dell networking os configuration guide for the z9100 on ... · verify software images before...

1176
Dell EMC Networking OS Configuration Guide for the Z9100–ON System 9.14.0.0

Upload: others

Post on 27-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

  • Dell EMC Networking OS Configuration Guide for the Z9100–ON System9.14.0.0

  • Notes, cautions, and warnings

    NOTE: A NOTE indicates important information that helps you make better use of your product.

    CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.

    WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

    Copyright © 2018 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.

    2018 - 07

    Rev. A00

  • Contents

    1 About this Guide...........................................................................................................................................37Audience............................................................................................................................................................................37Conventions...................................................................................................................................................................... 37Related Documents..........................................................................................................................................................37

    2 Configuration Fundamentals........................................................................................................................ 38Accessing the Command Line........................................................................................................................................38CLI Modes.........................................................................................................................................................................39

    Navigating CLI Modes...............................................................................................................................................40The do Command............................................................................................................................................................ 43Undoing Commands........................................................................................................................................................ 43Obtaining Help..................................................................................................................................................................44Entering and Editing Commands....................................................................................................................................44Command History............................................................................................................................................................ 45Filtering show Command Outputs.................................................................................................................................45

    Example of the grep Keyword.................................................................................................................................. 46Multiple Users in Configuration Mode...........................................................................................................................46Configuring alias command.............................................................................................................................................47

    Viewing alias configuration........................................................................................................................................47

    3 Getting Started............................................................................................................................................49Console Access................................................................................................................................................................50

    Serial Console.............................................................................................................................................................50Micro USB-B Access..................................................................................................................................................51

    Default Configuration...................................................................................................................................................... 52Configuring a Host Name............................................................................................................................................... 52Accessing the System Remotely....................................................................................................................................52

    Accessing the System Remotely..............................................................................................................................52Configure the Management Port IP Address......................................................................................................... 52Configure a Management Route..............................................................................................................................53Configuring a Username and Password..................................................................................................................53

    Configuring the Enable Password..................................................................................................................................54Configuration File Management.....................................................................................................................................54

    Copy Files to and from the System......................................................................................................................... 54Mounting an NFS File System..................................................................................................................................55Save the Running-Configuration..............................................................................................................................57Configure the Overload Bit for a Startup Scenario................................................................................................57Viewing Files............................................................................................................................................................... 57

    Managing the File System.............................................................................................................................................. 58View Command History.................................................................................................................................................. 59Upgrading Dell EMC Networking OS............................................................................................................................ 59Using HTTP for File Transfers........................................................................................................................................ 59

    Contents 3

  • Verify Software Images Before Installation...................................................................................................................60

    4 Management................................................................................................................................................62Configuring Privilege Levels............................................................................................................................................62

    Creating a Custom Privilege Level........................................................................................................................... 63Removing a Command from EXEC Mode.............................................................................................................. 63Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................63Allowing Access to CONFIGURATION Mode Commands....................................................................................63Allowing Access to Different Modes........................................................................................................................63Applying a Privilege Level to a Username............................................................................................................... 65Applying a Privilege Level to a Terminal Line.......................................................................................................... 65

    Configuring Logging........................................................................................................................................................ 65Audit and Security Logs............................................................................................................................................ 66Configuring Logging Format ...................................................................................................................................67Setting Up a Secure Connection to a Syslog Server.............................................................................................67

    Log Messages in the Internal Buffer..............................................................................................................................69Configuration Task List for System Log Management.......................................................................................... 69

    Disabling System Logging............................................................................................................................................... 69Sending System Messages to a Syslog Server............................................................................................................69

    Configuring a UNIX System as a Syslog Server.....................................................................................................69Track Login Activity..........................................................................................................................................................70

    Restrictions for Tracking Login Activity...................................................................................................................70Configuring Login Activity Tracking......................................................................................................................... 70Display Login Statistics...............................................................................................................................................71

    Limit Concurrent Login Sessions....................................................................................................................................72Restrictions for Limiting the Number of Concurrent Sessions.............................................................................72Configuring Concurrent Session Limit.....................................................................................................................72Enabling the System to Clear Existing Sessions.................................................................................................... 73

    Enabling Secured CLI Mode............................................................................................................................................74Changing System Logging Settings............................................................................................................................... 74Display the Logging Buffer and the Logging Configuration........................................................................................ 75Configuring a UNIX Logging Facility Level....................................................................................................................75Synchronizing Log Messages......................................................................................................................................... 76Enabling Timestamp on Syslog Messages.................................................................................................................... 77File Transfer Services.......................................................................................................................................................77

    Configuration Task List for File Transfer Services.................................................................................................. 77Enabling the FTP Server........................................................................................................................................... 78Configuring FTP Server Parameters........................................................................................................................78Configuring FTP Client Parameters......................................................................................................................... 78

    Terminal Lines................................................................................................................................................................... 79Denying and Permitting Access to a Terminal Line................................................................................................ 79Configuring Login Authentication for Terminal Lines.............................................................................................80

    Setting Timeout for EXEC Privilege Mode....................................................................................................................81Using Telnet to get to Another Network Device..........................................................................................................82Lock CONFIGURATION Mode....................................................................................................................................... 82

    Viewing the Configuration Lock Status...................................................................................................................82

    4 Contents

  • Reloading the system...................................................................................................................................................... 83Restoring the Factory Default Settings.........................................................................................................................84

    Important Points to Remember................................................................................................................................84Restoring Factory Default Environment Variables................................................................................................. 84

    Viewing the Reason for Last System Reboot.............................................................................................................. 85

    5 802.1X......................................................................................................................................................... 86Port-Authentication Process.......................................................................................................................................... 88

    EAP over RADIUS......................................................................................................................................................88Configuring 802.1X...........................................................................................................................................................89

    Related Configuration Tasks..................................................................................................................................... 89Important Points to Remember......................................................................................................................................89Enabling 802.1X................................................................................................................................................................ 90Configuring dot1x Profile .................................................................................................................................................91Configuring the Static MAB and MAB Profile .............................................................................................................92Configuring Critical VLAN ..............................................................................................................................................92Configuring MAC addresses for a do1x Profile.............................................................................................................93Configuring Request Identity Re-Transmissions...........................................................................................................94

    Configuring a Quiet Period after a Failed Authentication..................................................................................... 94Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 95Re-Authenticating a Port................................................................................................................................................96Configuring Timeouts...................................................................................................................................................... 97Configuring Dynamic VLAN Assignment with Port Authentication...........................................................................98Guest and Authentication-Fail VLANs.......................................................................................................................... 99

    Configuring a Guest VLAN....................................................................................................................................... 99Configuring an Authentication-Fail VLAN...............................................................................................................99

    6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)................................... 101Optimizing CAM Utilization During the Attachment of ACLs to VLANs.................................................................. 101Guidelines for Configuring ACL VLAN Groups........................................................................................................... 102Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters...............................................102

    Configuring ACL VLAN Groups.............................................................................................................................. 102Configuring FP Blocks for VLAN Parameters....................................................................................................... 103

    Viewing CAM Usage...................................................................................................................................................... 104Allocating FP Blocks for VLAN Processes.................................................................................................................. 105ACL Optimization to Increase Number of Supported IPv4 ACLs.............................................................................105

    Restrictions for ACL Optimization..........................................................................................................................106Optimizing ACL for More Number of IPv4 ACL Rules.........................................................................................106

    7 Access Control Lists (ACLs)....................................................................................................................... 107IP Access Control Lists (ACLs).....................................................................................................................................108

    CAM Usage............................................................................................................................................................... 109Implementing ACLs on Dell EMC Networking OS................................................................................................ 110

    Configure ACL Range Profiles........................................................................................................................................ 111Important Points to Remember..................................................................................................................................... 112

    Configuration Task List for Route Maps................................................................................................................. 112

    Contents 5

  • Configuring Match Routes.......................................................................................................................................115Configuring Set Conditions...................................................................................................................................... 116Configure a Route Map for Route Redistribution..................................................................................................117Configure a Route Map for Route Tagging............................................................................................................ 117Continue Clause........................................................................................................................................................ 118

    IP Fragment Handling..................................................................................................................................................... 118IP Fragments ACL Examples................................................................................................................................... 118Layer 4 ACL Rules Examples................................................................................................................................... 119

    Configure a Standard IP ACL........................................................................................................................................ 120Configuring a Standard IP ACL Filter...................................................................................................................... 121

    Configure an Extended IP ACL...................................................................................................................................... 121Configuring Filters with a Sequence Number....................................................................................................... 122Configuring Filters Without a Sequence Number.................................................................................................124

    Configure Layer 2 and Layer 3 ACLs............................................................................................................................125Assign an IP ACL to an Interface.................................................................................................................................. 126Applying an IP ACL......................................................................................................................................................... 126

    Counting ACL Hits.................................................................................................................................................... 127Configure Ingress ACLs..................................................................................................................................................127Configure Egress ACLs.................................................................................................................................................. 127

    Applying Egress Layer 3 ACLs (Control-Plane).................................................................................................... 128Configuring UDF ACL.................................................................................................................................................... 129IP Prefix Lists................................................................................................................................................................... 131

    Implementation Information.................................................................................................................................... 132Configuration Task List for Prefix Lists.................................................................................................................. 132

    ACL Remarks.................................................................................................................................................................. 135Configuring a Remark.............................................................................................................................................. 135Deleting a Remark.................................................................................................................................................... 136

    ACL Resequencing......................................................................................................................................................... 137Resequencing an ACL or Prefix List....................................................................................................................... 137

    Route Maps..................................................................................................................................................................... 138Implementation Information.................................................................................................................................... 138

    8 Bidirectional Forwarding Detection (BFD).................................................................................................. 140How BFD Works............................................................................................................................................................. 140

    BFD Packet Format.................................................................................................................................................. 141BFD Sessions............................................................................................................................................................ 142BFD Three-Way Handshake.................................................................................................................................... 143Session State Changes............................................................................................................................................ 145

    Important Points to Remember.................................................................................................................................... 145Configure BFD................................................................................................................................................................ 145

    Configure BFD for Physical Ports...........................................................................................................................146Configure BFD for Static Routes............................................................................................................................ 147Configure BFD for IPv6 Static Routes....................................................................................................................151Configure BFD for OSPF.........................................................................................................................................153Configure BFD for OSPFv3.....................................................................................................................................158Configure BFD for IS-IS............................................................................................................................................161

    6 Contents

  • Configure BFD for BGP........................................................................................................................................... 163Configure BFD for VRRP..........................................................................................................................................171Configuring Protocol Liveness................................................................................................................................ 173

    9 Border Gateway Protocol (BGP).................................................................................................................174Border Gateway Protocol version 4 (BGPv4)............................................................................................................. 174Autonomous Systems (AS)............................................................................................................................................174

    AS4 Number Representation.................................................................................................................................. 176Four-Byte AS Numbers............................................................................................................................................178

    Multiprotocol BGP.......................................................................................................................................................... 178MBGP for IPv4 MulticastBGP Address Family modelIPv4 and IPv6 address family....................................... 179

    Sessions and Peers.........................................................................................................................................................179Establish a Session................................................................................................................................................... 179

    Implementing BGP global and address family............................................................................................................. 180BGP global configuration default values.................................................................................................................181

    BGP Attributes for selecting Best Path........................................................................................................................181Best Path Selection Criteria.................................................................................................................................... 182Weight........................................................................................................................................................................183Local Preference.......................................................................................................................................................184Multi-Exit Discriminators (MEDs)...........................................................................................................................184Origin..........................................................................................................................................................................185AS Path......................................................................................................................................................................186Next Hop................................................................................................................................................................... 186

    Implement BGP with Dell EMC Networking OS.........................................................................................................186Additional Path (Add-Path) Support......................................................................................................................186Advertise IGP Cost as MED for Redistributed Routes.........................................................................................187Ignore Router-ID in Best-Path Calculation.............................................................................................................187AS Number Migration...............................................................................................................................................187BGP4 Management Information Base (MIB)........................................................................................................188Important Points to Remember.............................................................................................................................. 188

    Configuration Information..............................................................................................................................................189Configuring a basic BGP network................................................................................................................................ 190

    Enabling BGP............................................................................................................................................................ 190Configuring a BGP peer...........................................................................................................................................193Configuring AS4 Number Representations........................................................................................................... 194Configuring a BGP VRF address family................................................................................................................. 195Route-refresh and Soft-reconfiguration................................................................................................................ 196Aggregating Routes..................................................................................................................................................199Filtering BGP Routes...............................................................................................................................................200Filtering BGP Routes Using Route Maps...............................................................................................................201Filtering BGP Routes Using AS-PATH Information..............................................................................................202Configuring Peer Groups........................................................................................................................................ 203Configuring BGP Fast Fall-Over..............................................................................................................................211Configuring Passive Peering................................................................................................................................... 212Maintaining Existing AS Numbers During an AS Migration................................................................................. 213Allowing an AS Number to Appear in its Own AS Path....................................................................................... 214

    Contents 7

  • Enabling Graceful Restart........................................................................................................................................215Filtering on an AS-Path Attribute........................................................................................................................... 216Regular Expressions as Filters.................................................................................................................................217Redistributing Routes...............................................................................................................................................218Enabling Additional Paths........................................................................................................................................ 219Configuring IP Community Lists............................................................................................................................. 219Configuring an IP Extended Community List....................................................................................................... 220Filtering Routes with Community Lists.................................................................................................................. 221Manipulating the COMMUNITY Attribute............................................................................................................ 222Changing MED Attributes.......................................................................................................................................223Changing the LOCAL_PREFERENCE Attribute..................................................................................................224Configuring the local System or a Different System to be the Next Hop for BGP-Learned Routes.............224Changing the WEIGHT Attribute........................................................................................................................... 225Enabling Multipath...................................................................................................................................................225Route Reflectors...................................................................................................................................................... 226Configuring BGP Confederations...........................................................................................................................227Enabling Route Flap Dampening............................................................................................................................ 227Changing BGP Timers.............................................................................................................................................230Setting the extended timer.................................................................................................................................... 230Enabling or disabling BGP neighbors......................................................................................................................231Route Map Continue............................................................................................................................................... 232

    Enabling MBGP Configurations....................................................................................................................................233MBGP support for IPv6................................................................................................................................................ 233Configuring IPv6 MBGP between peers.....................................................................................................................233Example-Configuring IPv4 and IPv6 neighbors......................................................................................................... 234Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor............................................... 236BGP Regular Expression Optimization........................................................................................................................ 238Debugging BGP..............................................................................................................................................................238

    Storing Last and Bad PDUs....................................................................................................................................239Capturing PDUs....................................................................................................................................................... 240PDU Counters........................................................................................................................................................... 241

    10 Content Addressable Memory (CAM).......................................................................................................242CAM Allocation...............................................................................................................................................................242Test CAM Usage............................................................................................................................................................ 244View CAM-ACL Settings.............................................................................................................................................. 244View CAM Usage...........................................................................................................................................................245Configuring CAM Threshold and Silence Period........................................................................................................246

    Setting CAM Threshold and Silence Period......................................................................................................... 246CAM Optimization..........................................................................................................................................................247Troubleshoot CAM Profiling.......................................................................................................................................... 247

    QoS CAM Region Limitation...................................................................................................................................247Syslog Error When the Table is Full....................................................................................................................... 248Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................248Syslog Warning for Discrepancies Between Configured Extended Prefixes.................................................... 248

    Unified Forwarding Table (UFT) Modes......................................................................................................................248

    8 Contents

  • Configuring UFT Modes..........................................................................................................................................249IPv6 CAM ACL Region..................................................................................................................................................249

    Important Points to Remember..............................................................................................................................249Convert the IPv6 ACL CAM to Double-Wide.......................................................................................................250Sharing CAM space between IPv4 QoS and IPv6 ACLs.................................................................................... 250

    11 Control Plane Policing (CoPP).................................................................................................................. 252Configure Control Plane Policing................................................................................................................................. 253

    Configuring CoPP for Protocols............................................................................................................................ 254Configuring CoPP for CPU Queues...................................................................................................................... 256Protocol to CPU Queue Mapping.......................................................................................................................... 257Configuring Protocol to CPU Queue Mapping.....................................................................................................257Displaying CoPP Configuration ............................................................................................................................. 258

    12 Data Center Bridging (DCB).....................................................................................................................260Ethernet Enhancements in Data Center Bridging..................................................................................................... 260

    Priority-Based Flow Control.................................................................................................................................... 261Enhanced Transmission Selection..........................................................................................................................262Data Center Bridging Exchange Protocol (DCBx)...............................................................................................263Data Center Bridging in a Traffic Flow...................................................................................................................264Buffer Organization................................................................................................................................................. 264

    Enabling Data Center Bridging.....................................................................................................................................266DCB Maps and its Attributes..................................................................................................................................267

    Data Center Bridging: Default Configuration..............................................................................................................267Configuring Priority-Based Flow Control....................................................................................................................268

    Configuring Lossless Queues................................................................................................................................. 269Configuring PFC in a DCB Map................................................................................................................................... 270

    PFC Configuration Notes........................................................................................................................................270PFC Prerequisites and Restrictions........................................................................................................................271

    Applying a DCB Map on a Port..................................................................................................................................... 271Configuring PFC without a DCB Map......................................................................................................................... 272Configuring PFC Asymmetric.......................................................................................................................................272Priority-Based Flow Control Using Dynamic Buffer Method....................................................................................273

    Pause and Resume of Traffic..................................................................................................................................273Buffer Sizes for Lossless or PFC Packets.............................................................................................................273

    Shared headroom for lossless or PFC packets...........................................................................................................274Example Scenario.....................................................................................................................................................274Configuring Shared Head Room Buffer.................................................................................................................276Viewing Shared Head Room Usage.......................................................................................................................276Monitoring Buffer Statistics for Tracking Purposes.............................................................................................276

    Behavior of Tagged Packets......................................................................................................................................... 277Configuration Example for DSCP and PFC Priorities................................................................................................ 277SNMP Support for PFC and Buffer Statistics Tracking............................................................................................278Performing PFC Using DSCP Bits Instead of 802.1p Bits......................................................................................... 278PFC and ETS Configuration Examples........................................................................................................................279Using PFC to Manage Converged Ethernet Traffic...................................................................................................279

    Contents 9

  • Operations on Untagged Packets................................................................................................................................279Generation of PFC for a Priority for Untagged Packets...........................................................................................280Configure Enhanced Transmission Selection..............................................................................................................280

    Creating an ETS Priority Group............................................................................................................................. 280ETS Operation with DCBx.......................................................................................................................................281Configuring ETS in a DCB Map..............................................................................................................................282

    Hierarchical Scheduling in ETS Output Policies......................................................................................................... 283Using ETS to Manage Converged Ethernet Traffic................................................................................................... 283Applying DCB Policies in a Switch Stack.................................................................................................................... 283Configure a DCBx Operation........................................................................................................................................284

    DCBx Operation....................................................................................................................................................... 284DCBx Port Roles...................................................................................................................................................... 284DCB Configuration Exchange................................................................................................................................ 286Configuration Source Election................................................................................................................................286Propagation of DCB Information............................................................................................................................287Auto-Detection and Manual Configuration of the DCBx Version.......................................................................287DCBx Example..........................................................................................................................................................287DCBx Prerequisites and Restrictions.....................................................................................................................288Configuring DCBx.................................................................................................................................................... 288

    Verifying the DCB Configuration.................................................................................................................................. 291QoS dot1p Traffic Classification and Queue Assignment..........................................................................................299Configuring the Dynamic Buffer Method................................................................................................................... 299Sample DCB Configuration...........................................................................................................................................300

    PFC and ETS Configuration Command Examples...............................................................................................302

    13 Dynamic Host Configuration Protocol (DHCP).........................................................................................303DHCP Packet Format and Options............................................................................................................................. 303Assign an IP Address using DHCP...............................................................................................................................305Implementation Information......................................................................................................................................... 306Configure the System to be a DHCP Server............................................................................................................. 306

    Configuring the Server for Automatic Address Allocation..................................................................................307Specifying a Default Gateway................................................................................................................................ 308Configure a Method of Hostname Resolution..................................................................................................... 308Using DNS for Address Resolution........................................................................................................................308Using NetBIOS WINS for Address Resolution..................................................................................................... 309Creating Manual Binding Entries............................................................................................................................309Debugging the DHCP Server.................................................................................................................................309Using DHCP Clear Commands............................................................................................................................... 310

    Configure the System to be a DHCP Client................................................................................................................310Configuring the DHCP Client System....................................................................................................................310DHCP Client on a Management Interface.............................................................................................................312DHCP Client Operation with Other Features........................................................................................................312

    DHCP Relay When DHCP Server and Client are in Different VRFs......................................................................... 313Configuring Route Leaking between VRFs on DHCP Relay Agent.................................................................... 313

    Configure Secure DHCP................................................................................................................................................314Option 82...................................................................................................................................................................315

    10 Contents

  • DHCP Snooping........................................................................................................................................................315Drop DHCP Packets on Snooped VLANs Only....................................................................................................320Dynamic ARP Inspection.........................................................................................................................................320Configuring Dynamic ARP Inspection.................................................................................................................... 321

    Source Address Validation............................................................................................................................................ 322Enabling IP Source Address Validation.................................................................................................................. 322DHCP MAC Source Address Validation................................................................................................................ 323Enabling IP+MAC Source Address Validation.......................................................................................................323Viewing the Number of SAV Dropped Packets....................................................................................................324Clearing the Number of SAV Dropped Packets................................................................................................... 324

    14 Equal Cost Multi-Path (ECMP)................................................................................................................ 325ECMP for Flow-Based Affinity.....................................................................................................................................325

    Configuring the Hash Algorithm............................................................................................................................ 325Enabling Deterministic ECMP Next Hop.............................................................................................................. 325Configuring the Hash Algorithm Seed.................................................................................................................. 326

    Link Bundle Monitoring................................................................................................................................................. 326Managing ECMP Group Paths............................................................................................................................... 327Creating an ECMP Group Bundle.......................................................................................................................... 327Modifying the ECMP Group Threshold.................................................................................................................327Support for /128 IPv6 and /32 IPv4 Prefixes in Layer 3 Host Table and LPM Table......................................328Support for ECMP in host table............................................................................................................................ 329Support for moving /128 IPv6 Prefixes and /32 IPv4 Prefixes ........................................................................ 329

    15 FIP Snooping............................................................................................................................................330Fibre Channel over Ethernet........................................................................................................................................ 330Ensure Robustness in a Converged Ethernet Network............................................................................................ 330FIP Snooping on Ethernet Bridges.............................................................................................................................. 332Using FIP Snooping....................................................................................................................................................... 334

    FIP Snooping Prerequisites.....................................................................................................................................334Important Points to Remember..............................................................................................................................334Enabling the FCoE Transit Feature........................................................................................................................335Enable FIP Snooping on VLANs.............................................................................................................................336Configure the FC-MAP Value................................................................................................................................ 336Configure a Port for a Bridge-to-Bridge Link.......................................................................................................336Configure a Port for a Bridge-to-FCF Link...........................................................................................................336Impact on Other Software Features..................................................................................................................... 336FIP Snooping Restrictions.......................................................................................................................................337Configuring FIP Snooping....................................................................................................................................... 337

    Displaying FIP Snooping Information...........................................................................................................................338FCoE Transit Configuration Example...........................................................................................................................343

    16 Flex Hash and Optimized Boot-Up............................................................................................................345Flex Hash Capability Overview.................................................................................................................................... 345Configuring the Flex Hash Mechanism.......................................................................................................................345Configuring Fast Boot and LACP Fast Switchover...................................................................................................346

    Contents 11

  • Optimizing the Boot Time.............................................................................................................................................346Booting Process When Optimized Boot Time Mechanism is Enabled..............................................................346Guidelines for Configuring Optimized Booting Mechanism................................................................................ 347

    Interoperation of Applications with Fast Boot and System States..........................................................................348LACP and IPv4 Routing.......................................................................................................................................... 348LACP and IPv6 Routing.......................................................................................................................................... 348BGP Graceful Restart............................................................................................................................................. 349Cold Boot Caused by Power Cycling the System................................................................................................349Unexpected Reload of the System........................................................................................................................349Software Upgrade................................................................................................................................................... 349LACP Fast Switchover............................................................................................................................................349Changes to BGP Multipath.................................................................................................................................... 350Delayed Installation of ECMP Routes Into BGP...................................................................................................350

    RDMA Over Converged Ethernet (RoCE) Overview............................................................................................... 350Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces.......................................................................................351

    17 Force10 Resilient Ring Protocol (FRRP)................................................................................................... 352Protocol Overview.........................................................................................................................................................352

    Ring Status............................................................................................................................................................... 353Multiple FRRP Rings............................................................................................................................................... 353Important FRRP Points...........................................................................................................................................354Important FRRP Concepts.....................................................................................................................................355

    Implementing FRRP...................................................................................................................................................... 356FRRP Configuration...................................................................................................................................................... 356

    Creating the FRRP Group...................................................................................................................................... 356Configuring the Control VLAN............................................................................................................................... 357Configuring and Adding the Member VLANs...................................................................................................... 358Setting the FRRP Timers........................................................................................................................................359Clearing the FRRP Counters..................................................................................................................................359Viewing the FRRP Configuration...........................................................................................................................359Viewing the FRRP Information.............................................................................................................................. 360

    Troubleshooting FRRP.................................................................................................................................................. 360Configuration Checks..............................................................................................................................................360

    Sample Configuration and Topology............................................................................................................................360FRRP Support on VLT...................................................................................................................................................362

    Example Scenario.................................................................................................................................................... 362Important Points to Remember............................................................................................................................. 363

    18 GARP VLAN Registration Protocol (GVRP)..............................................................................................365Important Points to Remember................................................................................................................................... 365Configure GVRP............................................................................................................................................................ 366

    Related Configuration Tasks...................................................................................................................................366Enabling GVRP Globally................................................................................................................................................ 367Enabling GVRP on a Layer 2 Interface........................................................................................................................ 367Configure GVRP Registration.......................................................................................................................................367Configure a GARP Timer.............................................................................................................................................. 368

    12 Contents

  • 19 Internet Group Management Protocol (IGMP)......................................................................................... 369IGMP Implementation Information.............................................................................................................................. 369IGMP Protocol Overview..............................................................................................................................................369

    IGMP Version 2........................................................................................................................................................369IGMP Version 3......................................................................................................................................................... 371

    Configure IGMP..............................................................................................................................................................374Related Configuration Tasks................................................................................................................................... 374

    Viewing IGMP Enabled Interfaces............................................................................................................................... 375Selecting an IGMP Version........................................................................................................................................... 375Viewing IGMP Groups................................................................................................................................................... 376Adjusting Timers.............................................................................................................................................................376

    Adjusting Query and Response Timers................................................................................................................. 376Enabling IGMP Immediate-Leave................................................................................................................................. 377IGMP Snooping.............................................................................................................................................................. 378

    IGMP Snooping Implementation Information....................................................................................................... 378Configuring IGMP Snooping...................................................................................................................................378Removing a Group-Port Association..................................................................................................................... 379Disabling Multicast Flooding................................................................................................................................... 379Specifying a Port as Connected to a Multicast Router.......................................................................................379Configuring the Switch as Querier........................................................................................................................ 380

    Fast Convergence after MSTP Topology Changes...................................................................................................380Egress Interface Selection (EIS) for HTTP and IGMP Applications........................................................................380

    Protocol Separation..................................................................................................................................................381Enabling and Disabling Management Egress Interface Selection...................................................................... 382Handling of Management Route Configuration................................................................................................... 383Handling of Switch-Initiated Traffic....................................................................................................................... 383Handling of Switch-Destined Traffic......................................................................................................................384Handling of Transit Traffic (Traffic Separation).................................................................................................... 385Mapping of Management Applications and Traffic Type.....................................................................................385Behavior of Various Applications for Switch-Initiated Traffic ............................................................................ 386Behavior of Various Applications for Switch-Destined Traffic ...........................................................................387Interworking of EIS With Various Applications..................................................................................................... 387

    Designating a Multicast Router Interface................................................................................................................... 388

    20 Interfaces................................................................................................................................................ 389Basic Interface Configuration.......................................................................................................................................389Advanced Interface Configuration...............................................................................................................................389Interface Types...............................................................................................................................................................390View Basic Interface Information.................................................................................................................................390Resetting an Interface to its Factory Default State...................................................................................................392Enabling a Physical Interface........................................................................................................................................393Physical Interfaces.........................................................................................................................................................393

    Configuration Task List for Physical Interfaces.................................................................................................... 393Overview of Layer Modes...................................................................................................................................... 394Configuring Layer 2 (Data Link) Mode..................................................................................................................394

    Contents 13

  • Configuring Layer 2 (Interface) Mode.................................................................................................................. 394Configuring Layer 3 (Network) Mode...................................................................................................................395Configuring Layer 3 (Interface) Mode.................................................................................................................. 395

    Automatic recovery of an Err-disabled interface.......................................................................................................396Configuring an automatic recovery for an Err-disabled interface......................................................................397

    Egress Interface Selection (EIS).................................................................................................................................. 397Important Points to Remember..............................................................................................................................397Configuring EIS........................................................................................................................................................ 398

    Management Interfaces................................................................................................................................................398Configuring Management Interfaces.................................................................................................................... 398Configuring a Management Interface on an Ethernet Port............................................................................... 399

    VLAN Interfaces............................................................................................................................................................ 399Loopback Interfaces......................................................................................................................................................400Null Interfaces.................................................................................................................................................................401Port Channel Interfaces.................................................................................................................................................401

    Port Channel Definition and Standards................................................................................................................. 401Port Channel Benefits..............................................................................................................................................401Port Channel Implementation................................................................................................................................. 401Interfaces in Port Channels.................................................................................................................................... 402Configuration Tasks for Port Channel Interfaces.................................................................................................402Creating a Port Channel..........................................................................................................................................403Adding a Physical Interface to a Port Channel.....................................................................................................403Reassigning an Interface to a New Port Channel................................................................................................405Configuring the Minimum Oper Up Links in a Port Channel.............................................................................. 405Adding or Removing a Port Channel from a VLAN............................................................................................. 406Assigning an IP Address to a Port Channel.......................................................................................................... 407Deleting or Disabling a Port Channel..................................................................................................................... 407Load Balancing Through Port Channels................................................................................................................407Load-Balancing Method..........................................................................................................................................408Changing the Hash Algorithm................................................................................................................................408

    Bulk Configuration......................................................................................................................................................... 409Interface Range....................................................................................................................................................... 409Bulk Configuration Examples.................................................................................................................................. 410

    Defining Interface Range Macros..................................................................................................................................411Define the Interface Range..................................................................................................................................... 412Choosing an Interface-Range Macro.....................................................................................................................412

    Monitoring and Maintaining Interfaces........................................................................................................................ 412Maintenance Using TDR..........................................................................................................................................413

    Non Dell-Qualified Transceivers....................................................................................................................................414Splitting 100G Ports....................................................................................................................................................... 414Link Dampening.............................................................................................................................................................. 415

    Important Points to Remember.............................................................................................................................. 416Configuration Example of Link Dampening........................................................................................................... 416Enabling Link Dampening.........................................................................................................................................418

    Link Bundle Monitoring.................................................................................................................................................. 419

    14 Contents

  • Using Ethernet Pause Frames for Flow Control........................................................................................................ 420Enabling Pause Frames........................................................................................................................................... 420

    Configure the MTU Size on an Interface.....................................................................................................................421Configuring wavelength for 10–Gigabit SFP+ optics................................................................................................422Port-Pipes.......................................................................................................................................................................422CR4 Auto-Negotiation...................................................................................................................................................422Setting the Speed of Ethernet Interfaces.................................................................................................................. 423Syslog Warning Upon Connecting SFP28 Optics with QSA.................................................................................... 424FEC Configuration......................................................................................................................................................... 424View Advanced Interface Information.........................................................................................................................426

    Configuring the Interface Sampling Size.............................................................................................................. 426Configuring the Traffic Sampling Size Globally...........................................................................................................428Dynamic Counters......................................................................................................................................................... 429

    Clearing Interface Counters....................................................................................................................................429Enhanced Validation of Interface Ranges...................................................................................................................430Compressing Configuration Files................................................................................................................................. 430OUI on 25G and 50G Interfaces.................................................................................................................................. 433

    Configuring OUI on 25G and 50G Interfaces.......................................................................................................433

    21 IPv4 Routing.............................................................................................................................................434IP Addresses...................................................................................................................................................................435

    Implementation Information....................................................................................................................................435Configuration Tasks for IP Addresses..........................................................................................................................435Assigning IP Addresses to an Interface.......................................................................................................................435Configuring Static Routes.............................................................................................................................................436Configure Static Routes for the Management Interface.......................................................................................... 437IPv4 Path MTU Discovery Overview.........................................................................................