dell networking configuration guide for the c9010 series ... · 2016 - 12 rev. a00. contents 1...

1117
Dell Networking Configuration Guide for the C9010 Series Version 9.11(0.0)

Upload: others

Post on 26-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

  • Dell Networking Configuration Guide for the C9010 SeriesVersion 9.11(0.0)

  • Notes, Cautions, and Warnings

    NOTE: A NOTE indicates important information that helps you make better use of your computer.

    CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.

    WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

    © 2016 Dell Inc. or its subsidiaries. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.

    2016 - 12

    Rev. A00

  • Contents

    1 About this Guide...........................................................................................................................................35Audience........................................................................................................................................................................... 35Conventions......................................................................................................................................................................35Related Documents......................................................................................................................................................... 35

    2 Configuration Fundamentals........................................................................................................................36Accessing the Command Line........................................................................................................................................36CLI Modes.........................................................................................................................................................................36

    Navigating CLI Modes...............................................................................................................................................38The do Command............................................................................................................................................................. 41Undoing Commands........................................................................................................................................................ 42Obtaining Help..................................................................................................................................................................42Entering and Editing Commands................................................................................................................................... 42Command History............................................................................................................................................................ 43Filtering show Command Outputs.................................................................................................................................44Multiple Users in Configuration Mode...........................................................................................................................45

    3 Getting Started........................................................................................................................................... 46Console Access................................................................................................................................................................46

    Serial Console............................................................................................................................................................. 47Mounting an NFS File System........................................................................................................................................48

    Important Points to Remember............................................................................................................................... 48Default Configuration...................................................................................................................................................... 49Configuring a Host Name............................................................................................................................................... 49Accessing the System Remotely................................................................................................................................... 50

    Accessing the System Remotely............................................................................................................................. 50Configure the Management Port IP Address.........................................................................................................50Configure a Management Route............................................................................................................................. 50Configuring a Username and Password.................................................................................................................. 51

    Configuring the Enable Password.................................................................................................................................. 51Manage Configuration Files.............................................................................................................................................51

    File Storage.................................................................................................................................................................52Copy Files to and from the System.........................................................................................................................52Save the Running-Configuration............................................................................................................................. 53Configure the Overload Bit for a Startup Scenario...............................................................................................54Viewing Files...............................................................................................................................................................54Changes in Configuration Files................................................................................................................................ 55

    Viewing Command History............................................................................................................................................. 55Upgrading the Dell Networking OS............................................................................................................................... 55

    4 Switch Management....................................................................................................................................57Configuring Privilege Levels........................................................................................................................................... 57

    Contents 3

  • Creating a Custom Privilege Level...........................................................................................................................57Removing a Command from EXEC Mode.............................................................................................................. 57Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 57Allowing Access to CONFIGURATION Mode Commands................................................................................... 58Allowing Access to the Following Modes............................................................................................................... 58Applying a Privilege Level to a Username...............................................................................................................59Applying a Privilege Level to a Terminal Line......................................................................................................... 60

    Configuring Logging........................................................................................................................................................ 60Audit and Security Logs............................................................................................................................................60Configuring Logging Format .................................................................................................................................. 62Setting Up a Secure Connection to a Syslog Server............................................................................................ 62

    Track Login Activity.........................................................................................................................................................64Restrictions for Tracking Login Activity..................................................................................................................64Configuring Login Activity Tracking........................................................................................................................ 64Display Login Statistics............................................................................................................................................. 64

    Limit Concurrent Login Sessions................................................................................................................................... 66Restrictions for Limiting the Number of Concurrent Sessions............................................................................66Configuring Concurrent Session Limit.................................................................................................................... 66Enabling the System to Clear Existing Sessions.................................................................................................... 67

    Enabling Secured CLI Mode........................................................................................................................................... 67Log Messages in the Internal Buffer............................................................................................................................. 68

    Configuration Task List for System Log Management.........................................................................................68Disabling System Logging...............................................................................................................................................68Sending System Messages to a Syslog Server............................................................................................................68

    Configuring a UNIX System as a Syslog Server.................................................................................................... 69Display the Logging Buffer and the Logging Configuration....................................................................................... 69Changing System Logging Settings.............................................................................................................................. 70Configuring a UNIX Logging Facility Level................................................................................................................... 70Synchronizing Log Messages..........................................................................................................................................71Enabling Timestamp on Syslog Messages.................................................................................................................... 72File Transfer Services...................................................................................................................................................... 72

    Configuration Task List for File Transfer Services.................................................................................................72Enabling the FTP Server........................................................................................................................................... 73Configuring FTP Server Parameters....................................................................................................................... 73Configuring FTP Client Parameters.........................................................................................................................73

    Terminal Lines...................................................................................................................................................................74Denying and Permitting Access to a Terminal Line............................................................................................... 74Configuring Login Authentication for Terminal Lines............................................................................................ 75

    Setting Time Out of EXEC Privilege Mode...................................................................................................................75Using Telnet to Access Another Network Device....................................................................................................... 76Lock CONFIGURATION Mode....................................................................................................................................... 77

    Viewing the Configuration Lock Status...................................................................................................................77Recovering from a Forgotten Password ......................................................................................................................78Ignoring the Startup Configuration and Booting from the Factory-Default Configuration....................................78Recovering from a Failed Start...................................................................................................................................... 79

    4 Contents

  • Restoring Factory-Default Settings...............................................................................................................................79Important Point to Remember................................................................................................................................. 79Restoring Factory-Default Boot Environment Variables...................................................................................... 80

    Using Hashes to Verify Software Images Before Installation..................................................................................... 81Verifying System Images on C9010 Components....................................................................................................... 82

    When System Images on C9010 Components Do Not Match............................................................................ 83Manually Resetting the System Image on a C9010 Component......................................................................... 83Logging in to the Virtual Console of a C9010 Component................................................................................... 84Booting the C9010 from an Image on a Network Server..................................................................................... 84Configuring C9010 Components to Boot from the RPM CP Image................................................................... 84

    5 802.1X......................................................................................................................................................... 86The Port-Authentication Process..................................................................................................................................88

    EAP over RADIUS......................................................................................................................................................89Configuring 802.1X.......................................................................................................................................................... 90

    Related Configuration Tasks.................................................................................................................................... 90Important Points to Remember..................................................................................................................................... 90Enabling 802.1X.................................................................................................................................................................91Configuring dot1x Profile ................................................................................................................................................93Configuring MAC addresses for a do1x Profile............................................................................................................ 93Configuring the Static MAB and MAB Profile .............................................................................................................94Configuring Critical VLAN ..............................................................................................................................................95Configuring Request Identity Re-Transmissions......................................................................................................... 95Configuring a Quiet Period after a Failed Authentication...........................................................................................96Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 97Re-Authenticating a Port................................................................................................................................................98Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................... 98Guest and Authentication-Fail VLANs.......................................................................................................................... 99

    Configuring a Guest VLAN......................................................................................................................................100Configuring an Authentication-Fail VLAN..............................................................................................................101Configuring Timeouts...............................................................................................................................................102

    Multi-Host Authentication.............................................................................................................................................103Configuring Multi-Host AuthenticationConfiguring Single-Host Authentication............................................. 104

    Multi-Supplicant Authentication...................................................................................................................................105Configuring Multi-Supplicant AuthenticationRestricting Multi-Supplicant Authentication............................ 106

    MAC Authentication Bypass......................................................................................................................................... 107MAB in Single-host and Multi-Host Mode............................................................................................................ 107MAB in Multi-Supplicant Authentication Mode....................................................................................................108Configuring MAC Authentication Bypass..............................................................................................................108

    Dynamic CoS with 802.1X.............................................................................................................................................109

    6 Access Control Lists (ACLs)........................................................................................................................111IP Access Control Lists (ACLs)......................................................................................................................................111

    CAM Usage................................................................................................................................................................112User-Configurable CAM Allocation......................................................................................................................... 113Allocating CAM for Ingress ACLs on the Port Extender......................................................................................113

    Contents 5

  • Allocating CAM for Egress ACLs on the Port Extender...................................................................................... 115Implementing ACLs ..................................................................................................................................................116

    IP Fragment Handling..................................................................................................................................................... 117IP Fragments ACL Examples................................................................................................................................... 117Layer 4 ACL Rules Examples................................................................................................................................... 118

    Configure a Standard IP ACL........................................................................................................................................ 119Configuring a Standard IP ACL Filter.....................................................................................................................120

    Configure an Extended IP ACL.....................................................................................................................................120Configuring Filters with a Sequence Number........................................................................................................121Configuring Filters Without a Sequence Number................................................................................................ 122

    Configure Layer 2 and Layer 3 ACLs........................................................................................................................... 122Using ACL VLAN Groups...............................................................................................................................................123

    Guidelines for Configuring ACL VLAN Groups..................................................................................................... 123Configuring an ACL VLAN Group...........................................................................................................................124Allocating ACL VLAN CAM..................................................................................................................................... 125

    Applying an IP ACL to an Interface.............................................................................................................................. 125Applying Ingress ACLs on the Port Extender....................................................................................................... 126Applying Egress ACLs.............................................................................................................................................. 127Applying Layer 3 Egress ACLs on Control-Plane Traffic.....................................................................................127Counting ACL Hits....................................................................................................................................................128

    IP Prefix Lists.................................................................................................................................................................. 128Implementation Information.................................................................................................................................... 128Configuration Task List for Prefix Lists................................................................................................................. 129

    ACL Resequencing......................................................................................................................................................... 132Resequencing an ACL or Prefix List...................................................................................................................... 133

    Route Maps.....................................................................................................................................................................134Implementation Information.................................................................................................................................... 134

    Important Points to Remember.................................................................................................................................... 134Configuration Task List for Route Maps............................................................................................................... 134Configuring Match Routes...................................................................................................................................... 137Configuring Set Conditions..................................................................................................................................... 138Configure a Route Map for Route Redistribution................................................................................................ 139Configure a Route Map for Route Tagging.......................................................................................................... 139Continue Clause........................................................................................................................................................140

    Configuring a UDF ACL................................................................................................................................................. 140Hot-Lock Behavior......................................................................................................................................................... 142

    7 Bidirectional Forwarding Detection (BFD).................................................................................................. 143How BFD Works............................................................................................................................................................. 143

    BFD Packet Format................................................................................................................................................. 144BFD Sessions............................................................................................................................................................ 145BFD Three-Way Handshake................................................................................................................................... 146Session State Changes............................................................................................................................................148

    Important Points to Remember....................................................................................................................................148Configure BFD................................................................................................................................................................ 148

    Configure BFD for Physical Ports.......................................................................................................................... 149

    6 Contents

  • Configure BFD for Static Routes........................................................................................................................... 150Configure BFD for OSPF.........................................................................................................................................153Configure BFD for OSPFv3.................................................................................................................................... 156Configure BFD for IS-IS...........................................................................................................................................157Configure BFD for BGP...........................................................................................................................................160Configure BFD for VRRP........................................................................................................................................ 166Configuring Protocol Liveness................................................................................................................................169

    8 Border Gateway Protocol IPv4 (BGPv4).................................................................................................... 170Autonomous Systems (AS)...........................................................................................................................................170Sessions and Peers.........................................................................................................................................................172

    Establish a Session................................................................................................................................................... 172Route Reflectors.............................................................................................................................................................173

    Communities..............................................................................................................................................................174BGP Attributes................................................................................................................................................................174

    Best Path Selection Criteria.................................................................................................................................... 174Weight........................................................................................................................................................................176Local Preference...................................................................................................................................................... 176Multi-Exit Discriminators (MEDs)...........................................................................................................................177Origin.......................................................................................................................................................................... 178AS Path......................................................................................................................................................................178Next Hop................................................................................................................................................................... 179

    Multiprotocol BGP..........................................................................................................................................................179Implement BGP ..............................................................................................................................................................179

    Additional Path (Add-Path) Support..................................................................................................................... 179Advertise IGP Cost as MED for Redistributed Routes........................................................................................180Ignore Router-ID for Some Best-Path Calculations............................................................................................ 180Four-Byte AS Numbers........................................................................................................................................... 180AS4 Number Representation...................................................................................................................................181AS Number Migration.............................................................................................................................................. 182BGP4 Management Information Base (MIB)....................................................................................................... 184Important Points to Remember..............................................................................................................................184

    Configuration Information............................................................................................................................................. 185BGP Configuration......................................................................................................................................................... 185

    Enabling BGP............................................................................................................................................................ 186Configuring AS4 Number Representations...........................................................................................................189Configuring Peer Groups.........................................................................................................................................190Configuring BGP Fast Fail-Over.............................................................................................................................193Configuring Passive Peering................................................................................................................................... 194Maintaining Existing AS Numbers During an AS Migration.................................................................................195Allowing an AS Number to Appear in its Own AS Path.......................................................................................196Enabling Neighbor Graceful Restart...................................................................................................................... 197Filtering on an AS-Path Attribute........................................................................................................................... 197Regular Expressions as Filters................................................................................................................................ 198Redistributing Routes............................................................................................................................................. 200Enabling Additional Paths....................................................................................................................................... 200

    Contents 7

  • Configuring IP Community Lists.............................................................................................................................201Configuring an IP Extended Community List....................................................................................................... 202Filtering Routes with Community Lists.................................................................................................................203Manipulating the COMMUNITY Attribute............................................................................................................203Changing MED Attributes...................................................................................................................................... 205Changing the LOCAL_PREFERENCE Attribute................................................................................................. 205Configuring the local System or a Different System to be the Next Hop for BGP-Learned Routes...........206Changing the WEIGHT Attribute...........................................................................................................................206Enabling Multipath...................................................................................................................................................207Filtering BGP Routes...............................................................................................................................................207Filtering BGP Routes Using Route Maps............................................................................................................. 208Filtering BGP Routes Using AS-PATH Information.............................................................................................209Configuring BGP Route Reflectors........................................................................................................................210Aggregating Routes................................................................................................................................................. 210Configuring BGP Confederations............................................................................................................................211Enabling Route Flap Dampening..............................................................................................................................211Changing BGP Timers..............................................................................................................................................214Enabling BGP Neighbor Soft-Reconfiguration..................................................................................................... 214Enabling or disabling BGP neighbors..................................................................................................................... 215Route Map Continue................................................................................................................................................217

    Enabling MBGP Configurations.................................................................................................................................... 217BGP Regular Expression Optimization.........................................................................................................................218Debugging BGP.............................................................................................................................................................. 218

    Storing Last and Bad PDUs.................................................................................................................................... 219Capturing PDUs....................................................................................................................................................... 220PDU Counters...........................................................................................................................................................221

    Sample Configurations...................................................................................................................................................221

    9 Content Addressable Memory (CAM)....................................................................................................... 230CAM Allocation.............................................................................................................................................................. 230Test CAM Usage........................................................................................................................................................... 232View CAM-ACL Settings.............................................................................................................................................. 232View CAM Usage...........................................................................................................................................................233Return to the Default CAM Configuration................................................................................................................. 233CAM Optimization......................................................................................................................................................... 234Applications for CAM Profiling.....................................................................................................................................234

    LAG HashingLAG Hashing Based on Bidirectional Flow.....................................................................................234Unified Forwarding Table (UFT) Modes.....................................................................................................................234

    Configuring UFT Modes......................................................................................................................................... 235

    10 Control Plane Policing (CoPP)................................................................................................................. 236CoPP Implementation................................................................................................................................................... 236

    Protocol-based Control Plane Policing................................................................................................................. 236Queue-based Control Plane Policing.....................................................................................................................236

    CoPP Example............................................................................................................................................................... 238Configure Control Plane Policing.................................................................................................................................239

    8 Contents

  • Configuring CoPP for Protocols............................................................................................................................239Examples of Configuring CoPP for Protocols......................................................................................................240Configuring CoPP for CPU Queues.......................................................................................................................241Examples of Configuring CoPP for CPU Queues................................................................................................242Displaying CoPP Configuration.............................................................................................................................. 243

    Troubleshooting CoPP Operation................................................................................................................................246Enabling CPU Traffic Statistics............................................................................................................................. 246Viewing CPU Traffic Statistics.............................................................................................................................. 246Troubleshooting CPU Packet Loss........................................................................................................................247Viewing Per-Protocol CoPP Counters..................................................................................................................248Viewing Per-Queue CoPP Counters......................................................................................................................251

    11 Data Center Bridging (DCB)..................................................................................................................... 252Enabling Data Center Bridging.....................................................................................................................................252Ethernet Enhancements in Data Center Bridging.....................................................................................................253

    Priority-Based Flow Control...................................................................................................................................254Enhanced Transmission Selection.........................................................................................................................255Data Center Bridging Exchange Protocol (DCBx)..............................................................................................256Data Center Bridging in a Traffic Flow................................................................................................................. 256

    QoS dot1p Traffic Classification and Queue Assignment......................................................................................... 257SNMP Support for PFC and Buffer Statistics Tracking...........................................................................................257DCB Maps and its Attributes....................................................................................................................................... 258

    DCB Map: Configuration Procedure..................................................................................................................... 258Important Points to Remember.............................................................................................................................259Applying a DCB Map on a Port..............................................................................................................................259Configuring PFC without a DCB Map...................................................................................................................260Configuring Lossless Queues................................................................................................................................. 260Applying a DCB Map on a Line Card......................................................................................................................261

    Data Center Bridging: Default Configuration............................................................................................................. 262Configuration Notes: PFC and ETS in a DCB Map................................................................................................... 262

    PFC Configuration Notes....................................................................................................................................... 262ETS Configuration Notes........................................................................................................................................263ETS Prerequisites and Restrictions.......................................................................................................................264Priority-Group Configuration Notes......................................................................................................................264

    Configuring Priority-Based Flow Control....................................................................................................................264Configuring Lossless Queues................................................................................................................................. 265

    Configuring Enhanced Transmission Selection..........................................................................................................266Creating an ETS Priority Group............................................................................................................................. 266ETS Operation with DCBx......................................................................................................................................267

    Configure a DCBx Operation........................................................................................................................................267DCBx Operation.......................................................................................................................................................268DCBx Port Roles......................................................................................................................................................268DCB Configuration Exchange................................................................................................................................ 269Configuration Source Election............................................................................................................................... 270Propagation of DCB Information........................................................................................................................... 270Auto-Detection and Manual Configuration of the DCBx Version...................................................................... 271

    Contents 9

  • Behavior of Tagged Packets...................................................................................................................................271Configuration Example for DSCP and PFC Priorities..........................................................................................272DCBx Example..........................................................................................................................................................272DCBx Prerequisites and Restrictions.................................................................................................................... 273Configuring DCBx.................................................................................................................................................... 274

    Verifying the DCB Configuration................................................................................................................................. 277Performing PFC Using DSCP Bits Instead of 802.1p Bits........................................................................................ 287PFC and ETS Configuration Examples........................................................................................................................287Using PFC and ETS to Manage Data Center Traffic................................................................................................288

    PFC and ETS Configuration Command Examples.............................................................................................. 289Using PFC and ETS to Manage Converged Ethernet Traffic........................................................................... 289Hierarchical Scheduling in ETS Output Policies...................................................................................................290

    Priority-Based Flow Control Using Dynamic Buffer Method...................................................................................290Pause and Resume of Traffic.................................................................................................................................290Buffer Sizes for Lossless or PFC Packets............................................................................................................ 291

    Configuring the Dynamic Buffer Method....................................................................................................................291

    12 Debugging and Diagnostics...................................................................................................................... 293Offline Diagnostics.........................................................................................................................................................293

    Running Port Extender Offline Diagnostics on the Switch................................................................................ 293Running Offline Diagnostics on a Standalone Switch.........................................................................................300

    TRACE Logs...................................................................................................................................................................320Auto Save on Reload, Crash, or Rollover.............................................................................................................. 321Uploading Trace Logs.............................................................................................................................................. 321

    Last Restart Reason.......................................................................................................................................................321show hardware Commands..........................................................................................................................................322Environmental Monitoring............................................................................................................................................ 324

    Displaying Port Extender Environment Information ...........................................................................................324Display Power Supply Status................................................................................................................................. 324Display Fan Status...................................................................................................................................................325Display Transceiver Type........................................................................................................................................325Recognize an Over-Temperature Condition........................................................................................................ 327Troubleshoot an Over-Temperature Condition................................................................................................... 328

    Troubleshooting Packet Loss.......................................................................................................................................330Displaying Drop Counters....................................................................................................................................... 330Displaying Dataplane Statistics...............................................................................................................................331Displaying Line-Card Counters...............................................................................................................................333

    Accessing Application Core Dumps.............................................................................................................................333Mini Core Dumps........................................................................................................................................................... 334Full Kernel Core Dumps................................................................................................................................................ 335Enabling TCP Dumps.................................................................................................................................................... 335Accessing Port Extender Core and Mini Core Dumps..............................................................................................336

    13 Dynamic Host Configuration Protocol (DHCP).........................................................................................337DHCP Packet Format and Options............................................................................................................................. 337Assign an IP Address using DHCP...............................................................................................................................339

    10 Contents

  • Implementation Information......................................................................................................................................... 340Configure the System to be a DHCP Server............................................................................................................. 340

    Configuring the Server for Automatic Address Allocation.................................................................................. 341Specifying a Default Gateway................................................................................................................................342Configure a Method of Hostname Resolution..................................................................................................... 342Using DNS for Address Resolution........................................................................................................................342Using NetBIOS WINS for Address Resolution..................................................................................................... 343Creating Manual Binding Entries............................................................................................................................343Debugging the DHCP Server................................................................................................................................. 343Using DHCP Clear Commands...............................................................................................................................344

    Configure the System to be a Relay Agent................................................................................................................344Configure the System to be a DHCP Client...............................................................................................................346

    DHCP Client on a Management Interface............................................................................................................346DHCP Client Operation with Other Features...................................................................................................... 346

    Configure Secure DHCP...............................................................................................................................................347Option 82.................................................................................................................................................................. 347DHCP Snooping.......................................................................................................................................................348Drop DHCP Packets on Snooped VLANs Only................................................................................................... 350Dynamic ARP Inspection......................................................................................................................................... 351Configuring Dynamic ARP Inspection................................................................................................................... 352

    Source Address Validation............................................................................................................................................353Enabling IP Source Address Validation................................................................................................................. 353DHCP MAC Source Address Validation................................................................................................................354Enabling IP+MAC Source Address Validation......................................................................................................354Viewing the Number of SAV Dropped Packets...................................................................................................354Clearing the Number of SAV Dropped Packets.................................................................................................. 355

    14 Equal Cost Multi-Path (ECMP)................................................................................................................356ECMP for Flow-Based Affinity.................................................................................................................................... 356

    Enabling Deterministic ECMP Next Hop.............................................................................................................. 356Configuring the Hash Algorithm Seed.................................................................................................................. 356Link Bundle Monitoring........................................................................................................................................... 357

    Managing ECMP Group Paths.....................................................................................................................................357Creating an ECMP Group Bundle................................................................................................................................358Modifying the ECMP Group Threshold...................................................................................................................... 358BGP Multipath Operation with Link Bankwidth.........................................................................................................359Dynamic Re-calculation of Link Bankwidth................................................................................................................360Weighted ECMP for Static Routes..............................................................................................................................361ECMP Support in L3 Host and LPM Tables............................................................................................................... 361

    15 FCoE Transit............................................................................................................................................ 362Fibre Channel over Ethernet........................................................................................................................................362Ensure Robustness in a Converged Ethernet Network............................................................................................362FIP Snooping on Ethernet Bridges.............................................................................................................................. 364FIP Snooping in a Switch Stack...................................................................................................................................366Using FIP Snooping....................................................................................................................................................... 366

    Contents 11

  • FIP Snooping Prerequisites.................................................................................................................................... 366Important Points to Remember.............................................................................................................................366Enabling the FCoE Transit Feature....................................................................................................................... 367Enable FIP Snooping on VLANs.............................................................................................................................367Configure the FC-MAP Value................................................................................................................................ 367Configure a Port for a Bridge-to-Bridge Link...................................................................................................... 368Configure a Port for a Bridge-to-FCF Link.......................................................................................................... 368Impact on Other Software Features.....................................................................................................................368FIP Snooping Restrictions...................................................................................................................................... 368

    Configuring FIP Snooping.............................................................................................................................................369Displaying FIP Snooping Information...........................................................................................................................370FCoE Transit Configuration Example.......................................................................................................................... 375

    16 FIPS Cryptography...................................................................................................................................377Configuration Tasks.......................................................................................................................................................377Preparing the System....................................................................................................................................................377Enabling FIPS Mode...................................................................................................................................................... 378Generating Host-Keys...................................................................................................................................................378Monitoring FIPS Mode Status......................................................................................................................................378Disabling FIPS Mode......................................................................................................................................................379

    17 Flex Hash and Optimized Boot-Up............................................................................................................380Flex Hash Capability Overview.................................................................................................................................... 380Configuring the Flex Hash Mechanism.......................................................................................................................380LACP Fast Switchover.................................................................................................................................................. 381Configuring LACP Fast Switchover.............................................................................................................................381LACP................................................................................................................................................................................381

    LACP Fast Switchover............................................................................................................................................ 381RDMA Over Converged Ethernet (RoCE) Overview................................................................................................381Sample Configurations..................................................................................................................................................383

    ................................................................................................................................................................................... 383Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.....................................................................................386

    18 Force10 Resilient Ring Protocol (FRRP)...................................................................................................387Protocol Overview.........................................................................................................................................................387

    Ring Status...............................................................................................................................................................388Multiple FRRP Rings............................................................................................................................................... 388Important FRRP Points...........................................................................................................................................389Implementing FRRP.................................................................................................................................................389Important FRRP Concepts.....................................................................................................................................390

    FRRP Configuration....................................................................................................................................................... 391Creating the FRRP Group....................................................................................................................................... 391Configuring the Control VLAN................................................................................................................................391Configuring and Adding the Member VLANs.......................................................................................................392Setting the FRRP Timers........................................................................................................................................393Clearing the FRRP Counters..................................................................................................................................394

    12 Contents

  • Viewing the FRRP Configuration...........................................................................................................................394Viewing the FRRP Information.............................................................................................................................. 394

    Troubleshooting FRRP..................................................................................................................................................394Configuration Checks..............................................................................................................................................394

    Sample Configuration and Topology........................................................................................................................... 395FRRP Support on VLT.................................................................................................................................................. 396

    Example Scenario.....................................................................................................................................................397Important Points to Remember............................................................................................................................. 398

    19 GARP VLAN Registration Protocol (GVRP)............................................................................................. 399Important Points to Remember...................................................................................................................................399Configure GVRP............................................................................................................................................................ 400

    Related Configuration Tasks..................................................................................................................................400Enabling GVRP Globally.................................................................................................................................................401Enabling GVRP on a Layer 2 Interface........................................................................................................................ 401Configure GVRP Registration.......................................................................................................................................401Configure a GARP Timer.............................................................................................................................................. 402

    20 High Availability (HA).............................................................................................................................. 403High Availability on Chassis.......................................................................................................................................... 403High Availability in a PE Stack......................................................................................................................................403Online Insertion and Removal.......................................................................................................................................404

    RPM Online Insertion.............................................................................................................................................. 404Line Card Online Insertion...................................................................................................................................... 404Pre-configuring a Slot for a Line-Card Type........................................................................................................404Replacing a Line Card............................................................................................................................................. 405

    Hitless Behavior............................................................................................................................................................. 405Graceful Restart............................................................................................................................................................ 406Software Resiliency.......................................................................................................................................................406

    System Health Monitoring......................................................................................................................................406Failure and Event Logging......................................................................................................................................406Trace Log..................................................................................................................................................................406Core Dumps..............................................................................................................................................................407System Log...............................................................................................................................................................407

    Control Plane Redundancy........................................................................................................................................... 407Control-Plane Failover.............................................................................................................................................407RPM Synchronization............................................................................................................................................. 408Forcing an RPM Failover........................................................................................................................................ 408Specifying an Auto-Failover Limit..........................................................................................................................409Disabling Auto-Reboot............................................................................................................................................409

    21 Internet Group Management Protocol (IGMP)......................................................................................... 410IGMP Implementation Information...............................................................................................................................410IGMP Protocol Overview.............................................................................................................................................. 410

    IGMP Version 2.........................................................................................................................................................410IGMP Version 3.........................................................................................................................................................412

    Contents 13

  • Configure IGMP..............................................................................................................................................................415Related Configuration Tasks...................................................................................................................................415

    Viewing IGMP Enabled Interfaces................................................................................................................................416Selecting an IGMP Version........................................................................................................................................... 416Viewing IGMP Groups................................................................................................................................................... 416Enabling IGMP Immediate-Leave................................................................................................................................. 417IGMP Snooping...............................................................................................................................................................417

    IGMP Snooping Implementation Information........................................................................................................417Configuring IGMP Snooping....................................................................................................................................417Removing a Group-Port Association..................................................................................................................... 418Disabling Multicast Flooding....................................................................................................................................419Specifying a Port as Connected to a Multicast Router.......................................................................................419Configuring the Switch as Querier.........................................................................................................................419

    Fast Convergence after MSTP Topology Changes..................................................................................................420Designating a Multicast Router Interface...................................................................................................................420

    22 Interfaces.................................................................................................................................................421Basic Interface Configuration....................................................................................................................................... 421Advanced Interface Configuration............................................................................................................................... 421Port Numbering............................................................................................................................................................. 422Interface Types..............................................................................................................................................................425View Basic Interface Information................................................................................................................................ 425Resetting an Interface to its Factory Default State...................................................................................................431Enabling a Physical Interface........................................................................................................................................432Physical Interfaces.........................................................................................................................................................432

    Port Pipes................................................................................................................................................................. 432Setting the Speed of Ethernet Interfaces............................................................................................................432Configuration Task List for Physical Interfaces................................................................................................... 433Overview of Layer Modes...................................................................................................................................... 433Configuring Layer 2 (Data Link) Mode................................................................................................................. 434Configuring Layer 2 (Interface) Mode..................................................................................................................434Configuring Layer 3 (Network) Mode.................................................................................................................. 435Configuring Layer 3 (Interface) Mode..................................................................................................................435

    Egress Interface Selection (EIS)................................................................................................................................. 436Important Points to Remember............................................................................................................................. 436Configuring EIS........................................................................................................................................................ 436

    Management Interfaces................................................................................................................................................437Configuring a Dedicated Management Interface ............................................................................................... 437Configuring a Management Interface on an Ethernet Port............................................................................... 438

    Port Extender Interfaces.............................................................................................................................................. 439VLAN Interfaces............................................................................................................................................................ 439Loopback Interfaces......................................................................................................................................................440Null Interfaces................................................................................................................................................................ 440Port Channel Interfaces.................................................................................................................................................441

    Port Channel Definition and Standards................................................................................................................. 441Port Channel Benefits..............................................................................................................................................441

    14 Contents

  • Port Channel Implementation................................................................................................................................. 44110/40 Gbps Interfaces in Port Channels.............................................................................................................. 442Configuration Tasks for Port Channel Interfaces................................................................................................442Creating a Port Channel......................................................................................................................................... 442Adding a Physical Interface to a Port Channel.................................................................................................... 443Reassigning an Interface to a New Port Channel............................................................................................... 445Configuring the Minimum Oper Up Links in a Port Channel.............................................................................. 445Adding or Removing a Port Channel from a VLAN............................................................................................. 446Assigning an IP Address to a Port Channel..........................................................................................................446Deleting or Disabling a Port Channel.....................................................................................................................446Load Balancing Through Port Channels................................................................................................................447Changing the Hash Algorithm................................................................................................................................ 447

    Bulk Configuration......................................................................................................................................................... 448Interface Range....................................................................................................................................................... 448Bulk Configuration Examples..................................................................................................................................448

    Defining Interface Range Macros................................................................................................................................450Define the Interface Range....................................................................................................................................450Choosing an Interface-Range Macro....................................................................................................................450

    Monitoring and Maintaining Interfaces.......................................................................................................................450Maintenance Using TDR..........................................................................................................................................451

    Displaying Traffic Statistics on HiGig Ports............................................................................................................... 452Link Bundle Monitoring................................................................................................................................................. 452Monitoring HiGig Link Bundles.....................................................................................................................................453