................................................................ 175
Conguring AS4 Number Representations........................................................................................................... 178
Conguring Peer Groups.........................................................................................................................................180
Conguring BGP Fast Fall-Over............................................................................................................................. 182
Conguring Passive Peering................................................................................................................................... 184
Maintaining Existing AS Numbers During an AS Migration................................................................................. 184
Allowing an AS Number to Appear in its Own AS Path.......................................................................................185
Enabling Graceful Restart........................................................................................................................................186
Enabling Neighbor Graceful Restart.......................................................................................................................187
Filtering on an AS-Path Attribute............................................................................................................................187
Regular Expressions as Filters.................................................................................................................................189
Redistributing Routes.............................................................................................................................................. 190
Enabling Additional Paths.........................................................................................................................................191
Conguring IP Community Lists..............................................................................................................................191
Conguring an IP Extended Community List........................................................................................................192
Filtering Routes with Community Lists..................................................................................................................193
Manipulating the COMMUNITY Attribute.............................................................................................................194
Changing MED Attributes....................................................................................................................................... 195
Changing the LOCAL_PREFERENCE Attribute.................................................................................................. 195
Conguring the local System or a Dierent System to be the Next Hop for BGP-Learned Routes............. 196
Changing the WEIGHT Attribute............................................................................................................................197
Enabling Multipath....................................................................................................................................................197
Filtering BGP Routes................................................................................................................................................197
Filtering BGP Routes Using Route Maps.............................................................................................................. 199
Filtering BGP Routes Using AS-PATH Information.............................................................................................. 199
Conguring BGP Route Reectors....................................................................................................................... 200
Aggregating Routes..................................................................................................................................................201
Conguring BGP Confederations........................................................................................................................... 201
Enabling Route Flap Dampening............................................................................................................................ 202
Contents
7
Changing BGP Timers.............................................................................................................................................204
Enabling BGP Neighbor Soft-Reconguration.....................................................................................................204
Enabling or disabling BGP neighbors.....................................................................................................................205
Route Map Continue............................................................................................................................................... 207
Enabling MBGP Congurations....................................................................................................................................207
Congure IPv6 NH Automatically for IPv6 Prex Advertised over IPv4 Neighbor......................................... 208
BGP Regular Expression Optimization........................................................................................................................208
Debugging BGP............................................................................................................................................................. 208
Storing Last and Bad PDUs....................................................................................................................................209
Capturing PDUs........................................................................................................................................................210
PDU Counters............................................................................................................................................................211
Sample Congurations....................................................................................................................................................211
9 Content Addressable Memory (CAM).........................................................................................................218
CAM Allocation............................................................................................................................................................... 218
Test CAM Usage............................................................................................................................................................220
View CAM Proles.........................................................................................................................................................220
View CAM-ACL Settings............................................................................................................................................... 221
View CAM Usage...........................................................................................................................................................222
Conguring CAM Threshold and Silence Period........................................................................................................223
Setting CAM Threshold and Silence Period......................................................................................................... 223
CAM Optimization......................................................................................................................................................... 224
Troubleshoot CAM Proling..........................................................................................................................................224
QoS CAM Region Limitation...................................................................................................................................224
Syslog Error When the Table is Full....................................................................................................................... 225
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................225
Syslog Warning for Discrepancies Between Congured Extended Prexes....................................................225
Unied Forwarding Table (UFT) Modes......................................................................................................................225
Conguring UFT Modes......................................................................................................................................... 225
10 Control Plane Policing (CoPP)..................................................................................................................227
Congure Control Plane Policing................................................................................................................................. 228
Conguring CoPP for Protocols............................................................................................................................ 229
Conguring CoPP for CPU Queues....................................................................................................................... 231
Displaying CoPP Conguration ............................................................................................................................. 232
11 Data Center Bridging (DCB)......................................................................................................................234
Ethernet Enhancements in Data Center Bridging..................................................................................................... 234
Priority-Based Flow Control................................................................................................................................... 235
Enhanced Transmission Selection..........................................................................................................................236
Data Center Bridging Exchange Protocol (DCBx)............................................................................................... 237
Data Center Bridging in a Trac Flow...................................................................................................................238
Enabling Data Center Bridging..................................................................................................................................... 238
DCB Maps and its Attributes..................................................................................................................................239
Data Center Bridging: Default Conguration..............................................................................................................240
Conguring Priority-Based Flow Control....................................................................................................................240
8
Contents
Conguring Lossless Queues.................................................................................................................................. 241
Conguring PFC in a DCB Map................................................................................................................................... 243
PFC Conguration Notes........................................................................................................................................243
PFC Prerequisites and Restrictions....................................................................................................................... 244
Applying a DCB Map on a Port.................................................................................................................................... 244
Conguring PFC without a DCB Map.........................................................................................................................245
Conguring Lossless QueuesExample:..................................................................................................................245
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................246
Pause and Resume of Trac..................................................................................................................................246
Buer Sizes for Lossless or PFC Packets.............................................................................................................247
Behavior of Tagged Packets......................................................................................................................................... 247
Conguration Example for DSCP and PFC Priorities................................................................................................248
SNMP Support for PFC and Buer Statistics Tracking............................................................................................248
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................249
PFC and ETS Conguration Examples....................................................................................................................... 250
Using PFC to Manage Converged Ethernet Trac.................................................................................................. 250
Operations on Untagged Packets................................................................................................................................250
Generation of PFC for a Priority for Untagged Packets...........................................................................................250
Congure Enhanced Transmission Selection............................................................................................................. 250
ETS Prerequisites and Restrictions........................................................................................................................ 251
Creating an ETS Priority Group.............................................................................................................................. 251
ETS Operation with DCBx......................................................................................................................................252
Conguring Bandwidth Allocation for DCBx CIN.................................................................................................252
Conguring ETS in a DCB Map..............................................................................................................................253
Hierarchical Scheduling in ETS Output Policies.........................................................................................................254
Using ETS to Manage Converged Ethernet Trac...................................................................................................255
Applying DCB Policies in a Switch Stack....................................................................................................................255
Congure a DCBx Operation........................................................................................................................................255
DCBx Operation.......................................................................................................................................................256
DCBx Port Roles......................................................................................................................................................256
DCB Conguration Exchange.................................................................................................................................257
Conguration Source Election............................................................................................................................... 258
Propagation of DCB Information........................................................................................................................... 258
Auto-Detection and Manual Conguration of the DCBx Version...................................................................... 258
DCBx Example......................................................................................................................................................... 259
DCBx Prerequisites and Restrictions.....................................................................................................................259
Conguring DCBx....................................................................................................................................................260
Verifying the DCB Conguration................................................................................................................................. 263
QoS dot1p Trac Classication and Queue Assignment.......................................................................................... 272
Conguring the Dynamic Buer Method....................................................................................................................272
Sample DCB Conguration........................................................................................................................................... 273
PFC and ETS Conguration Command Examples...............................................................................................275
12 Dynamic Host Conguration Protocol (DHCP)......................................................................................... 276
DHCP Packet Format and Options..............................................................................................................................276
Assign an IP Address using DHCP............................................................................................................................... 278
Contents
9
Implementation Information..........................................................................................................................................279
Congure the System to be a DHCP Server..............................................................................................................279
Conguring the Server for Automatic Address Allocation..................................................................................280
Specifying a Default Gateway.................................................................................................................................281
Congure a Method of Hostname Resolution...................................................................................................... 281
Using DNS for Address Resolution.........................................................................................................................281
Using NetBIOS WINS for Address Resolution......................................................................................................282
Creating Manual Binding Entries............................................................................................................................282
Debugging the DHCP Server................................................................................................................................. 282
Using DHCP Clear Commands...............................................................................................................................283
Congure the System to be a DHCP Client............................................................................................................... 283
Conguring the DHCP Client System................................................................................................................... 283
DHCP Client on a Management Interface............................................................................................................285
DHCP Client Operation with Other Features.......................................................................................................285
Congure the System for User Port Stacking (Option 230)....................................................................................286
Congure Secure DHCP...............................................................................................................................................286
Option 82.................................................................................................................................................................. 287
DHCP Snooping....................................................................................................................................................... 287
Drop DHCP Packets on Snooped VLANs Only....................................................................................................292
Dynamic ARP Inspection.........................................................................................................................................292
Conguring Dynamic ARP Inspection................................................................................................................... 293
Source Address Validation............................................................................................................................................ 294
Enabling IP Source Address Validation..................................................................................................................294
DHCP MAC Source Address Validation................................................................................................................ 295
Enabling IP+MAC Source Address Validation.......................................................................................................295
Viewing the Number of SAV Dropped Packets................................................................................................... 296
Clearing the Number of SAV Dropped Packets...................................................................................................296
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 297
ECMP for Flow-Based Anity..................................................................................................................................... 297
Conguring the Hash Algorithm.............................................................................................................................297
Enabling Deterministic ECMP Next Hop...............................................................................................................297
Conguring the Hash Algorithm Seed.................................................................................................................. 298
Link Bundle Monitoring................................................................................................................................................. 298
Managing ECMP Group Paths...............................................................................................................................299
Creating an ECMP Group Bundle..........................................................................................................................299
Modifying the ECMP Group Threshold................................................................................................................ 299
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................300
Support for ECMP in host table.............................................................................................................................301
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes .........................................................................301
14 FIP Snooping............................................................................................................................................302
Fibre Channel over Ethernet........................................................................................................................................ 302
Ensure Robustness in a Converged Ethernet Network............................................................................................302
FIP Snooping on Ethernet Bridges..............................................................................................................................304
Using FIP Snooping....................................................................................................................................................... 306
10
Contents
FIP Snooping Prerequisites.....................................................................................................................................306
Important Points to Remember............................................................................................................................. 306
Enabling the FCoE Transit Feature........................................................................................................................ 307
Enable FIP Snooping on VLANs.............................................................................................................................307
Congure the FC-MAP Value................................................................................................................................ 308
Congure a Port for a Bridge-to-Bridge Link.......................................................................................................308
Congure a Port for a Bridge-to-FCF Link...........................................................................................................308
Impact on Other Software Features..................................................................................................................... 308
FIP Snooping Restrictions...................................................................................................................................... 309
Conguring FIP Snooping.......................................................................................................................................309
Displaying FIP Snooping Information............................................................................................................................310
FCoE Transit Conguration Example........................................................................................................................... 315
15 Flex Hash and Optimized Boot-Up............................................................................................................ 317
Flex Hash Capability Overview......................................................................................................................................317
Conguring the Flex Hash Mechanism........................................................................................................................317
Conguring Fast Boot and LACP Fast Switchover....................................................................................................318
Optimizing the Boot Time..............................................................................................................................................318
Booting Process When Optimized Boot Time Mechanism is Enabled...............................................................318
Guidelines for Conguring Optimized Booting Mechanism.................................................................................319
Interoperation of Applications with Fast Boot and System States..........................................................................320
LACP and IPv4 Routing.......................................................................................................................................... 320
LACP and IPv6 Routing.......................................................................................................................................... 320
BGP Graceful Restart.............................................................................................................................................. 321
Cold Boot Caused by Power Cycling the System................................................................................................ 321
Unexpected Reload of the System.........................................................................................................................321
Software Upgrade.................................................................................................................................................... 321
LACP Fast Switchover.............................................................................................................................................321
Changes to BGP Multipath.....................................................................................................................................322
Delayed Installation of ECMP Routes Into BGP...................................................................................................322
RDMA Over Converged Ethernet (RoCE) Overview................................................................................................322
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...................................................................................... 323
16 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 324
Protocol Overview......................................................................................................................................................... 324
Ring Status............................................................................................................................................................... 325
Multiple FRRP Rings............................................................................................................................................... 325
Important FRRP Points...........................................................................................................................................326
Important FRRP Concepts..................................................................................................................................... 327
Implementing FRRP.......................................................................................................................................................328
FRRP Conguration.......................................................................................................................................................328
Creating the FRRP Group.......................................................................................................................................328
Conguring the Control VLAN...............................................................................................................................329
Conguring and Adding the Member VLANs.......................................................................................................330
Setting the FRRP Timers.........................................................................................................................................331
Clearing the FRRP Counters...................................................................................................................................331
Contents
11
Viewing the FRRP Conguration............................................................................................................................331
Viewing the FRRP Information............................................................................................................................... 331
Troubleshooting FRRP.................................................................................................................................................. 332
Conguration Checks..............................................................................................................................................332
Sample Conguration and Topology............................................................................................................................332
FRRP Support on VLT...................................................................................................................................................333
Example Scenario.................................................................................................................................................... 334
Important Points to Remember............................................................................................................................. 335
17 GARP VLAN Registration Protocol (GVRP)..............................................................................................336
Important Points to Remember................................................................................................................................... 336
Congure GVRP.............................................................................................................................................................337
Related Conguration Tasks................................................................................................................................... 337
Enabling GVRP Globally................................................................................................................................................ 338
Enabling GVRP on a Layer 2 Interface........................................................................................................................338
Congure GVRP Registration...................................................................................................................................... 338
Congure a GARP Timer.............................................................................................................................................. 339
18 Internet Group Management Protocol (IGMP)......................................................................................... 340
IGMP Implementation Information.............................................................................................................................. 340
IGMP Protocol Overview..............................................................................................................................................340
IGMP Version 2........................................................................................................................................................ 340
IGMP Version 3........................................................................................................................................................ 342
Congure IGMP............................................................................................................................................................. 345
Related Conguration Tasks...................................................................................................................................345
Viewing IGMP Enabled Interfaces............................................................................................................................... 346
Selecting an IGMP Version...........................................................................................................................................346
Viewing IGMP Groups...................................................................................................................................................346
Adjusting Timers.............................................................................................................................................................347
Adjusting Query and Response Timers................................................................................................................. 347
Enabling IGMP Immediate-Leave.................................................................................................................................348
IGMP Snooping..............................................................................................................................................................348
IGMP Snooping Implementation Information....................................................................................................... 348
Conguring IGMP Snooping...................................................................................................................................348
Removing a Group-Port Association.....................................................................................................................349
Disabling Multicast Flooding...................................................................................................................................349
Specifying a Port as Connected to a Multicast Router...................................................................................... 349
Conguring the Switch as Querier........................................................................................................................ 350
Fast Convergence after MSTP Topology Changes...................................................................................................350
Egress Interface Selection (EIS) for HTTP and IGMP Applications.........................................................................351
Protocol Separation..................................................................................................................................................351
Enabling and Disabling Management Egress Interface Selection...................................................................... 352
Handling of Management Route Conguration................................................................................................... 353
Handling of Switch-Initiated Trac....................................................................................................................... 353
Handling of Switch-Destined Trac......................................................................................................................354
Handling of Transit Trac (Trac Separation).................................................................................................... 355
12
Contents
Mapping of Management Applications and Trac Type.....................................................................................355
Behavior of Various Applications for Switch-Initiated Trac ............................................................................356
Behavior of Various Applications for Switch-Destined Trac ...........................................................................357
Interworking of EIS With Various Applications.....................................................................................................358
Designating a Multicast Router Interface...................................................................................................................358
19 Interfaces.................................................................................................................................................359
Basic Interface Conguration.......................................................................................................................................359
Advanced Interface Conguration...............................................................................................................................359
Interface Types...............................................................................................................................................................360
View Basic Interface Information.................................................................................................................................360
Resetting an Interface to its Factory Default State...................................................................................................362
Enabling a Physical Interface........................................................................................................................................363
Physical Interfaces.........................................................................................................................................................363
Conguration Task List for Physical Interfaces....................................................................................................363
40G to 1G Breakout Cable Adaptor....................................................................................................................... 363
Overview of Layer Modes...................................................................................................................................... 364
Conguring Layer 2 (Data Link) Mode..................................................................................................................365
Conguring Layer 2 (Interface) Mode.................................................................................................................. 365
Conguring Layer 3 (Network) Mode...................................................................................................................365
Conguring Layer 3 (Interface) Mode.................................................................................................................. 366
Egress Interface Selection (EIS).................................................................................................................................. 367
Important Points to Remember..............................................................................................................................367
Conguring EIS........................................................................................................................................................ 367
Management Interfaces................................................................................................................................................367
Conguring Management Interfaces.....................................................................................................................367
Conguring a Management Interface on an Ethernet Port............................................................................... 369
VLAN Interfaces.............................................................................................................................................................370
Loopback Interfaces.......................................................................................................................................................371
Null Interfaces................................................................................................................................................................. 371
Port Channel Interfaces.................................................................................................................................................371
Port Channel Denition and Standards................................................................................................................. 372
Port Channel Benets............................................................................................................................................. 372
Port Channel Implementation.................................................................................................................................372
Interfaces in Port Channels.....................................................................................................................................373
Conguration Tasks for Port Channel Interfaces................................................................................................. 373
Creating a Port Channel..........................................................................................................................................373
Adding a Physical Interface to a Port Channel..................................................................................................... 374
Reassigning an Interface to a New Port Channel................................................................................................ 375
Conguring the Minimum Oper Up Links in a Port Channel...............................................................................376
Adding or Removing a Port Channel from a VLAN..............................................................................................376
Assigning an IP Address to a Port Channel...........................................................................................................377
Deleting or Disabling a Port Channel..................................................................................................................... 378
Load Balancing Through Port Channels................................................................................................................378
Changing the Hash Algorithm................................................................................................................................ 378
Bulk Conguration..........................................................................................................................................................379
Contents
13
Interface Range........................................................................................................................................................379
Bulk Conguration Examples..................................................................................................................................380
Dening Interface Range Macros................................................................................................................................. 381
Dene the Interface Range.................................................................................................................................... 382
Choosing an Interface-Range Macro.................................................................................................................... 382
Monitoring and Maintaining Interfaces........................................................................................................................382
Maintenance Using TDR......................................................................................................................................... 383
Non Dell-Qualied Transceivers................................................................................................................................... 384
Splitting 40G Ports without Reload.............................................................................................................................384
Splitting QSFP Ports to SFP+ Ports........................................................................................................................... 386
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port.................................................................................. 387
Important Points to Remember..............................................................................................................................387
Example Scenarios...................................................................................................................................................388
Conguring wavelength for 10–Gigabit SFP+ optics................................................................................................389
Link Dampening..............................................................................................................................................................389
Important Points to Remember............................................................................................................................. 390
Conguration Example of Link Dampening.......................................................................................................... 390
Enabling Link Dampening........................................................................................................................................392
Link Bundle Monitoring................................................................................................................................................. 393
Using Ethernet Pause Frames for Flow Control........................................................................................................ 394
Enabling Pause Frames........................................................................................................................................... 394
Congure the MTU Size on an Interface....................................................................................................................395
Port-Pipes.......................................................................................................................................................................396
Auto-Negotiation on Ethernet Interfaces...................................................................................................................396
Setting the Speed of Ethernet Interfaces............................................................................................................396
Set Auto-Negotiation Options................................................................................................................................397
View Advanced Interface Information.........................................................................................................................398
Conguring the Interface Sampling Size.............................................................................................................. 399
Dynamic Counters......................................................................................................................................................... 400
Clearing Interface Counters................................................................................................................................... 400
Compressing Conguration Files..................................................................................................................................401
20 IPv4 Routing............................................................................................................................................405
IP Addresses...................................................................................................................................................................406
Implementation Information................................................................................................................................... 406
Conguration Tasks for IP Addresses......................................................................................................................... 406
Assigning IP Addresses to an Interface.......................................................................................................................406
Conguring Static Routes.............................................................................................................................................407
Congure Static Routes for the Management Interface..........................................................................................408
Using the Congured Source IP Address in ICMP Messages..................................................................................409
Conguring the ICMP Source Interface............................................................................................................... 409
Conguring the Duration to Establish a TCP Connection........................................................................................ 409
Enabling Directed Broadcast.........................................................................................................................................410
Resolution of Host Names............................................................................................................................................ 410
Enabling Dynamic Resolution of Host Names.............................................................................................................410
Specifying the Local System Domain and a List of Domains.....................................................................................411
14
Contents
Conguring DNS with Traceroute................................................................................................................................. 411
ARP.................................................................................................................................................................................. 412
Conguration Tasks for ARP......................................................................................................................................... 412
Conguring Static ARP Entries.....................................................................................................................................412
Enabling Proxy ARP........................................................................................................................................................413
Clearing ARP Cache.......................................................................................................................................................413
ARP Learning via Gratuitous ARP................................................................................................................................ 413
Enabling ARP Learning via Gratuitous ARP.................................................................................................................414
ARP Learning via ARP Request....................................................................................................................................414
Conguring ARP Retries................................................................................................................................................415
ICMP................................................................................................................................................................................ 415
Conguration Tasks for ICMP.......................................................................................................................................415
Enabling ICMP Unreachable Messages.......................................................................................................................415
UDP Helper..................................................................................................................................................................... 416
Congure UDP Helper............................................................................................................................................. 416
Important Points to Remember.............................................................................................................................. 416
Enabling UDP Helper......................................................................................................................................................416
Conguring a Broadcast Address.................................................................................................................................416
Congurations Using UDP Helper................................................................................................................................ 417
UDP Helper with Broadcast-All Addresses..................................................................................................................417
UDP Helper with Subnet Broadcast Addresses......................................................................................................... 418
UDP Helper with Congured Broadcast Addresses...................................................................................................418
UDP Helper with No Congured Broadcast Addresses.............................................................................................419
Troubleshooting UDP Helper.........................................................................................................................................419
21 IPv6 Routing............................................................................................................................................ 420
Protocol Overview.........................................................................................................................................................420
Extended Address Space.........................................................................................................................................421
Stateless Autoconguration.................................................................................................................................... 421
IPv6 Headers.............................................................................................................................................................421
Longest Prex Match (LPM) Table and IPv6 /65 – /128 support....................................................................422
IPv6 Header Fields...................................................................................................................................................423
Extension Header Fields..........................................................................................................................................425
Addressing................................................................................................................................................................ 426
Implementing IPv6 with Dell EMC Networking OS................................................................................................... 427
ICMPv6...........................................................................................................................................................................428
Path MTU Discovery.....................................................................................................................................................429
IPv6 Neighbor Discovery.............................................................................................................................................. 429
IPv6 Neighbor Discovery of MTU Packets...........................................................................................................430
Conguring the IPv6 Recursive DNS Server....................................................................................................... 430
Debugging IPv6 RDNSS Information Sent to the Host ......................................................................................431
Displaying IPv6 RDNSS Information.......................................................................................................................431
Secure Shell (SSH) Over an IPv6 Transport.............................................................................................................. 432
Conguration Tasks for IPv6........................................................................................................................................ 432
Adjusting Your CAM-Prole....................................................................................................................................432
Assigning an IPv6 Address to an Interface........................................................................................................... 433
Contents
15
Assigning a Static IPv6 Route................................................................................................................................434
Conguring Telnet with IPv6..................................................................................................................................434
SNMP over IPv6......................................................................................................................................................434
Displaying IPv6 Information....................................................................................................................................435
Displaying an IPv6 Interface Information.............................................................................................................. 435
Showing IPv6 Routes..............................................................................................................................................436
Showing the Running-Conguration for an Interface......................................................................................... 437
Clearing IPv6 Routes...............................................................................................................................................438
Disabling ND Entry Timeout................................................................................................................................... 438
Conguring IPv6 RA Guard.......................................................................................................................................... 438
Conguring IPv6 RA Guard on an Interface.........................................................................................................440
Monitoring IPv6 RA Guard...................................................................................................................................... 441
22 iSCSI Optimization...................................................................................................................................442
iSCSI Optimization Overview....................................................................................................................................... 442
Monitoring iSCSI Trac Flows...............................................................................................................................444
Application of Quality of Service to iSCSI Trac Flows......................................................................................444
Information Monitored in iSCSI Trac Flows.......................................................................................................444
Detection and Auto-Conguration for Dell EqualLogic Arrays........................................................................... 445
Conguring Detection and Ports for Dell Compellent Arrays.............................................................................445
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................446
Enable and Disable iSCSI Optimization................................................................................................................. 446
Default iSCSI Optimization Values............................................................................................................................... 447
iSCSI Optimization Prerequisites..................................................................................................................................447
Conguring iSCSI Optimization....................................................................................................................................447
Displaying iSCSI Optimization Information..................................................................................................................449
23 Intermediate System to Intermediate System........................................................................................... 451
IS-IS Protocol Overview................................................................................................................................................ 451
IS-IS Addressing..............................................................................................................................................................451
Multi-Topology IS-IS...................................................................................................................................................... 452
Transition Mode....................................................................................................................................................... 452
Interface Support.....................................................................................................................................................453
Adjacencies...............................................................................................................................................................453
Graceful Restart.............................................................................................................................................................453
Timers....................................................................................................................................................................... 453
Implementation Information..........................................................................................................................................453
Conguration Information.............................................................................................................................................454
Conguration Tasks for IS-IS................................................................................................................................. 455
Conguring the Distance of a Route.....................................................................................................................462
Changing the IS-Type.............................................................................................................................................. 463
Redistributing IPv4 Routes.....................................................................................................................................465
Redistributing IPv6 Routes.....................................................................................................................................466
Conguring Authentication Passwords................................................................................................................. 467
Setting the Overload Bit......................................................................................................................................... 467
Debugging IS-IS....................................................................................................................................................... 468
16
Contents
IS-IS Metric Styles.........................................................................................................................................................469
Congure Metric Values............................................................................................................................................... 469
Maximum Values in the Routing Table.................................................................................................................. 469
Change the IS-IS Metric Style in One Level Only................................................................................................469
Leaks from One Level to Another...........................................................................................................................471
Sample Congurations.................................................................................................................................................. 472
24 Link Aggregation Control Protocol (LACP)...............................................................................................474
Introduction to Dynamic LAGs and LACP...................................................................................................................474
Important Points to Remember..............................................................................................................................474
LACP Modes............................................................................................................................................................ 475
Conguring LACP Commands............................................................................................................................... 475
LACP Conguration Tasks............................................................................................................................................ 476
Creating a LAG.........................................................................................................................................................476
Conguring the LAG Interfaces as Dynamic........................................................................................................ 476
Setting the LACP Long Timeout............................................................................................................................ 477
Monitoring and Debugging LACP.......................................................................................................................... 477
Shared LAG State Tracking...........................................................................................................................................478
Conguring Shared LAG State Tracking............................................................................................................... 478
Important Points about Shared LAG State Tracking...........................................................................................480
LACP Basic Conguration Example............................................................................................................................ 480
Congure a LAG on ALPHA................................................................................................................................... 480
25 Layer 2.....................................................................................................................................................489
Manage the MAC Address Table................................................................................................................................. 489
Clearing the MAC Address Table........................................................................................................................... 489
Setting the Aging Time for Dynamic Entries........................................................................................................489
Conguring a Static MAC Address........................................................................................................................490
Displaying the MAC Address Table........................................................................................................................490
MAC Learning Limit.......................................................................................................................................................490
Setting the MAC Learning Limit............................................................................................................................. 491
mac learning-limit Dynamic..................................................................................................................................... 491
mac learning-limit mac-address-sticky.................................................................................................................. 491
mac learning-limit station-move.............................................................................................................................492
mac learning-limit no-station-move.......................................................................................................................492
Learning Limit Violation Actions.............................................................................................................................492
Setting Station Move Violation Actions................................................................................................................ 493
Recovering from Learning Limit and Station Move Violations........................................................................... 493
Disabling MAC Address Learning on the System.................................................................................................494
NIC Teaming................................................................................................................................................................... 494
Congure Redundant Pairs.......................................................................................................................................... 495
Important Points about Conguring Redundant Pairs.........................................................................................497
Far-End Failure Detection.............................................................................................................................................498
FEFD State Changes...............................................................................................................................................499
Conguring FEFD....................................................................................................................................................500
Enabling FEFD on an Interface.............................................................................................................................. 500
Contents
17
Debugging FEFD...................................................................................................................................................... 501
26 Link Layer Discovery Protocol (LLDP)..................................................................................................... 503
802.1AB (LLDP) Overview............................................................................................................................................503
Protocol Data Units................................................................................................................................................. 503
Optional TLVs.................................................................................................................................................................504
Management TLVs.................................................................................................................................................. 504
TIA-1057 (LLDP-MED) Overview................................................................................................................................ 506
TIA Organizationally Specic TLVs........................................................................................................................506
Congure LLDP.............................................................................................................................................................. 510
Related Conguration Tasks....................................................................................................................................510
Important Points to Remember.............................................................................................................................. 510
LLDP Compatibility....................................................................................................................................................511
CONFIGURATION versus INTERFACE Congurations..............................................................................................511
Enabling LLDP................................................................................................................................................................. 511
Disabling and Undoing LLDP...................................................................................................................................512
Enabling LLDP on Management Ports.........................................................................................................................512
Disabling and Undoing LLDP on Management Ports...........................................................................................512
Advertising TLVs.............................................................................................................................................................512
Storing and Viewing Unrecognized LLDP TLVs..........................................................................................................514
Reserved Unrecognized LLDP TLVs...................................................................................................................... 514
Organizational Specic Unrecognized LLDP TLVs...............................................................................................514
Viewing Unrecognized LLDP TLVs.........................................................................................................................514
Viewing the LLDP Conguration.................................................................................................................................. 515
Viewing Information Advertised by Adjacent LLDP Neighbors.................................................................................515
Examples of Viewing Information Advertised by Neighbors............................................................................... 515
Conguring LLDPDU Intervals...................................................................................................................................... 517
Conguring Transmit and Receive Mode.................................................................................................................... 518
Conguring the Time to Live Value.............................................................................................................................. 519
Debugging LLDP.............................................................................................................................................................519
Relevant Management Objects................................................................................................................................... 520
27 Microsoft Network Load Balancing.......................................................................................................... 526
NLB Unicast Mode Scenario........................................................................................................................................526
NLB Multicast Mode Scenario.....................................................................................................................................526
Limitations of the NLB Feature.................................................................................................................................... 527
Microsoft Clustering......................................................................................................................................................527
Enable and Disable VLAN Flooding .............................................................................................................................527
Conguring a Switch for NLB ..................................................................................................................................... 527
Enabling a Switch for Multicast NLB.................................................................................................................... 528
28 Multicast Source Discovery Protocol (MSDP)......................................................................................... 529
Protocol Overview.........................................................................................................................................................529
Anycast RP.....................................................................................................................................................................530
Implementation Information.......................................................................................................................................... 531
Congure Multicast Source Discovery Protocol.........................................................................................................531
18
Contents
Related Conguration Tasks....................................................................................................................................531
Enable MSDP.................................................................................................................................................................535
Manage the Source-Active Cache.............................................................................................................................. 536
Viewing the Source-Active Cache.........................................................................................................................536
Limiting the Source-Active Cache.........................................................................................................................536
Clearing the Source-Active Cache........................................................................................................................ 537
Enabling the Rejected Source-Active Cache....................................................................................................... 537
Accept Source-Active Messages that Fail the RFP Check......................................................................................537
Specifying Source-Active Messages...........................................................................................................................540
Limiting the Source-Active Messages from a Peer....................................................................................................541
Preventing MSDP from Caching a Local Source........................................................................................................541
Preventing MSDP from Caching a Remote Source.................................................................................................. 542
Preventing MSDP from Advertising a Local Source..................................................................................................542
Logging Changes in Peership States...........................................................................................................................543
Terminating a Peership..................................................................................................................................................543
Clearing Peer Statistics.................................................................................................................................................544
Debugging MSDP.......................................................................................................................................................... 544
MSDP with Anycast RP................................................................................................................................................545
Conguring Anycast RP................................................................................................................................................546
Reducing Source-Active Message Flooding.........................................................................................................547
Specifying the RP Address Used in SA Messages.............................................................................................. 547
MSDP Sample Congurations..................................................................................................................................... 549
29 Multiple Spanning Tree Protocol (MSTP)................................................................................................ 552
Protocol Overview.........................................................................................................................................................552
Spanning Tree Variations.............................................................................................................................................. 553
Implementation Information................................................................................................................................... 553
Congure Multiple Spanning Tree Protocol................................................................................................................553
Related Conguration Tasks...................................................................................................................................554
Enable Multiple Spanning Tree Globally...................................................................................................................... 554
Adding and Removing Interfaces.................................................................................................................................554
Creating Multiple Spanning Tree Instances................................................................................................................555
Inuencing MSTP Root Selection............................................................................................................................... 556
Interoperate with Non-Dell Bridges............................................................................................................................. 557
Changing the Region Name or Revision..................................................................................................................... 557
Modifying Global Parameters....................................................................................................................................... 557
Modifying the Interface Parameters........................................................................................................................... 559
Conguring an EdgePort.............................................................................................................................................. 560
Flush MAC Addresses after a Topology Change....................................................................................................... 560
MSTP Sample Congurations.......................................................................................................................................561
Router 1 Running-CongurationRouter 2 Running-CongurationRouter 3 Running-
CongurationSFTOS Example Running-Conguration........................................................................................561
Debugging and Verifying MSTP Congurations........................................................................................................ 565
30 Multicast Features................................................................................................................................... 567
Enabling IP Multicast.....................................................................................................................................................567
Contents
19
Implementation Information..........................................................................................................................................567
Multicast Policies...........................................................................................................................................................568
IPv4 Multicast Policies............................................................................................................................................568
Understanding Multicast Traceroute (mtrace)...........................................................................................................575
Important Points to Remember..............................................................................................................................576
Printing Multicast Traceroute (mtrace) Paths............................................................................................................576
Supported Error Codes................................................................................................................................................. 577
mtrace Scenarios........................................................................................................................................................... 578
31 Object Tracking........................................................................................................................................ 584
Object Tracking Overview............................................................................................................................................ 584
Track Layer 2 Interfaces......................................................................................................................................... 585
Track Layer 3 Interfaces......................................................................................................................................... 585
Track IPv4 and IPv6 Routes...................................................................................................................................586
Set Tracking Delays..................................................................................................................................................587
VRRP Object Tracking.............................................................................................................................................587
Object Tracking Conguration......................................................................................................................................587
Tracking a Layer 2 Interface................................................................................................................................... 587
Tracking a Layer 3 Interface................................................................................................................................... 588
Track an IPv4/IPv6 Route......................................................................................................................................590
Displaying Tracked Objects...........................................................................................................................................593
32 Open Shortest Path First (OSPFv2 and OSPFv3)....................................................................................595
Protocol Overview.........................................................................................................................................................595
Autonomous System (AS) Areas........................................................................................................................... 595
Area Types................................................................................................................................................................ 596
Networks and Neighbors........................................................................................................................................ 597
Router Types.............................................................................................................................................................597
Designated and Backup Designated Routers.......................................................................................................599
Link-State Advertisements (LSAs)........................................................................................................................599
Router Priority and Cost.........................................................................................................................................600
OSPF with Dell EMC Networking OS..........................................................................................................................601
Graceful Restart...................................................................................................................................................... 602
Fast Convergence (OSPFv2, IPv4 Only)..............................................................................................................603
Multi-Process OSPFv2 with VRF..........................................................................................................................603
RFC-2328 Compliant OSPF Flooding................................................................................................................... 603
OSPF ACK Packing................................................................................................................................................. 604
Setting OSPF Adjacency with Cisco Routers...................................................................................................... 604
Conguration Information.............................................................................................................................................605
Conguration Task List for OSPFv2 (OSPF for IPv4)........................................................................................ 605
OSPFv3 NSSA................................................................................................................................................................619
NSSA Options...........................................................................................................................................................619
Conguration Task List for OSPFv3 (OSPF for IPv6).............................................................................................. 620
Enabling IPv6 Unicast Routing...............................................................................................................................620
Applying cost for OSPFv3.......................................................................................................................................621
Assigning IPv6 Addresses on an Interface............................................................................................................ 621
20
Contents
/