1251
Dell Networking Configuration Guide for the C9000 Series Version 9.10(0.0)

Dell Networking Configuration Guide for the C9000 Series ... · EXTENDED ACCESS-LIST Dell(config-ext-nacl)# ip access-list extended (IP ACCESS-LIST Modes) IP COMMUNITY-LIST Dell(config-community-list)#

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

  • Dell Networking Configuration Guide for the C9000 SeriesVersion 9.10(0.0)

  • Notes, Cautions, and WarningsNOTE: A NOTE indicates important information that helps you make better use of your computer.

    CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.

    WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

    Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell™ and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.

    2016 - 04

    Rev. A00

  • Contents

    1 About this Guide......................................................................................................................37

    Audience.....................................................................................................................................37

    Conventions...............................................................................................................................37

    Related Documents................................................................................................................. 38

    2 Configuration Fundamentals............................................................................................... 39

    Accessing the Command Line...............................................................................................39

    CLI Modes..................................................................................................................................40

    Navigating CLI Modes........................................................................................................42

    The do Command....................................................................................................................45

    Undoing Commands............................................................................................................... 46

    Obtaining Help..........................................................................................................................46

    Entering and Editing Commands.......................................................................................... 47

    Command History....................................................................................................................48

    Filtering show Command Outputs.......................................................................................48

    Multiple Users in Configuration Mode.................................................................................50

    3 Getting Started........................................................................................................................ 51

    Console Access......................................................................................................................... 51

    Serial Console......................................................................................................................52

    Mounting an NFS File System................................................................................................ 53

    Important Points to Remember...................................................................................... 54

    Default Configuration..............................................................................................................55

    Configuring a Host Name.......................................................................................................55

    Accessing the System Remotely........................................................................................... 55

    Accessing the System Remotely..................................................................................... 55

    Configure the Management Port IP Address................................................................56

    Configure a Management Route.....................................................................................56

    Configuring a Username and Password........................................................................ 56

    Configuring the Enable Password.........................................................................................57

    Manage Configuration Files....................................................................................................57

    File Storage.......................................................................................................................... 58

    Copy Files to and from the System................................................................................ 58

    Save the Running-Configuration.................................................................................... 59

    Configure the Overload Bit for a Startup Scenario..................................................... 60

    Viewing Files........................................................................................................................60

    Changes in Configuration Files........................................................................................61

    Viewing Command History.................................................................................................... 62

    Version 9.10(0.0) 3

  • Upgrading the Dell Networking OS......................................................................................62

    4 Switch Management.............................................................................................................. 63

    Configuring Privilege Levels...................................................................................................63

    Creating a Custom Privilege Level..................................................................................63

    Removing a Command from EXEC Mode.................................................................... 63

    Moving a Command from EXEC Privilege Mode to EXEC Mode.............................64

    Allowing Access to CONFIGURATION Mode Commands........................................ 64

    Allowing Access to the Following Modes..................................................................... 64

    Applying a Privilege Level to a Username..................................................................... 66

    Applying a Privilege Level to a Terminal Line............................................................... 66

    Configuring Logging................................................................................................................66

    Audit and Security Logs.....................................................................................................67

    Configuring Logging Format ......................................................................................... 69

    Setting Up a Secure Connection to a Syslog Server...................................................69

    Track Login Activity.................................................................................................................. 71

    Restrictions for Tracking Login Activity.......................................................................... 71

    Configuring Login Activity Tracking................................................................................71

    Display Login Statistics...................................................................................................... 72

    Limit Concurrent Login Sessions.......................................................................................... 74

    Restrictions for Limiting the Number of Concurrent Sessions.................................74

    Configuring Concurrent Session Limit...........................................................................74

    Enabling the System to Clear Existing Sessions........................................................... 74

    Log Messages in the Internal Buffer..................................................................................... 75

    Configuration Task List for System Log Management................................................75

    Disabling System Logging.......................................................................................................76

    Sending System Messages to a Syslog Server.................................................................... 76

    Configuring a UNIX System as a Syslog Server.............................................................77

    Display the Logging Buffer and the Logging Configuration............................................77

    Changing System Logging Settings......................................................................................78

    Configuring a UNIX Logging Facility Level..........................................................................79

    Synchronizing Log Messages................................................................................................ 80

    Enabling Timestamp on Syslog Messages.......................................................................... 80

    File Transfer Services................................................................................................................81

    Configuration Task List for File Transfer Services........................................................ 81

    Enabling the FTP Server.....................................................................................................81

    Configuring FTP Server Parameters............................................................................... 82

    Configuring FTP Client Parameters................................................................................ 82

    Terminal Lines...........................................................................................................................83

    Denying and Permitting Access to a Terminal Line.................................................... 83

    Configuring Login Authentication for Terminal Lines................................................84

    Setting Time Out of EXEC Privilege Mode.......................................................................... 85

    Version 9.10(0.0) 4

  • Using Telnet to Access Another Network Device............................................................. 85

    Lock CONFIGURATION Mode...............................................................................................86

    Viewing the Configuration Lock Status......................................................................... 86

    Recovering from a Forgotten Password .............................................................................87

    Ignoring the Startup Configuration and Booting from the Factory-Default

    Configuration............................................................................................................................88

    Recovering from a Failed Start.............................................................................................. 88

    Restoring Factory-Default Settings...................................................................................... 89

    Important Point to Remember........................................................................................ 89

    Restoring Factory-Default Boot Environment Variables............................................90

    Using Hashes to Verify Software Images Before Installation.......................................... 91

    Verifying System Images on C9010 Components............................................................ 93

    When System Images on C9010 Components Do Not Match................................ 93

    Manually Resetting the System Image on a C9010 Component.............................94

    Logging in to the Virtual Console of a C9010 Component...................................... 95

    Booting the C9010 from an Image on a Network Server..........................................95

    Configuring C9010 Components to Boot from the RPM CP Image.......................95

    5 802.1X....................................................................................................................................... 97

    The Port-Authentication Process......................................................................................... 99

    EAP over RADIUS...............................................................................................................101

    Configuring 802.1X.................................................................................................................101

    Related Configuration Tasks...........................................................................................101

    Important Points to Remember.......................................................................................... 102

    Enabling 802.1X...................................................................................................................... 103

    Configuring dot1x Profile .....................................................................................................105

    Configuring MAC addresses for a do1x Profile................................................................ 106

    Configuring the Static MAB and MAB Profile .................................................................. 106

    Configuring Critical VLAN ....................................................................................................107

    Configuring Request Identity Re-Transmissions.............................................................108

    Configuring a Quiet Period after a Failed Authentication............................................. 109

    Forcibly Authorizing or Unauthorizing a Port...................................................................110

    Re-Authenticating a Port....................................................................................................... 111

    Configuring Dynamic VLAN Assignment with Port Authentication............................. 112

    Guest and Authentication-Fail VLANs................................................................................ 113

    Configuring a Guest VLAN.............................................................................................. 114

    Configuring an Authentication-Fail VLAN................................................................... 115

    Configuring Timeouts...................................................................................................... 116

    Multi-Host Authentication.....................................................................................................117

    Configuring Multi-Host AuthenticationConfiguring Single-Host

    Authentication...................................................................................................................120

    Multi-Supplicant Authentication..........................................................................................121

    Version 9.10(0.0) 5

  • Configuring Multi-Supplicant AuthenticationRestricting Multi-Supplicant

    Authentication................................................................................................................... 121

    MAC Authentication Bypass................................................................................................. 122

    MAB in Single-host and Multi-Host Mode.................................................................. 123

    MAB in Multi-Supplicant Authentication Mode..........................................................123

    Configuring MAC Authentication Bypass.................................................................... 124

    Dynamic CoS with 802.1X.................................................................................................... 125

    6 Access Control Lists (ACLs).................................................................................................127

    IP Access Control Lists (ACLs)............................................................................................. 128

    CAM Usage.........................................................................................................................128

    User-Configurable CAM Allocation..............................................................................130

    Allocating CAM for Ingress ACLs on the Port Extender........................................... 130

    Allocating CAM for Egress ACLs on the Port Extender.............................................132

    Implementing ACLs .........................................................................................................133

    IP Fragment Handling............................................................................................................134

    IP Fragments ACL Examples...........................................................................................135

    Layer 4 ACL Rules Examples.......................................................................................... 135

    Configure a Standard IP ACL............................................................................................... 136

    Configuring a Standard IP ACL Filter............................................................................ 137

    Configure an Extended IP ACL............................................................................................ 138

    Configuring Filters with a Sequence Number............................................................ 138

    Configuring Filters Without a Sequence Number..................................................... 140

    Configure Layer 2 and Layer 3 ACLs...................................................................................141

    Using ACL VLAN Groups....................................................................................................... 141

    Guidelines for Configuring ACL VLAN Groups...........................................................142

    Configuring an ACL VLAN Group..................................................................................142

    Allocating ACL VLAN CAM..............................................................................................143

    Applying an IP ACL to an Interface.....................................................................................144

    Applying Ingress ACLs on the Port Extender.............................................................. 145

    Applying Egress ACLs.......................................................................................................145

    Applying Layer 3 Egress ACLs on Control-Plane Traffic..........................................146

    Counting ACL Hits............................................................................................................ 147

    IP Prefix Lists............................................................................................................................ 147

    Implementation Information..........................................................................................148

    Configuration Task List for Prefix Lists.........................................................................148

    ACL Resequencing................................................................................................................. 152

    Resequencing an ACL or Prefix List.............................................................................. 152

    Route Maps.............................................................................................................................. 154

    Implementation Information..........................................................................................154

    Important Points to Remember.......................................................................................... 154

    Configuration Task List for Route Maps.......................................................................155

    Version 9.10(0.0) 6

  • Configuring Match Routes..............................................................................................157

    Configuring Set Conditions............................................................................................ 159

    Configure a Route Map for Route Redistribution......................................................160

    Configure a Route Map for Route Tagging................................................................ 160

    Continue Clause................................................................................................................161

    Configuring a UDF ACL......................................................................................................... 161

    Hot-Lock Behavior.................................................................................................................163

    7 Bidirectional Forwarding Detection (BFD).......................................................................164

    How BFD Works......................................................................................................................164

    BFD Packet Format...........................................................................................................166

    BFD Sessions......................................................................................................................168

    BFD Three-Way Handshake........................................................................................... 168

    Session State Changes.....................................................................................................170

    Important Points to Remember.......................................................................................... 170

    Configure BFD......................................................................................................................... 171

    Configure BFD for Static Routes.................................................................................... 171

    Configure BFD for OSPF..................................................................................................173

    Configure BFD for OSPFv3............................................................................................. 176

    Configure BFD for IS-IS................................................................................................... 177

    Configure BFD for BGP................................................................................................... 180

    Configure BFD for VRRP..................................................................................................187

    Configuring Protocol Liveness...................................................................................... 190

    8 Border Gateway Protocol IPv4 (BGPv4)...........................................................................191

    Autonomous Systems (AS)....................................................................................................191

    Sessions and Peers.................................................................................................................194

    Establish a Session............................................................................................................194

    Route Reflectors..................................................................................................................... 195

    Communities..................................................................................................................... 196

    BGP Attributes.........................................................................................................................196

    Best Path Selection Criteria............................................................................................ 196

    Weight.................................................................................................................................198

    Local Preference...............................................................................................................199

    Multi-Exit Discriminators (MEDs)...................................................................................199

    Origin..................................................................................................................................200

    AS Path................................................................................................................................201

    Next Hop............................................................................................................................ 201

    Multiprotocol BGP................................................................................................................. 202

    Implement BGP ..................................................................................................................... 202

    Additional Path (Add-Path) Support.............................................................................202

    Advertise IGP Cost as MED for Redistributed Routes...............................................202

    Version 9.10(0.0) 7

  • Ignore Router-ID for Some Best-Path Calculations.................................................203

    Four-Byte AS Numbers................................................................................................... 203

    AS4 Number Representation.........................................................................................204

    AS Number Migration......................................................................................................206

    BGP4 Management Information Base (MIB).............................................................. 208

    Important Points to Remember....................................................................................208

    Configuration Information...................................................................................................209

    BGP Configuration.................................................................................................................209

    Enabling BGP.....................................................................................................................210

    Configuring AS4 Number Representations.................................................................214

    Configuring Peer Groups................................................................................................216

    Configuring BGP Fast Fail-Over.................................................................................... 218

    Configuring Passive Peering.......................................................................................... 220

    Maintaining Existing AS Numbers During an AS Migration...................................... 221

    Allowing an AS Number to Appear in its Own AS Path............................................ 222

    Enabling Neighbor Graceful Restart.............................................................................223

    Filtering on an AS-Path Attribute.................................................................................. 224

    Regular Expressions as Filters........................................................................................ 225

    Redistributing Routes.......................................................................................................227

    Enabling Additional Paths............................................................................................... 227

    Configuring IP Community Lists...................................................................................228

    Configuring an IP Extended Community List.............................................................229

    Filtering Routes with Community Lists........................................................................230

    Manipulating the COMMUNITY Attribute.................................................................... 231

    Changing MED Attributes............................................................................................... 233

    Changing the LOCAL_PREFERENCE Attribute.......................................................... 233

    Changing the NEXT_HOP Attribute............................................................................. 234

    Changing the WEIGHT Attribute...................................................................................234

    Enabling Multipath........................................................................................................... 235

    Filtering BGP Routes........................................................................................................ 235

    Filtering BGP Routes Using Route Maps......................................................................237

    Filtering BGP Routes Using AS-PATH Information....................................................237

    Configuring BGP Route Reflectors...............................................................................238

    Aggregating Routes......................................................................................................... 239

    Configuring BGP Confederations.................................................................................239

    Enabling Route Flap Dampening.................................................................................. 240

    Changing BGP Timers..................................................................................................... 243

    Enabling BGP Neighbor Soft-Reconfiguration.......................................................... 243

    Route Map Continue....................................................................................................... 245

    Enabling MBGP Configurations...........................................................................................245

    BGP Regular Expression Optimization.............................................................................. 246

    Debugging BGP......................................................................................................................246

    Version 9.10(0.0) 8

  • Storing Last and Bad PDUs.............................................................................................247

    Capturing PDUs................................................................................................................248

    PDU Counters................................................................................................................... 250

    Sample Configurations......................................................................................................... 250

    9 Content Addressable Memory (CAM)...............................................................................260

    CAM Allocation.......................................................................................................................260

    Test CAM Usage..................................................................................................................... 262

    View CAM-ACL Settings....................................................................................................... 262

    View CAM Usage.................................................................................................................... 263

    Return to the Default CAM Configuration........................................................................264

    CAM Optimization................................................................................................................. 265

    Applications for CAM Profiling............................................................................................ 265

    LAG HashingLAG Hashing Based on Bidirectional Flow..........................................265

    Unified Forwarding Table (UFT) Modes.............................................................................265

    Configuring UFT Modes..................................................................................................266

    10 Control Plane Policing (CoPP).........................................................................................268

    CoPP Implementation.......................................................................................................... 268

    Protocol-based Control Plane Policing...................................................................... 268

    Queue-based Control Plane Policing..........................................................................269

    CoPP Example......................................................................................................................... 271

    Configure Control Plane Policing.......................................................................................273

    Configuring CoPP for Protocols................................................................................... 273

    Examples of Configuring CoPP for Protocols............................................................274

    Configuring CoPP for CPU Queues............................................................................. 275

    Examples of Configuring CoPP for CPU Queues......................................................276

    Displaying CoPP Configuration.....................................................................................276

    Troubleshooting CoPP Operation...................................................................................... 281

    Enabling CPU Traffic Statistics.......................................................................................281

    Viewing CPU Traffic Statistics........................................................................................282

    Troubleshooting CPU Packet Loss...............................................................................282

    Viewing Per-Protocol CoPP Counters........................................................................ 284

    Viewing Per-Queue CoPP Counters........................................................................... 288

    11 Data Center Bridging (DCB)............................................................................................. 290

    Enabling Data Center Bridging............................................................................................290

    Ethernet Enhancements in Data Center Bridging........................................................... 291

    Priority-Based Flow Control.......................................................................................... 292

    Enhanced Transmission Selection................................................................................294

    Data Center Bridging Exchange Protocol (DCBx).....................................................295

    Data Center Bridging in a Traffic Flow........................................................................ 296

    Version 9.10(0.0) 9

  • QoS dot1p Traffic Classification and Queue Assignment............................................. 296

    SNMP Support for PFC and Buffer Statistics Tracking....................................................297

    DCB Maps and its Attributes................................................................................................ 298

    DCB Map: Configuration Procedure............................................................................298

    Important Points to Remember.................................................................................... 299

    Applying a DCB Map on a Port......................................................................................299

    Configuring PFC without a DCB Map..........................................................................300

    Configuring Lossless Queues........................................................................................ 301

    Applying a DCB Map on a Line Card............................................................................302

    Data Center Bridging: Default Configuration.................................................................. 302

    Configuration Notes: PFC and ETS in a DCB Map..........................................................303

    PFC Configuration Notes............................................................................................... 303

    ETS Configuration Notes................................................................................................304

    ETS Prerequisites and Restrictions............................................................................... 305

    Priority-Group Configuration Notes............................................................................305

    Configuring Priority-Based Flow Control.........................................................................306

    Configuring Lossless Queues........................................................................................ 307

    Configuring Enhanced Transmission Selection.............................................................. 308

    Creating an ETS Priority Group.....................................................................................308

    ETS Operation with DCBx.............................................................................................. 309

    Configure a DCBx Operation...............................................................................................310

    DCBx Operation................................................................................................................310

    DCBx Port Roles............................................................................................................... 310

    DCB Configuration Exchange........................................................................................312

    Configuration Source Election...................................................................................... 313

    Propagation of DCB Information.................................................................................. 313

    Auto-Detection and Manual Configuration of the DCBx Version......................... 314

    Behavior of Tagged Packets...........................................................................................314

    Configuration Example for DSCP and PFC Priorities................................................ 315

    DCBx Example...................................................................................................................316

    DCBx Prerequisites and Restrictions.............................................................................317

    Configuring DCBx.............................................................................................................317

    Verifying the DCB Configuration.........................................................................................321

    Performing PFC Using DSCP Bits Instead of 802.1p Bits...............................................332

    PFC and ETS Configuration Examples...............................................................................333

    Using PFC and ETS to Manage Data Center Traffic........................................................333

    PFC and ETS Configuration Command Examples.................................................... 335

    Using PFC and ETS to Manage Converged Ethernet Traffic...................................336

    Hierarchical Scheduling in ETS Output Policies........................................................ 336

    Priority-Based Flow Control Using Dynamic Buffer Method........................................337

    Pause and Resume of Traffic......................................................................................... 337

    Buffer Sizes for Lossless or PFC Packets..................................................................... 337

    Version 9.10(0.0) 10

  • Configuring the Dynamic Buffer Method......................................................................... 338

    12 Debugging and Diagnostics.............................................................................................340

    Offline Diagnostics................................................................................................................ 340

    Running Port Extender Offline Diagnostics on the Switch......................................341

    Running Offline Diagnostics on a Standalone Switch..............................................348

    TRACE Logs..............................................................................................................................371

    Auto Save on Reload, Crash, or Rollover..................................................................... 371

    Uploading Trace Logs...................................................................................................... 371

    Last Restart Reason................................................................................................................372

    show hardware Commands.................................................................................................372

    Environmental Monitoring....................................................................................................375

    Displaying Port Extender Environment Information ................................................ 375

    Display Power Supply Status..........................................................................................376

    Display Fan Status.............................................................................................................377

    Display Transceiver Type.................................................................................................377

    Recognize an Over-Temperature Condition............................................................. 379

    Troubleshoot an Over-Temperature Condition....................................................... 380

    Troubleshooting Packet Loss.............................................................................................. 382

    Displaying Drop Counters.............................................................................................. 383

    Displaying Dataplane Statistics......................................................................................384

    Displaying Line-Card Counters.....................................................................................386

    Accessing Application Core Dumps...................................................................................387

    Mini Core Dumps...................................................................................................................388

    Full Kernel Core Dumps....................................................................................................... 388

    Enabling TCP Dumps............................................................................................................ 389

    Accessing Port Extender Core and Mini Core Dumps...................................................390

    13 Dynamic Host Configuration Protocol (DHCP)............................................................ 391

    DHCP Packet Format and Options.....................................................................................391

    Assign an IP Address using DHCP...................................................................................... 393

    Implementation Information............................................................................................... 394

    Configure the System to be a DHCP Server.....................................................................395

    Configuring the Server for Automatic Address Allocation...................................... 396

    Specifying a Default Gateway........................................................................................397

    Configure a Method of Hostname Resolution...........................................................397

    Using DNS for Address Resolution............................................................................... 398

    Using NetBIOS WINS for Address Resolution............................................................ 398

    Creating Manual Binding Entries...................................................................................398

    Debugging the DHCP Server.........................................................................................399

    Using DHCP Clear Commands..................................................................................... 399

    Configure the System to be a Relay Agent.......................................................................399

    Version 9.10(0.0) 11

  • Configure the System to be a DHCP Client..................................................................... 401

    DHCP Client on a Management Interface.................................................................. 401

    DHCP Client Operation with Other Features.............................................................402

    Configure Secure DHCP...................................................................................................... 403

    Option 82...........................................................................................................................403

    DHCP Snooping............................................................................................................... 404

    Drop DHCP Packets on Snooped VLANs Only..........................................................406

    Dynamic ARP Inspection................................................................................................ 407

    Configuring Dynamic ARP Inspection.........................................................................408

    Source Address Validation................................................................................................... 409

    Enabling IP Source Address Validation........................................................................409

    DHCP MAC Source Address Validation....................................................................... 410

    Enabling IP+MAC Source Address Validation.............................................................410

    Viewing the Number of SAV Dropped Packets...........................................................411

    Clearing the Number of SAV Dropped Packets......................................................... 412

    14 Equal Cost Multi-Path (ECMP)......................................................................................... 413

    ECMP for Flow-Based Affinity..............................................................................................413

    Enabling Deterministic ECMP Next Hop......................................................................413

    Configuring the Hash Algorithm Seed......................................................................... 413

    Link Bundle Monitoring...................................................................................................414

    Managing ECMP Group Paths............................................................................................. 415

    Creating an ECMP Group Bundle....................................................................................... 415

    Modifying the ECMP Group Threshold..............................................................................416

    BGP Multipath Operation with Link Bankwidth............................................................... 416

    Dynamic Re-calculation of Link Bankwidth..................................................................... 419

    Weighted ECMP for Static Routes...................................................................................... 419

    ECMP Support in L3 Host and LPM Tables.......................................................................420

    15 FCoE Transit.........................................................................................................................421

    Fibre Channel over Ethernet................................................................................................ 421

    Ensure Robustness in a Converged Ethernet Network..................................................421

    FIP Snooping on Ethernet Bridges..................................................................................... 423

    FIP Snooping in a Switch Stack...........................................................................................426

    Using FIP Snooping............................................................................................................... 426

    FIP Snooping Prerequisites............................................................................................ 426

    Important Points to Remember.................................................................................... 427

    Enabling the FCoE Transit Feature............................................................................... 427

    Enable FIP Snooping on VLANs.....................................................................................428

    Configure the FC-MAP Value........................................................................................ 428

    Configure a Port for a Bridge-to-Bridge Link............................................................ 428

    Configure a Port for a Bridge-to-FCF Link.................................................................428

    Version 9.10(0.0) 12

  • Impact on Other Software Features.............................................................................429

    FIP Snooping Restrictions.............................................................................................. 429

    Configuring FIP Snooping....................................................................................................430

    Displaying FIP Snooping Information.................................................................................431

    FCoE Transit Configuration Example.................................................................................437

    16 FIPS Cryptography............................................................................................................. 439

    Configuration Tasks...............................................................................................................439

    Preparing the System............................................................................................................440

    Enabling FIPS Mode...............................................................................................................440

    Generating Host-Keys...........................................................................................................441

    Monitoring FIPS Mode Status...............................................................................................441

    Disabling FIPS Mode..............................................................................................................442

    17 Flex Hash and Optimized Boot-Up................................................................................. 443

    Flex Hash Capability Overview............................................................................................443

    Configuring the Flex Hash Mechanism.............................................................................444

    LACP Fast Switchover........................................................................................................... 444

    Configuring LACP Fast Switchover.................................................................................... 445

    LACP......................................................................................................................................... 445

    LACP Fast Switchover......................................................................................................445

    RDMA Over Converged Ethernet (RoCE) Overview....................................................... 445

    Sample Configurations......................................................................................................... 447

    ..............................................................................................................................................447

    Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces...........................................450

    18 Force10 Resilient Ring Protocol (FRRP).........................................................................452

    Protocol Overview................................................................................................................. 452

    Ring Status......................................................................................................................... 453

    Multiple FRRP Rings.........................................................................................................454

    Important FRRP Points....................................................................................................454

    Implementing FRRP......................................................................................................... 455

    Important FRRP Concepts..............................................................................................455

    FRRP Configuration............................................................................................................... 456

    Creating the FRRP Group............................................................................................... 457

    Configuring the Control VLAN...................................................................................... 457

    Configuring and Adding the Member VLANs.............................................................458

    Setting the FRRP Timers................................................................................................. 459

    Clearing the FRRP Counters..........................................................................................460

    Viewing the FRRP Configuration.................................................................................. 460

    Viewing the FRRP Information......................................................................................460

    Troubleshooting FRRP.......................................................................................................... 461

    Version 9.10(0.0) 13

  • Configuration Checks......................................................................................................461

    Sample Configuration and Topology.................................................................................461

    19 GARP VLAN Registration Protocol (GVRP)....................................................................463

    Important Points to Remember..........................................................................................463

    Configure GVRP..................................................................................................................... 464

    Related Configuration Tasks..........................................................................................465

    Enabling GVRP Globally........................................................................................................465

    Enabling GVRP on a Layer 2 Interface...............................................................................465

    Configure GVRP Registration..............................................................................................466

    Configure a GARP Timer...................................................................................................... 466

    20 High Availability (HA)........................................................................................................ 468

    High Availability on Chassis................................................................................................. 468

    High Availability in a PE Stack..............................................................................................469

    Online Insertion and Removal............................................................................................ 469

    RPM Online Insertion...................................................................................................... 469

    Line Card Online Insertion............................................................................................. 469

    Pre-configuring a Slot for a Line-Card Type..............................................................470

    Replacing a Line Card..................................................................................................... 470

    Hitless Behavior.......................................................................................................................471

    Graceful Restart......................................................................................................................472

    Software Resiliency................................................................................................................472

    System Health Monitoring..............................................................................................472

    Failure and Event Logging.............................................................................................. 472

    Trace Log........................................................................................................................... 472

    Core Dumps...................................................................................................................... 473

    System Log........................................................................................................................ 473

    Control Plane Redundancy.................................................................................................. 473

    Control-Plane Failover....................................................................................................474

    RPM Synchronization...................................................................................................... 475

    Forcing an RPM Failover................................................................................................. 475

    Specifying an Auto-Failover Limit................................................................................. 475

    Disabling Auto-Reboot................................................................................................... 476

    21 Internet Group Management Protocol (IGMP)............................................................. 477

    IGMP Implementation Information.................................................................................... 477

    IGMP Protocol Overview......................................................................................................478

    IGMP Version 2................................................................................................................. 478

    IGMP Version 3................................................................................................................. 479

    Configure IGMP......................................................................................................................483

    Related Configuration Tasks..........................................................................................483

    Version 9.10(0.0) 14

  • Viewing IGMP Enabled Interfaces...................................................................................... 483

    Selecting an IGMP Version...................................................................................................484

    Viewing IGMP Groups...........................................................................................................484

    Enabling IGMP Immediate-Leave.......................................................................................485

    IGMP Snooping...................................................................................................................... 485

    IGMP Snooping Implementation Information........................................................... 485

    Configuring IGMP Snooping......................................................................................... 486

    Removing a Group-Port Association...........................................................................486

    Disabling Multicast Flooding..........................................................................................487

    Specifying a Port as Connected to a Multicast Router............................................ 487

    Configuring the Switch as Querier............................................................................... 487

    Fast Convergence after MSTP Topology Changes.........................................................488

    Designating a Multicast Router Interface......................................................................... 489

    22 Interfaces.............................................................................................................................490

    Basic Interface Configuration............................................................................................. 490

    Advanced Interface Configuration.....................................................................................490

    Port Numbering......................................................................................................................492

    Interface Types....................................................................................................................... 495

    View Basic Interface Information....................................................................................... 495

    Resetting an Interface to its Factory Default State......................................................... 502

    Enabling a Physical Interface...............................................................................................503

    Physical Interfaces................................................................................................................. 503

    Port Pipes...........................................................................................................................503

    Setting the Speed and Duplex Mode of Ethernet Interfaces.................................. 504

    Configuration Task List for Physical Interfaces..........................................................505

    Overview of Layer Modes...............................................................................................505

    Configuring Layer 2 (Data Link) Mode.........................................................................506

    Configuring Layer 2 (Interface) Mode..........................................................................506

    Configuring Layer 3 (Network) Mode.......................................................................... 506

    Configuring Layer 3 (Interface) Mode..........................................................................507

    Egress Interface Selection (EIS)...........................................................................................508

    Important Points to Remember....................................................................................508

    Configuring EIS.................................................................................................................508

    Management Interfaces........................................................................................................509

    Configuring a Dedicated Management Interface .................................................... 509

    Configuring a Management Interface on an Ethernet Port.....................................510

    Port Extender Interfaces........................................................................................................511

    VLAN Interfaces.......................................................................................................................512

    Loopback Interfaces.............................................................................................................. 513

    Null Interfaces......................................................................................................................... 513

    Port Channel Interfaces........................................................................................................ 514

    Version 9.10(0.0) 15

  • Port Channel Definition and Standards....................................................................... 514

    Port Channel Benefits......................................................................................................514

    Port Channel Implementation....................................................................................... 514

    10/40 Gbps Interfaces in Port Channels......................................................................515

    Configuration Tasks for Port Channel Interfaces...................................................... 515

    Creating a Port Channel..................................................................................................516

    Adding a Physical Interface to a Port Channel...........................................................516

    Reassigning an Interface to a New Port Channel......................................................518

    Configuring the Minimum Oper Up Links in a Port Channel.................................. 519

    Adding or Removing a Port Channel from a VLAN...................................................520

    Assigning an IP Address to a Port Channel.................................................................520

    Deleting or Disabling a Port Channel........................................................................... 521

    Load Balancing Through Port Channels......................................................................521

    Changing the Hash Algorithm....................................................................................... 521

    Bulk Configuration.................................................................................................................522

    Interface Range.................................................................................................................522

    Bulk Configuration Examples.........................................................................................523

    Defining Interface Range Macros....................................................................................... 524

    Define the Interface Range............................................................................................ 525

    Choosing an Interface-Range Macro.......................................................................... 525

    Monitoring and Maintaining Interfaces..............................................................................525

    Maintenance Using TDR................................................................................................. 526

    Displaying Traffic Statistics on HiGig Ports.......................................................................527

    Link Bundle Monitoring.........................................................................................................528

    Monitoring HiGig Link Bundles........................................................................................... 529

    Guidelines for Monitoring HiGig Link-Bundles .........................................................530

    Enabling HiGig Link-Bundle Monitoring......................................................................531

    Non Dell-Qualified Transceivers......................................................................................... 531

    Splitting QSFP Ports to SFP+ Ports.....................................................................................532

    Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port.................................... 533

    Configuring wavelength for 10–Gigabit SFP+ optics.................................................... 534

    Link Dampening......................................................................................................................535

    Important Points to Remember.................................................................................... 535

    Enabling Link Dampening...............................................................................................535

    Using Ethernet Pause Frames for Flow Control...............................................................537

    Threshold Settings........................................................................................................... 538

    Enabling Pause Frames................................................................................................... 539

    Configure the MTU Size on an Interface.......................................................................... 539

    Auto-Negotiation on Ethernet Interfaces.........................................................................540

    Set Auto-Negotiation Options.......................................................................................541

    View Advanced Interface Information............................................................................... 541

    Configuring the Interface Sampling Size.................................................................... 542

    Version 9.10(0.0) 16

  • Dynamic Counters.................................................................................................................543

    Clearing Interface Counters.......................................................................................... 544

    23 Internet Protocol Security (IPSec).................................................................................. 545

    Configuring IPSec ................................................................................................................. 546

    24 IPv4 Routing....................................................................................................................... 547

    IP Addresses............................................................................................................................ 547

    Implementation Information......................................................................................... 548

    Configuration Tasks for IP Addresses................................................................................548

    Assigning IP Addresses to an Interface..............................................................................548

    Configuring Static Routes.................................................................................................... 549

    Configure Static Routes for the Management Interface................................................551

    Enabling Directed Broadcast................................................................................................551

    Resolution of Host Names....................................................................................................551

    Enabling Dynamic Resolution of Host Names.................................................................552

    Specifying the Local System Domain and a List of Domains........................................552

    Configuring DNS with Traceroute......................................................................................553

    ARP............................................................................................................................................ 554

    Configuration Tasks for ARP.......................................................................................... 554

    Configuring Static ARP Entries...................................................................................... 554

    Configuring ARP Inspection Trust................................................................................ 555

    Configuring ARP Timeout...............................................................................................556

    Enabling Proxy ARP..........................................................................................................556

    Clearing ARP Cache.........................................................................................................556

    ARP Learning via Gratuitous ARP.................................................................................. 557

    Enabling ARP Learning via Gratuitous ARP................................................................. 557

    ARP Learning via ARP Request...................................................................................... 558

    Configuring ARP Retries..................................................................................................559

    ICMP..........................................................................................................................................559

    Configuration Tasks for ICMP........................................................................................559

    Enabling ICMP Unreachable Messages....................................................................... 560

    25 IPv6 Routing........................................................................................................................561

    Protocol Overview................................................................................................................. 561

    Extended Address Space.................................................................................................562

    Stateless Autoconfiguration...........................................................................................562

    IPv6 Headers..................................................................................................................... 563

    IPv6 Header Fields............................................................................................................563

    Extension Header Fields..................................................................................................565

    IPv6 Addressing................................................................................................................ 566

    IPv6 Implementation on the Dell Networking OS...........................................................567

    Version 9.10(0.0) 17

  • Configuring the LPM Table for IPv6 Extended Prefixes.................................................569

    ICMPv6..................................................................................................................................... 570

    Path MTU Discovery.............................................................................................................. 570

    IPv6 Neighbor Discovery.......................................................................................................571

    IPv6 Neighbor Discovery of MTU Packets.................................................................. 572

    Configuring the IPv6 Recursive DNS Server............................................................... 572

    Secure Shell (SSH) Over an IPv6 Transport.......................................................................574

    Configuration Tasks for IPv6................................................................................................575

    Adjusting Your CAM Profile............................................................................................ 575

    Assigning an IPv6 Address to an Interface.................................................................. 576

    Assigning a Static IPv6 Route.........................................................................................576

    Configuring Telnet with IPv6......................................................................................... 577

    SNMP over IPv6.................................................................................................................577

    Displaying IPv6 Information........................................................................................... 578

    Displaying an IPv6 Configuration..................................................................................578

    Displaying IPv6 Routes.................................................................................................... 579

    Displaying the Running Configuration for an Interface...........................................580

    Clearing IPv6 Routes........................................................................................................581

    26 Intermediate System to Intermediate System.............................................................. 582

    IS-IS Protocol Overview....................................................................................................... 582

    IS-IS Addressing......................................................................................................................583

    Multi-Topology IS-IS............................................................................................................. 583

    Transition Mode................................................................................................................584

    Interface Support............................................................................................................. 584

    Adjacencies........................................................................................................................584

    Graceful Restart......................................................................................................................585

    Timers................................................................................................................................. 585

    Implementation Information............................................................................................... 585

    Configuration Information...................................................................................................586

    Configuration Tasks for IS-IS......................................................................................... 587

    Configuring the Distance of a Route........................................................................... 596

    Changing the IS-Type..................................................................................................... 596

    Redistributing IPv4 Routes............................................................................................. 599

    Redistributing IPv6 Routes.............................................................................................600

    Configuring Authentication Passwords....................................................................... 601

    Setting the Overload Bit..................................................................................................601

    Debugging IS-IS............................................................................................................... 602

    IS-IS Metric Styles.................................................................................................................. 603

    Configure Metric Values.......................................................................................................603

    Maximum Values in the Routing Table........................................................................604

    Change the IS-IS Metric Style in One Level Only..................................................... 604

    Version 9.10(0.0) 18

  • Leaks from One Level to Another................................................................................ 606

    Sample Configurations......................................................................................................... 607

    27 iSCSI Optimization.............................................................................................................610

    iSCSI Optimization Overview...............................................................................................610

    Default iSCSI Optimization Values......................................................................................613

    iSCSI Optimization Prerequisites.........................................................................................613

    Configuring iSCSI Optimization.......................................................................................... 613

    Displaying iSCSI Optimization Information...................................................................... 616

    Enable and Disable iSCSI Optimization..............................................................................617

    Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.......................... 618

    Monitoring iSCSI Traffic Flows............................................................................................ 618

    Information Monitored in iSCSI Traffic Flows.................................................................. 619

    Detection and Auto-Configuration for Dell EqualLogic Arrays................................... 620

    Configuring Detection and Ports for Dell Compellent Arrays..................................... 620

    Application of Quality of Service to iSCSI Traffic Flows.................................................621

    28 Link Aggregation Control Protocol (LACP)...................................................................622

    Introduction to Dynamic LAGs and LACP........................................................................ 622

    Important Points to Remember.................................................................................... 622

    LACP Modes...................................................................................................................... 623

    Configuring LACP Commands......................................................................................623

    LACP Configuration Tasks................................................................................................... 624

    Creating a LAG..................................................................................................................624

    Configuring the LAG Interfaces as Dynamic.............................................................. 625

    Setting the LACP Long Timeout....................................................................................625

    Monitoring and Debugging LACP.................................................................................626

    Shared LAG State Tracking...................................................................................................627

    Configuring Shared LAG State Tracking......................................................................627

    Important Points about Shared LAG State Tracking.................................................629

    LACP Basic Configuration Example................................................................................... 629

    Configure a LAG on ALPHA........................................................................................... 630

    29 Layer 2..................................................................................................................................638

    Manage the MAC Address Table.........................................................................................638

    Clearing the MAC Address Table.................................................................................. 638

    Setting the Aging Time for Dynamic Entries.............................................................. 638

    Configuring a Static MAC Address................................................................................639

    Displaying the MAC Address Table...............................................................................639

    MAC Learning Limit............................................................................................................... 639

    Setting the MAC Learning Limit.................................................................................... 640

    mac learning-limit Dynamic..........................................................................................640

    Version 9.10(0.0) 19

  • mac learning-limit mac-address-sticky...................................................................... 641

    mac learning-limit station-move..................................................................................641

    mac learning-limit no-station-move........................................................................... 641

    Learning Limit Violation Actions................................................................................... 642

    Setting Station Move Violation Actions....................................................................... 642

    Recovering from Learning Limit and Station Move Violations............................... 643

    Disabling MAC Address Learning on the System...................................................... 643

    NIC Teaming...........................................................................................................................644

    Configure Redundant Pairs..................................................................................................645

    Important Points about Configuring Redundant Pairs.............................................647

    Far-End Failure Detection....................................................................................................649

    FEFD State Changes........................................................................................................ 650

    Configuring FEFD..............................................................................................................651

    Enabling FEFD on an Interface...................................................................................... 652

    Debugging FEFD...............................................................................................................653

    30 Link Layer Discovery Protocol (LLDP)............................................................................654

    802.1AB (LLDP) Overview...........................................................................................