dell networking configuration guide for the c9000 series ... · extended access-list...
TRANSCRIPT
-
Dell Networking Configuration Guide for the C9000 SeriesVersion 9.10(0.0)
-
Notes, Cautions, and WarningsNOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
2016 - 04
Rev. A00
-
Contents
1 About this Guide......................................................................................................................37
Audience.....................................................................................................................................37
Conventions...............................................................................................................................37
Related Documents................................................................................................................. 38
2 Configuration Fundamentals............................................................................................... 39
Accessing the Command Line...............................................................................................39
CLI Modes..................................................................................................................................40
Navigating CLI Modes........................................................................................................42
The do Command....................................................................................................................45
Undoing Commands............................................................................................................... 46
Obtaining Help..........................................................................................................................46
Entering and Editing Commands.......................................................................................... 47
Command History....................................................................................................................48
Filtering show Command Outputs.......................................................................................48
Multiple Users in Configuration Mode.................................................................................50
3 Getting Started........................................................................................................................ 51
Console Access......................................................................................................................... 51
Serial Console......................................................................................................................52
Mounting an NFS File System................................................................................................ 53
Important Points to Remember...................................................................................... 54
Default Configuration..............................................................................................................55
Configuring a Host Name.......................................................................................................55
Accessing the System Remotely........................................................................................... 55
Accessing the System Remotely..................................................................................... 55
Configure the Management Port IP Address................................................................56
Configure a Management Route.....................................................................................56
Configuring a Username and Password........................................................................ 56
Configuring the Enable Password.........................................................................................57
Manage Configuration Files....................................................................................................57
File Storage.......................................................................................................................... 58
Copy Files to and from the System................................................................................ 58
Save the Running-Configuration.................................................................................... 59
Configure the Overload Bit for a Startup Scenario..................................................... 60
Viewing Files........................................................................................................................60
Changes in Configuration Files........................................................................................61
Viewing Command History.................................................................................................... 62
Version 9.10(0.0) 3
-
Upgrading the Dell Networking OS......................................................................................62
4 Switch Management.............................................................................................................. 63
Configuring Privilege Levels...................................................................................................63
Creating a Custom Privilege Level..................................................................................63
Removing a Command from EXEC Mode.................................................................... 63
Moving a Command from EXEC Privilege Mode to EXEC Mode.............................64
Allowing Access to CONFIGURATION Mode Commands........................................ 64
Allowing Access to the Following Modes..................................................................... 64
Applying a Privilege Level to a Username..................................................................... 66
Applying a Privilege Level to a Terminal Line............................................................... 66
Configuring Logging................................................................................................................66
Audit and Security Logs.....................................................................................................67
Configuring Logging Format ......................................................................................... 69
Setting Up a Secure Connection to a Syslog Server...................................................69
Track Login Activity.................................................................................................................. 71
Restrictions for Tracking Login Activity.......................................................................... 71
Configuring Login Activity Tracking................................................................................71
Display Login Statistics...................................................................................................... 72
Limit Concurrent Login Sessions.......................................................................................... 74
Restrictions for Limiting the Number of Concurrent Sessions.................................74
Configuring Concurrent Session Limit...........................................................................74
Enabling the System to Clear Existing Sessions........................................................... 74
Log Messages in the Internal Buffer..................................................................................... 75
Configuration Task List for System Log Management................................................75
Disabling System Logging.......................................................................................................76
Sending System Messages to a Syslog Server.................................................................... 76
Configuring a UNIX System as a Syslog Server.............................................................77
Display the Logging Buffer and the Logging Configuration............................................77
Changing System Logging Settings......................................................................................78
Configuring a UNIX Logging Facility Level..........................................................................79
Synchronizing Log Messages................................................................................................ 80
Enabling Timestamp on Syslog Messages.......................................................................... 80
File Transfer Services................................................................................................................81
Configuration Task List for File Transfer Services........................................................ 81
Enabling the FTP Server.....................................................................................................81
Configuring FTP Server Parameters............................................................................... 82
Configuring FTP Client Parameters................................................................................ 82
Terminal Lines...........................................................................................................................83
Denying and Permitting Access to a Terminal Line.................................................... 83
Configuring Login Authentication for Terminal Lines................................................84
Setting Time Out of EXEC Privilege Mode.......................................................................... 85
Version 9.10(0.0) 4
-
Using Telnet to Access Another Network Device............................................................. 85
Lock CONFIGURATION Mode...............................................................................................86
Viewing the Configuration Lock Status......................................................................... 86
Recovering from a Forgotten Password .............................................................................87
Ignoring the Startup Configuration and Booting from the Factory-Default
Configuration............................................................................................................................88
Recovering from a Failed Start.............................................................................................. 88
Restoring Factory-Default Settings...................................................................................... 89
Important Point to Remember........................................................................................ 89
Restoring Factory-Default Boot Environment Variables............................................90
Using Hashes to Verify Software Images Before Installation.......................................... 91
Verifying System Images on C9010 Components............................................................ 93
When System Images on C9010 Components Do Not Match................................ 93
Manually Resetting the System Image on a C9010 Component.............................94
Logging in to the Virtual Console of a C9010 Component...................................... 95
Booting the C9010 from an Image on a Network Server..........................................95
Configuring C9010 Components to Boot from the RPM CP Image.......................95
5 802.1X....................................................................................................................................... 97
The Port-Authentication Process......................................................................................... 99
EAP over RADIUS...............................................................................................................101
Configuring 802.1X.................................................................................................................101
Related Configuration Tasks...........................................................................................101
Important Points to Remember.......................................................................................... 102
Enabling 802.1X...................................................................................................................... 103
Configuring dot1x Profile .....................................................................................................105
Configuring MAC addresses for a do1x Profile................................................................ 106
Configuring the Static MAB and MAB Profile .................................................................. 106
Configuring Critical VLAN ....................................................................................................107
Configuring Request Identity Re-Transmissions.............................................................108
Configuring a Quiet Period after a Failed Authentication............................................. 109
Forcibly Authorizing or Unauthorizing a Port...................................................................110
Re-Authenticating a Port....................................................................................................... 111
Configuring Dynamic VLAN Assignment with Port Authentication............................. 112
Guest and Authentication-Fail VLANs................................................................................ 113
Configuring a Guest VLAN.............................................................................................. 114
Configuring an Authentication-Fail VLAN................................................................... 115
Configuring Timeouts...................................................................................................... 116
Multi-Host Authentication.....................................................................................................117
Configuring Multi-Host AuthenticationConfiguring Single-Host
Authentication...................................................................................................................120
Multi-Supplicant Authentication..........................................................................................121
Version 9.10(0.0) 5
-
Configuring Multi-Supplicant AuthenticationRestricting Multi-Supplicant
Authentication................................................................................................................... 121
MAC Authentication Bypass................................................................................................. 122
MAB in Single-host and Multi-Host Mode.................................................................. 123
MAB in Multi-Supplicant Authentication Mode..........................................................123
Configuring MAC Authentication Bypass.................................................................... 124
Dynamic CoS with 802.1X.................................................................................................... 125
6 Access Control Lists (ACLs).................................................................................................127
IP Access Control Lists (ACLs)............................................................................................. 128
CAM Usage.........................................................................................................................128
User-Configurable CAM Allocation..............................................................................130
Allocating CAM for Ingress ACLs on the Port Extender........................................... 130
Allocating CAM for Egress ACLs on the Port Extender.............................................132
Implementing ACLs .........................................................................................................133
IP Fragment Handling............................................................................................................134
IP Fragments ACL Examples...........................................................................................135
Layer 4 ACL Rules Examples.......................................................................................... 135
Configure a Standard IP ACL............................................................................................... 136
Configuring a Standard IP ACL Filter............................................................................ 137
Configure an Extended IP ACL............................................................................................ 138
Configuring Filters with a Sequence Number............................................................ 138
Configuring Filters Without a Sequence Number..................................................... 140
Configure Layer 2 and Layer 3 ACLs...................................................................................141
Using ACL VLAN Groups....................................................................................................... 141
Guidelines for Configuring ACL VLAN Groups...........................................................142
Configuring an ACL VLAN Group..................................................................................142
Allocating ACL VLAN CAM..............................................................................................143
Applying an IP ACL to an Interface.....................................................................................144
Applying Ingress ACLs on the Port Extender.............................................................. 145
Applying Egress ACLs.......................................................................................................145
Applying Layer 3 Egress ACLs on Control-Plane Traffic..........................................146
Counting ACL Hits............................................................................................................ 147
IP Prefix Lists............................................................................................................................ 147
Implementation Information..........................................................................................148
Configuration Task List for Prefix Lists.........................................................................148
ACL Resequencing................................................................................................................. 152
Resequencing an ACL or Prefix List.............................................................................. 152
Route Maps.............................................................................................................................. 154
Implementation Information..........................................................................................154
Important Points to Remember.......................................................................................... 154
Configuration Task List for Route Maps.......................................................................155
Version 9.10(0.0) 6
-
Configuring Match Routes..............................................................................................157
Configuring Set Conditions............................................................................................ 159
Configure a Route Map for Route Redistribution......................................................160
Configure a Route Map for Route Tagging................................................................ 160
Continue Clause................................................................................................................161
Configuring a UDF ACL......................................................................................................... 161
Hot-Lock Behavior.................................................................................................................163
7 Bidirectional Forwarding Detection (BFD).......................................................................164
How BFD Works......................................................................................................................164
BFD Packet Format...........................................................................................................166
BFD Sessions......................................................................................................................168
BFD Three-Way Handshake........................................................................................... 168
Session State Changes.....................................................................................................170
Important Points to Remember.......................................................................................... 170
Configure BFD......................................................................................................................... 171
Configure BFD for Static Routes.................................................................................... 171
Configure BFD for OSPF..................................................................................................173
Configure BFD for OSPFv3............................................................................................. 176
Configure BFD for IS-IS................................................................................................... 177
Configure BFD for BGP................................................................................................... 180
Configure BFD for VRRP..................................................................................................187
Configuring Protocol Liveness...................................................................................... 190
8 Border Gateway Protocol IPv4 (BGPv4)...........................................................................191
Autonomous Systems (AS)....................................................................................................191
Sessions and Peers.................................................................................................................194
Establish a Session............................................................................................................194
Route Reflectors..................................................................................................................... 195
Communities..................................................................................................................... 196
BGP Attributes.........................................................................................................................196
Best Path Selection Criteria............................................................................................ 196
Weight.................................................................................................................................198
Local Preference...............................................................................................................199
Multi-Exit Discriminators (MEDs)...................................................................................199
Origin..................................................................................................................................200
AS Path................................................................................................................................201
Next Hop............................................................................................................................ 201
Multiprotocol BGP................................................................................................................. 202
Implement BGP ..................................................................................................................... 202
Additional Path (Add-Path) Support.............................................................................202
Advertise IGP Cost as MED for Redistributed Routes...............................................202
Version 9.10(0.0) 7
-
Ignore Router-ID for Some Best-Path Calculations.................................................203
Four-Byte AS Numbers................................................................................................... 203
AS4 Number Representation.........................................................................................204
AS Number Migration......................................................................................................206
BGP4 Management Information Base (MIB).............................................................. 208
Important Points to Remember....................................................................................208
Configuration Information...................................................................................................209
BGP Configuration.................................................................................................................209
Enabling BGP.....................................................................................................................210
Configuring AS4 Number Representations.................................................................214
Configuring Peer Groups................................................................................................216
Configuring BGP Fast Fail-Over.................................................................................... 218
Configuring Passive Peering.......................................................................................... 220
Maintaining Existing AS Numbers During an AS Migration...................................... 221
Allowing an AS Number to Appear in its Own AS Path............................................ 222
Enabling Neighbor Graceful Restart.............................................................................223
Filtering on an AS-Path Attribute.................................................................................. 224
Regular Expressions as Filters........................................................................................ 225
Redistributing Routes.......................................................................................................227
Enabling Additional Paths............................................................................................... 227
Configuring IP Community Lists...................................................................................228
Configuring an IP Extended Community List.............................................................229
Filtering Routes with Community Lists........................................................................230
Manipulating the COMMUNITY Attribute.................................................................... 231
Changing MED Attributes............................................................................................... 233
Changing the LOCAL_PREFERENCE Attribute.......................................................... 233
Changing the NEXT_HOP Attribute............................................................................. 234
Changing the WEIGHT Attribute...................................................................................234
Enabling Multipath........................................................................................................... 235
Filtering BGP Routes........................................................................................................ 235
Filtering BGP Routes Using Route Maps......................................................................237
Filtering BGP Routes Using AS-PATH Information....................................................237
Configuring BGP Route Reflectors...............................................................................238
Aggregating Routes......................................................................................................... 239
Configuring BGP Confederations.................................................................................239
Enabling Route Flap Dampening.................................................................................. 240
Changing BGP Timers..................................................................................................... 243
Enabling BGP Neighbor Soft-Reconfiguration.......................................................... 243
Route Map Continue....................................................................................................... 245
Enabling MBGP Configurations...........................................................................................245
BGP Regular Expression Optimization.............................................................................. 246
Debugging BGP......................................................................................................................246
Version 9.10(0.0) 8
-
Storing Last and Bad PDUs.............................................................................................247
Capturing PDUs................................................................................................................248
PDU Counters................................................................................................................... 250
Sample Configurations......................................................................................................... 250
9 Content Addressable Memory (CAM)...............................................................................260
CAM Allocation.......................................................................................................................260
Test CAM Usage..................................................................................................................... 262
View CAM-ACL Settings....................................................................................................... 262
View CAM Usage.................................................................................................................... 263
Return to the Default CAM Configuration........................................................................264
CAM Optimization................................................................................................................. 265
Applications for CAM Profiling............................................................................................ 265
LAG HashingLAG Hashing Based on Bidirectional Flow..........................................265
Unified Forwarding Table (UFT) Modes.............................................................................265
Configuring UFT Modes..................................................................................................266
10 Control Plane Policing (CoPP).........................................................................................268
CoPP Implementation.......................................................................................................... 268
Protocol-based Control Plane Policing...................................................................... 268
Queue-based Control Plane Policing..........................................................................269
CoPP Example......................................................................................................................... 271
Configure Control Plane Policing.......................................................................................273
Configuring CoPP for Protocols................................................................................... 273
Examples of Configuring CoPP for Protocols............................................................274
Configuring CoPP for CPU Queues............................................................................. 275
Examples of Configuring CoPP for CPU Queues......................................................276
Displaying CoPP Configuration.....................................................................................276
Troubleshooting CoPP Operation...................................................................................... 281
Enabling CPU Traffic Statistics.......................................................................................281
Viewing CPU Traffic Statistics........................................................................................282
Troubleshooting CPU Packet Loss...............................................................................282
Viewing Per-Protocol CoPP Counters........................................................................ 284
Viewing Per-Queue CoPP Counters........................................................................... 288
11 Data Center Bridging (DCB)............................................................................................. 290
Enabling Data Center Bridging............................................................................................290
Ethernet Enhancements in Data Center Bridging........................................................... 291
Priority-Based Flow Control.......................................................................................... 292
Enhanced Transmission Selection................................................................................294
Data Center Bridging Exchange Protocol (DCBx).....................................................295
Data Center Bridging in a Traffic Flow........................................................................ 296
Version 9.10(0.0) 9
-
QoS dot1p Traffic Classification and Queue Assignment............................................. 296
SNMP Support for PFC and Buffer Statistics Tracking....................................................297
DCB Maps and its Attributes................................................................................................ 298
DCB Map: Configuration Procedure............................................................................298
Important Points to Remember.................................................................................... 299
Applying a DCB Map on a Port......................................................................................299
Configuring PFC without a DCB Map..........................................................................300
Configuring Lossless Queues........................................................................................ 301
Applying a DCB Map on a Line Card............................................................................302
Data Center Bridging: Default Configuration.................................................................. 302
Configuration Notes: PFC and ETS in a DCB Map..........................................................303
PFC Configuration Notes............................................................................................... 303
ETS Configuration Notes................................................................................................304
ETS Prerequisites and Restrictions............................................................................... 305
Priority-Group Configuration Notes............................................................................305
Configuring Priority-Based Flow Control.........................................................................306
Configuring Lossless Queues........................................................................................ 307
Configuring Enhanced Transmission Selection.............................................................. 308
Creating an ETS Priority Group.....................................................................................308
ETS Operation with DCBx.............................................................................................. 309
Configure a DCBx Operation...............................................................................................310
DCBx Operation................................................................................................................310
DCBx Port Roles............................................................................................................... 310
DCB Configuration Exchange........................................................................................312
Configuration Source Election...................................................................................... 313
Propagation of DCB Information.................................................................................. 313
Auto-Detection and Manual Configuration of the DCBx Version......................... 314
Behavior of Tagged Packets...........................................................................................314
Configuration Example for DSCP and PFC Priorities................................................ 315
DCBx Example...................................................................................................................316
DCBx Prerequisites and Restrictions.............................................................................317
Configuring DCBx.............................................................................................................317
Verifying the DCB Configuration.........................................................................................321
Performing PFC Using DSCP Bits Instead of 802.1p Bits...............................................332
PFC and ETS Configuration Examples...............................................................................333
Using PFC and ETS to Manage Data Center Traffic........................................................333
PFC and ETS Configuration Command Examples.................................................... 335
Using PFC and ETS to Manage Converged Ethernet Traffic...................................336
Hierarchical Scheduling in ETS Output Policies........................................................ 336
Priority-Based Flow Control Using Dynamic Buffer Method........................................337
Pause and Resume of Traffic......................................................................................... 337
Buffer Sizes for Lossless or PFC Packets..................................................................... 337
Version 9.10(0.0) 10
-
Configuring the Dynamic Buffer Method......................................................................... 338
12 Debugging and Diagnostics.............................................................................................340
Offline Diagnostics................................................................................................................ 340
Running Port Extender Offline Diagnostics on the Switch......................................341
Running Offline Diagnostics on a Standalone Switch..............................................348
TRACE Logs..............................................................................................................................371
Auto Save on Reload, Crash, or Rollover..................................................................... 371
Uploading Trace Logs...................................................................................................... 371
Last Restart Reason................................................................................................................372
show hardware Commands.................................................................................................372
Environmental Monitoring....................................................................................................375
Displaying Port Extender Environment Information ................................................ 375
Display Power Supply Status..........................................................................................376
Display Fan Status.............................................................................................................377
Display Transceiver Type.................................................................................................377
Recognize an Over-Temperature Condition............................................................. 379
Troubleshoot an Over-Temperature Condition....................................................... 380
Troubleshooting Packet Loss.............................................................................................. 382
Displaying Drop Counters.............................................................................................. 383
Displaying Dataplane Statistics......................................................................................384
Displaying Line-Card Counters.....................................................................................386
Accessing Application Core Dumps...................................................................................387
Mini Core Dumps...................................................................................................................388
Full Kernel Core Dumps....................................................................................................... 388
Enabling TCP Dumps............................................................................................................ 389
Accessing Port Extender Core and Mini Core Dumps...................................................390
13 Dynamic Host Configuration Protocol (DHCP)............................................................ 391
DHCP Packet Format and Options.....................................................................................391
Assign an IP Address using DHCP...................................................................................... 393
Implementation Information............................................................................................... 394
Configure the System to be a DHCP Server.....................................................................395
Configuring the Server for Automatic Address Allocation...................................... 396
Specifying a Default Gateway........................................................................................397
Configure a Method of Hostname Resolution...........................................................397
Using DNS for Address Resolution............................................................................... 398
Using NetBIOS WINS for Address Resolution............................................................ 398
Creating Manual Binding Entries...................................................................................398
Debugging the DHCP Server.........................................................................................399
Using DHCP Clear Commands..................................................................................... 399
Configure the System to be a Relay Agent.......................................................................399
Version 9.10(0.0) 11
-
Configure the System to be a DHCP Client..................................................................... 401
DHCP Client on a Management Interface.................................................................. 401
DHCP Client Operation with Other Features.............................................................402
Configure Secure DHCP...................................................................................................... 403
Option 82...........................................................................................................................403
DHCP Snooping............................................................................................................... 404
Drop DHCP Packets on Snooped VLANs Only..........................................................406
Dynamic ARP Inspection................................................................................................ 407
Configuring Dynamic ARP Inspection.........................................................................408
Source Address Validation................................................................................................... 409
Enabling IP Source Address Validation........................................................................409
DHCP MAC Source Address Validation....................................................................... 410
Enabling IP+MAC Source Address Validation.............................................................410
Viewing the Number of SAV Dropped Packets...........................................................411
Clearing the Number of SAV Dropped Packets......................................................... 412
14 Equal Cost Multi-Path (ECMP)......................................................................................... 413
ECMP for Flow-Based Affinity..............................................................................................413
Enabling Deterministic ECMP Next Hop......................................................................413
Configuring the Hash Algorithm Seed......................................................................... 413
Link Bundle Monitoring...................................................................................................414
Managing ECMP Group Paths............................................................................................. 415
Creating an ECMP Group Bundle....................................................................................... 415
Modifying the ECMP Group Threshold..............................................................................416
BGP Multipath Operation with Link Bankwidth............................................................... 416
Dynamic Re-calculation of Link Bankwidth..................................................................... 419
Weighted ECMP for Static Routes...................................................................................... 419
ECMP Support in L3 Host and LPM Tables.......................................................................420
15 FCoE Transit.........................................................................................................................421
Fibre Channel over Ethernet................................................................................................ 421
Ensure Robustness in a Converged Ethernet Network..................................................421
FIP Snooping on Ethernet Bridges..................................................................................... 423
FIP Snooping in a Switch Stack...........................................................................................426
Using FIP Snooping............................................................................................................... 426
FIP Snooping Prerequisites............................................................................................ 426
Important Points to Remember.................................................................................... 427
Enabling the FCoE Transit Feature............................................................................... 427
Enable FIP Snooping on VLANs.....................................................................................428
Configure the FC-MAP Value........................................................................................ 428
Configure a Port for a Bridge-to-Bridge Link............................................................ 428
Configure a Port for a Bridge-to-FCF Link.................................................................428
Version 9.10(0.0) 12
-
Impact on Other Software Features.............................................................................429
FIP Snooping Restrictions.............................................................................................. 429
Configuring FIP Snooping....................................................................................................430
Displaying FIP Snooping Information.................................................................................431
FCoE Transit Configuration Example.................................................................................437
16 FIPS Cryptography............................................................................................................. 439
Configuration Tasks...............................................................................................................439
Preparing the System............................................................................................................440
Enabling FIPS Mode...............................................................................................................440
Generating Host-Keys...........................................................................................................441
Monitoring FIPS Mode Status...............................................................................................441
Disabling FIPS Mode..............................................................................................................442
17 Flex Hash and Optimized Boot-Up................................................................................. 443
Flex Hash Capability Overview............................................................................................443
Configuring the Flex Hash Mechanism.............................................................................444
LACP Fast Switchover........................................................................................................... 444
Configuring LACP Fast Switchover.................................................................................... 445
LACP......................................................................................................................................... 445
LACP Fast Switchover......................................................................................................445
RDMA Over Converged Ethernet (RoCE) Overview....................................................... 445
Sample Configurations......................................................................................................... 447
..............................................................................................................................................447
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...........................................450
18 Force10 Resilient Ring Protocol (FRRP).........................................................................452
Protocol Overview................................................................................................................. 452
Ring Status......................................................................................................................... 453
Multiple FRRP Rings.........................................................................................................454
Important FRRP Points....................................................................................................454
Implementing FRRP......................................................................................................... 455
Important FRRP Concepts..............................................................................................455
FRRP Configuration............................................................................................................... 456
Creating the FRRP Group............................................................................................... 457
Configuring the Control VLAN...................................................................................... 457
Configuring and Adding the Member VLANs.............................................................458
Setting the FRRP Timers................................................................................................. 459
Clearing the FRRP Counters..........................................................................................460
Viewing the FRRP Configuration.................................................................................. 460
Viewing the FRRP Information......................................................................................460
Troubleshooting FRRP.......................................................................................................... 461
Version 9.10(0.0) 13
-
Configuration Checks......................................................................................................461
Sample Configuration and Topology.................................................................................461
19 GARP VLAN Registration Protocol (GVRP)....................................................................463
Important Points to Remember..........................................................................................463
Configure GVRP..................................................................................................................... 464
Related Configuration Tasks..........................................................................................465
Enabling GVRP Globally........................................................................................................465
Enabling GVRP on a Layer 2 Interface...............................................................................465
Configure GVRP Registration..............................................................................................466
Configure a GARP Timer...................................................................................................... 466
20 High Availability (HA)........................................................................................................ 468
High Availability on Chassis................................................................................................. 468
High Availability in a PE Stack..............................................................................................469
Online Insertion and Removal............................................................................................ 469
RPM Online Insertion...................................................................................................... 469
Line Card Online Insertion............................................................................................. 469
Pre-configuring a Slot for a Line-Card Type..............................................................470
Replacing a Line Card..................................................................................................... 470
Hitless Behavior.......................................................................................................................471
Graceful Restart......................................................................................................................472
Software Resiliency................................................................................................................472
System Health Monitoring..............................................................................................472
Failure and Event Logging.............................................................................................. 472
Trace Log........................................................................................................................... 472
Core Dumps...................................................................................................................... 473
System Log........................................................................................................................ 473
Control Plane Redundancy.................................................................................................. 473
Control-Plane Failover....................................................................................................474
RPM Synchronization...................................................................................................... 475
Forcing an RPM Failover................................................................................................. 475
Specifying an Auto-Failover Limit................................................................................. 475
Disabling Auto-Reboot................................................................................................... 476
21 Internet Group Management Protocol (IGMP)............................................................. 477
IGMP Implementation Information.................................................................................... 477
IGMP Protocol Overview......................................................................................................478
IGMP Version 2................................................................................................................. 478
IGMP Version 3................................................................................................................. 479
Configure IGMP......................................................................................................................483
Related Configuration Tasks..........................................................................................483
Version 9.10(0.0) 14
-
Viewing IGMP Enabled Interfaces...................................................................................... 483
Selecting an IGMP Version...................................................................................................484
Viewing IGMP Groups...........................................................................................................484
Enabling IGMP Immediate-Leave.......................................................................................485
IGMP Snooping...................................................................................................................... 485
IGMP Snooping Implementation Information........................................................... 485
Configuring IGMP Snooping......................................................................................... 486
Removing a Group-Port Association...........................................................................486
Disabling Multicast Flooding..........................................................................................487
Specifying a Port as Connected to a Multicast Router............................................ 487
Configuring the Switch as Querier............................................................................... 487
Fast Convergence after MSTP Topology Changes.........................................................488
Designating a Multicast Router Interface......................................................................... 489
22 Interfaces.............................................................................................................................490
Basic Interface Configuration............................................................................................. 490
Advanced Interface Configuration.....................................................................................490
Port Numbering......................................................................................................................492
Interface Types....................................................................................................................... 495
View Basic Interface Information....................................................................................... 495
Resetting an Interface to its Factory Default State......................................................... 502
Enabling a Physical Interface...............................................................................................503
Physical Interfaces................................................................................................................. 503
Port Pipes...........................................................................................................................503
Setting the Speed and Duplex Mode of Ethernet Interfaces.................................. 504
Configuration Task List for Physical Interfaces..........................................................505
Overview of Layer Modes...............................................................................................505
Configuring Layer 2 (Data Link) Mode.........................................................................506
Configuring Layer 2 (Interface) Mode..........................................................................506
Configuring Layer 3 (Network) Mode.......................................................................... 506
Configuring Layer 3 (Interface) Mode..........................................................................507
Egress Interface Selection (EIS)...........................................................................................508
Important Points to Remember....................................................................................508
Configuring EIS.................................................................................................................508
Management Interfaces........................................................................................................509
Configuring a Dedicated Management Interface .................................................... 509
Configuring a Management Interface on an Ethernet Port.....................................510
Port Extender Interfaces........................................................................................................511
VLAN Interfaces.......................................................................................................................512
Loopback Interfaces.............................................................................................................. 513
Null Interfaces......................................................................................................................... 513
Port Channel Interfaces........................................................................................................ 514
Version 9.10(0.0) 15
-
Port Channel Definition and Standards....................................................................... 514
Port Channel Benefits......................................................................................................514
Port Channel Implementation....................................................................................... 514
10/40 Gbps Interfaces in Port Channels......................................................................515
Configuration Tasks for Port Channel Interfaces...................................................... 515
Creating a Port Channel..................................................................................................516
Adding a Physical Interface to a Port Channel...........................................................516
Reassigning an Interface to a New Port Channel......................................................518
Configuring the Minimum Oper Up Links in a Port Channel.................................. 519
Adding or Removing a Port Channel from a VLAN...................................................520
Assigning an IP Address to a Port Channel.................................................................520
Deleting or Disabling a Port Channel........................................................................... 521
Load Balancing Through Port Channels......................................................................521
Changing the Hash Algorithm....................................................................................... 521
Bulk Configuration.................................................................................................................522
Interface Range.................................................................................................................522
Bulk Configuration Examples.........................................................................................523
Defining Interface Range Macros....................................................................................... 524
Define the Interface Range............................................................................................ 525
Choosing an Interface-Range Macro.......................................................................... 525
Monitoring and Maintaining Interfaces..............................................................................525
Maintenance Using TDR................................................................................................. 526
Displaying Traffic Statistics on HiGig Ports.......................................................................527
Link Bundle Monitoring.........................................................................................................528
Monitoring HiGig Link Bundles........................................................................................... 529
Guidelines for Monitoring HiGig Link-Bundles .........................................................530
Enabling HiGig Link-Bundle Monitoring......................................................................531
Non Dell-Qualified Transceivers......................................................................................... 531
Splitting QSFP Ports to SFP+ Ports.....................................................................................532
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port.................................... 533
Configuring wavelength for 10–Gigabit SFP+ optics.................................................... 534
Link Dampening......................................................................................................................535
Important Points to Remember.................................................................................... 535
Enabling Link Dampening...............................................................................................535
Using Ethernet Pause Frames for Flow Control...............................................................537
Threshold Settings........................................................................................................... 538
Enabling Pause Frames................................................................................................... 539
Configure the MTU Size on an Interface.......................................................................... 539
Auto-Negotiation on Ethernet Interfaces.........................................................................540
Set Auto-Negotiation Options.......................................................................................541
View Advanced Interface Information............................................................................... 541
Configuring the Interface Sampling Size.................................................................... 542
Version 9.10(0.0) 16
-
Dynamic Counters.................................................................................................................543
Clearing Interface Counters.......................................................................................... 544
23 Internet Protocol Security (IPSec).................................................................................. 545
Configuring IPSec ................................................................................................................. 546
24 IPv4 Routing....................................................................................................................... 547
IP Addresses............................................................................................................................ 547
Implementation Information......................................................................................... 548
Configuration Tasks for IP Addresses................................................................................548
Assigning IP Addresses to an Interface..............................................................................548
Configuring Static Routes.................................................................................................... 549
Configure Static Routes for the Management Interface................................................551
Enabling Directed Broadcast................................................................................................551
Resolution of Host Names....................................................................................................551
Enabling Dynamic Resolution of Host Names.................................................................552
Specifying the Local System Domain and a List of Domains........................................552
Configuring DNS with Traceroute......................................................................................553
ARP............................................................................................................................................ 554
Configuration Tasks for ARP.......................................................................................... 554
Configuring Static ARP Entries...................................................................................... 554
Configuring ARP Inspection Trust................................................................................ 555
Configuring ARP Timeout...............................................................................................556
Enabling Proxy ARP..........................................................................................................556
Clearing ARP Cache.........................................................................................................556
ARP Learning via Gratuitous ARP.................................................................................. 557
Enabling ARP Learning via Gratuitous ARP................................................................. 557
ARP Learning via ARP Request...................................................................................... 558
Configuring ARP Retries..................................................................................................559
ICMP..........................................................................................................................................559
Configuration Tasks for ICMP........................................................................................559
Enabling ICMP Unreachable Messages....................................................................... 560
25 IPv6 Routing........................................................................................................................561
Protocol Overview................................................................................................................. 561
Extended Address Space.................................................................................................562
Stateless Autoconfiguration...........................................................................................562
IPv6 Headers..................................................................................................................... 563
IPv6 Header Fields............................................................................................................563
Extension Header Fields..................................................................................................565
IPv6 Addressing................................................................................................................ 566
IPv6 Implementation on the Dell Networking OS...........................................................567
Version 9.10(0.0) 17
-
Configuring the LPM Table for IPv6 Extended Prefixes.................................................569
ICMPv6..................................................................................................................................... 570
Path MTU Discovery.............................................................................................................. 570
IPv6 Neighbor Discovery.......................................................................................................571
IPv6 Neighbor Discovery of MTU Packets.................................................................. 572
Configuring the IPv6 Recursive DNS Server............................................................... 572
Secure Shell (SSH) Over an IPv6 Transport.......................................................................574
Configuration Tasks for IPv6................................................................................................575
Adjusting Your CAM Profile............................................................................................ 575
Assigning an IPv6 Address to an Interface.................................................................. 576
Assigning a Static IPv6 Route.........................................................................................576
Configuring Telnet with IPv6......................................................................................... 577
SNMP over IPv6.................................................................................................................577
Displaying IPv6 Information........................................................................................... 578
Displaying an IPv6 Configuration..................................................................................578
Displaying IPv6 Routes.................................................................................................... 579
Displaying the Running Configuration for an Interface...........................................580
Clearing IPv6 Routes........................................................................................................581
26 Intermediate System to Intermediate System.............................................................. 582
IS-IS Protocol Overview....................................................................................................... 582
IS-IS Addressing......................................................................................................................583
Multi-Topology IS-IS............................................................................................................. 583
Transition Mode................................................................................................................584
Interface Support............................................................................................................. 584
Adjacencies........................................................................................................................584
Graceful Restart......................................................................................................................585
Timers................................................................................................................................. 585
Implementation Information............................................................................................... 585
Configuration Information...................................................................................................586
Configuration Tasks for IS-IS......................................................................................... 587
Configuring the Distance of a Route........................................................................... 596
Changing the IS-Type..................................................................................................... 596
Redistributing IPv4 Routes............................................................................................. 599
Redistributing IPv6 Routes.............................................................................................600
Configuring Authentication Passwords....................................................................... 601
Setting the Overload Bit..................................................................................................601
Debugging IS-IS............................................................................................................... 602
IS-IS Metric Styles.................................................................................................................. 603
Configure Metric Values.......................................................................................................603
Maximum Values in the Routing Table........................................................................604
Change the IS-IS Metric Style in One Level Only..................................................... 604
Version 9.10(0.0) 18
-
Leaks from One Level to Another................................................................................ 606
Sample Configurations......................................................................................................... 607
27 iSCSI Optimization.............................................................................................................610
iSCSI Optimization Overview...............................................................................................610
Default iSCSI Optimization Values......................................................................................613
iSCSI Optimization Prerequisites.........................................................................................613
Configuring iSCSI Optimization.......................................................................................... 613
Displaying iSCSI Optimization Information...................................................................... 616
Enable and Disable iSCSI Optimization..............................................................................617
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.......................... 618
Monitoring iSCSI Traffic Flows............................................................................................ 618
Information Monitored in iSCSI Traffic Flows.................................................................. 619
Detection and Auto-Configuration for Dell EqualLogic Arrays................................... 620
Configuring Detection and Ports for Dell Compellent Arrays..................................... 620
Application of Quality of Service to iSCSI Traffic Flows.................................................621
28 Link Aggregation Control Protocol (LACP)...................................................................622
Introduction to Dynamic LAGs and LACP........................................................................ 622
Important Points to Remember.................................................................................... 622
LACP Modes...................................................................................................................... 623
Configuring LACP Commands......................................................................................623
LACP Configuration Tasks................................................................................................... 624
Creating a LAG..................................................................................................................624
Configuring the LAG Interfaces as Dynamic.............................................................. 625
Setting the LACP Long Timeout....................................................................................625
Monitoring and Debugging LACP.................................................................................626
Shared LAG State Tracking...................................................................................................627
Configuring Shared LAG State Tracking......................................................................627
Important Points about Shared LAG State Tracking.................................................629
LACP Basic Configuration Example................................................................................... 629
Configure a LAG on ALPHA........................................................................................... 630
29 Layer 2..................................................................................................................................638
Manage the MAC Address Table.........................................................................................638
Clearing the MAC Address Table.................................................................................. 638
Setting the Aging Time for Dynamic Entries.............................................................. 638
Configuring a Static MAC Address................................................................................639
Displaying the MAC Address Table...............................................................................639
MAC Learning Limit............................................................................................................... 639
Setting the MAC Learning Limit.................................................................................... 640
mac learning-limit Dynamic..........................................................................................640
Version 9.10(0.0) 19
-
mac learning-limit mac-address-sticky...................................................................... 641
mac learning-limit station-move..................................................................................641
mac learning-limit no-station-move........................................................................... 641
Learning Limit Violation Actions................................................................................... 642
Setting Station Move Violation Actions....................................................................... 642
Recovering from Learning Limit and Station Move Violations............................... 643
Disabling MAC Address Learning on the System...................................................... 643
NIC Teaming...........................................................................................................................644
Configure Redundant Pairs..................................................................................................645
Important Points about Configuring Redundant Pairs.............................................647
Far-End Failure Detection....................................................................................................649
FEFD State Changes........................................................................................................ 650
Configuring FEFD..............................................................................................................651
Enabling FEFD on an Interface...................................................................................... 652
Debugging FEFD...............................................................................................................653
30 Link Layer Discovery Protocol (LLDP)............................................................................654
802.1AB (LLDP) Overview...........................................................................................