Sign In
Upload
Manuals
Brands
Dell Manuals
Switch
S4048T-ON
User Manuals: Dell S4048T-ON Network Switch
Manuals and User Guides for Dell S4048T-ON Network Switch. We have
2
Dell S4048T-ON Network Switch manuals available for free PDF download: Configuration Manual, Getting Started Manual
Dell S4048T-ON Configuration Manual (1146 pages)
Brand:
Dell
| Category:
Switch
| Size: 37.65 MB
Table of Contents
Table of Contents
3
1 About this Guide
36
Audience
36
Conventions
36
Related Documents
36
2 Configuration Fundamentals
37
Accessing the Command Line
37
CLI Modes
37
Navigating CLI Modes
39
The Do Command
42
Undoing Commands
42
Obtaining Help
43
Entering and Editing Commands
43
Command History
44
Filtering Show Command Outputs
44
Example of the Grep Keyword
44
Multiple Users in Configuration Mode
45
3 Getting Started
46
Console Access
47
Serial Console
47
Accessing the CLI Interface and Running Scripts Using SSH
48
Entering CLI Commands Using an SSH Connection
48
Executing Local CLI Scripts Using an SSH Connection
48
Default Configuration
49
Configuring a Host Name
49
Accessing the System Remotely
49
Configure the Management Port IP Address
49
Configure a Management Route
50
Configuring a Username and Password
50
Configuring the Enable Password
50
Configuration File Management
51
Copy Files to and from the System
51
Mounting an NFS File System
52
Save the Running-Configuration
53
Configure the Overload Bit for a Startup Scenario
54
Viewing Files
54
Compressing Configuration Files
55
Managing the File System
58
Enabling Software Features on Devices Using a Command Option
58
View Command History
59
Upgrading Dell Networking os
59
Verify Software Images before Installation
59
Using HTTP for File Transfers
60
4 Management
62
Configuring Privilege Levels
62
Creating a Custom Privilege Level
63
Removing a Command from EXEC Mode
63
Moving a Command from EXEC Privilege Mode to EXEC Mode
63
Allowing Access to CONFIGURATION Mode Commands
63
Allowing Access to Different Modes
63
Applying a Privilege Level to a Username
65
Applying a Privilege Level to a Terminal Line
65
Configuring Logging
65
Audit and Security Logs
66
Configuring Logging Format
68
Display the Logging Buffer and the Logging Configuration
68
Setting up a Secure Connection to a Syslog Server
69
Sending System Messages to a Syslog Server
70
Track Login Activity
70
Restrictions for Tracking Login Activity
70
Configuring Login Activity Tracking
70
Display Login Statistics
71
Limit Concurrent Login Sessions
72
Restrictions for Limiting the Number of Concurrent Sessions
72
Configuring Concurrent Session Limit
73
Enabling the System to Clear Existing Sessions
73
Enabling Secured CLI Mode
74
Log Messages in the Internal Buffer
74
Configuration Task List for System Log Management
74
Disabling System Logging
74
Sending System Messages to a Syslog Server
75
Configuring a UNIX System as a Syslog Server
75
Changing System Logging Settings
75
Display the Logging Buffer and the Logging Configuration
76
Configuring a UNIX Logging Facility Level
77
Synchronizing Log Messages
78
Enabling Timestamp on Syslog Messages
78
File Transfer Services
79
Configuration Task List for File Transfer Services
79
Enabling the FTP Server
79
Configuring FTP Server Parameters
79
Configuring FTP Client Parameters
80
Terminal Lines
80
Denying and Permitting Access to a Terminal Line
81
Configuring Login Authentication for Terminal Lines
82
Setting Timeout for EXEC Privilege Mode
83
Using Telnet to Get to Another Network Device
83
Lock CONFIGURATION Mode
84
Viewing the Configuration Lock Status
84
Reloading the System
84
Restoring the Factory Default Settings
85
Important Points to Remember
85
Restoring Factory Default Environment Variables
86
802.1X
88
Port-Authentication Process
90
EAP over RADIUS
90
Configuring 802.1X
91
Related Configuration Tasks
91
Important Points to Remember
91
Enabling 802.1X
92
Configuring Dot1X Profile
93
Configuring MAC Addresses for a Do1X Profile
94
Configuring the Static MAB and MAB Profile
94
Configuring Critical VLAN
95
Configuring Request Identity Re-Transmissions
96
Configuring a Quiet Period after a Failed Authentication
96
Forcibly Authorizing or Unauthorizing a Port
97
Re-Authenticating a Port
98
Configuring Timeouts
99
Configuring Dynamic VLAN Assignment with Port Authentication
100
Guest and Authentication-Fail Vlans
101
Configuring a Guest VLAN
101
Configuring an Authentication-Fail VLAN
101
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)
103
Optimizing CAM Utilization During the Attachment of Acls to Vlans
103
Guidelines for Configuring ACL VLAN Groups
104
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters
104
Configuring ACL VLAN Groups
104
Configuring FP Blocks for VLAN Parameters
105
Viewing CAM Usage
106
Allocating FP Blocks for VLAN Processes
107
Unified Forwarding Table (UFT) Modes
108
Configuring UFT Modes
108
7 Access Control Lists (Acls)
110
IP Access Control Lists (Acls)
111
CAM Usage
112
Implementing Acls on Dell Networking os
112
Important Points to Remember
114
Configuration Task List for Route Maps
114
Configuring Match Routes
116
Configuring Set Conditions
117
Configure a Route Map for Route Redistribution
118
Configure a Route Map for Route Tagging
119
Continue Clause
119
IP Fragment Handling
120
IP Fragments ACL Examples
120
Layer 4 ACL Rules Examples
120
Configure a Standard IP ACL
121
Configuring a Standard IP ACL Filter
122
Configure an Extended IP ACL
123
Configuring Filters with a Sequence Number
123
Configuring Filters Without a Sequence Number
124
Configure Layer 2 and Layer 3 Acls
125
Assign an IP ACL to an Interface
126
Applying an IP ACL
126
Counting ACL Hits
127
Configure Ingress Acls
127
Configure Egress Acls
127
Applying Egress Layer 3 Acls (Control-Plane)
128
IP Prefix Lists
129
Implementation Information
129
Configuration Task List for Prefix Lists
129
ACL Resequencing
133
Resequencing an ACL or Prefix List
133
Route Maps
135
Implementation Information
135
Logging of ACL Processes
135
Guidelines for Configuring ACL Logging
136
Configuring ACL Logging
136
Flow-Based Monitoring Support for Acls
137
Behavior of Flow-Based Monitoring
137
Enabling Flow-Based Monitoring
138
Configuring UDF ACL
139
Configuring IP Mirror Access Group
142
Sample Configuration
143
Example of Viewing IP Mirror-Access-Group Applied to an Interface
143
8 Bidirectional Forwarding Detection (BFD)
144
How BFD Works
144
BFD Packet Format
145
BFD Sessions
146
BFD Three-Way Handshake
147
Session State Changes
149
Important Points to Remember
149
Configure BFD
149
Configure BFD for Physical Ports
150
Configure BFD for Static Routes
151
Configure BFD for OSPF
154
Configure BFD for Ospfv3
159
Configure BFD for IS-IS
162
Configure BFD for BGP
165
Configure BFD for VRRP
171
Configuring Protocol Liveness
174
Troubleshooting BFD
174
9 Border Gateway Protocol Ipv4 (Bgpv4)
176
Autonomous Systems (AS)
176
Sessions and Peers
178
Establish a Session
178
Route Reflectors
179
BGP Attributes
180
Best Path Selection Criteria
180
Weight
182
Local Preference
182
Multi-Exit Discriminators (Meds)
183
Origin
184
AS Path
185
Next Hop
185
Multiprotocol BGP
185
Implement BGP with Dell Networking os
186
Additional Path (Add-Path) Support
186
Advertise IGP Cost as MED for Redistributed Routes
186
Ignore Router-ID in Best-Path Calculation
187
Four-Byte as Numbers
187
AS4 Number Representation
187
AS Number Migration
189
BGP4 Management Information Base (MIB)
190
Important Points to Remember
190
Configuration Information
191
BGP Configuration
191
Enabling BGP
192
Configuring AS4 Number Representations
195
Configuring Peer Groups
197
Configuring BGP Fast Fall-Over
199
Configuring Passive Peering
201
Maintaining Existing as Numbers During an as Migration
201
Allowing an as Number to Appear in Its Own as Path
202
Enabling Graceful Restart
203
Enabling Neighbor Graceful Restart
204
Filtering on an AS-Path Attribute
204
Regular Expressions as Filters
206
Redistributing Routes
207
Enabling Additional Paths
208
Configuring IP Community Lists
208
Configuring an IP Extended Community List
209
Filtering Routes with Community Lists
210
Manipulating the COMMUNITY Attribute
211
Changing MED Attributes
212
Changing the LOCAL_PREFERENCE Attribute
212
Configuring the Local System or a Different System to be the Next Hop for BGP-Learned Routes
213
Changing the WEIGHT Attribute
214
Enabling Multipath
214
Filtering BGP Routes
214
Filtering BGP Routes Using Route Maps
216
Filtering BGP Routes Using AS-PATH Information
216
Configuring BGP Route Reflectors
217
Aggregating Routes
218
Configuring BGP Confederations
218
Enabling Route Flap Dampening
219
Changing BGP Timers
221
Enabling BGP Neighbor Soft-Reconfiguration
221
Enabling or Disabling BGP Neighbors
222
Route Map Continue
224
Enabling MBGP Configurations
224
Configure Ipv6 NH Automatically for Ipv6 Prefix Advertised over Ipv4 Neighbor
225
BGP Regular Expression Optimization
225
Debugging BGP
225
Storing Last and Bad Pdus
226
Capturing Pdus
227
PDU Counters
228
Sample Configurations
228
10 Content Addressable Memory (CAM)
235
CAM Allocation
235
Test CAM Usage
237
View CAM-ACL Settings
237
View CAM Usage
239
CAM Optimization
239
Troubleshoot CAM Profiling
239
Qos CAM Region Limitation
239
11 Control Plane Policing (Copp)
241
Configure Control Plane Policing
242
Configuring Copp for Protocols
243
Configuring Copp for CPU Queues
245
Copp for Ospfv3 Packets
246
Configuring Copp for Ospfv3
249
Displaying Copp Configuration
249
12 Data Center Bridging (DCB)
252
Ethernet Enhancements in Data Center Bridging
252
Priority-Based Flow Control
253
Enhanced Transmission Selection
254
Data Center Bridging Exchange Protocol (Dcbx)
255
Data Center Bridging in a Traffic Flow
256
Enabling Data Center Bridging
256
DCB Maps and Its Attributes
257
Data Center Bridging: Default Configuration
258
Configuring Priority-Based Flow Control
258
Configuring Lossless Queues
259
Configuring PFC in a DCB Map
260
PFC Configuration Notes
260
PFC Prerequisites and Restrictions
261
Applying a DCB Map on a Port
261
Configuring PFC Without a DCB Map
262
Configuring Lossless Queuesexample
262
Priority-Based Flow Control Using Dynamic Buffer Method
264
Pause and Resume of Traffic
264
Buffer Sizes for Lossless or PFC Packets
264
Behavior of Tagged Packets
265
Configuration Example for DSCP and PFC Priorities
265
Using PFC to Manage Converged Ethernet Traffic
266
Configure Enhanced Transmission Selection
266
ETS Prerequisites and Restrictions
266
Creating an ETS Priority Group
266
ETS Operation with Dcbx
268
Configuring Bandwidth Allocation for Dcbx CIN
268
Configuring ETS in a DCB Map
269
Hierarchical Scheduling in ETS Output Policies
270
Using ETS to Manage Converged Ethernet Traffic
271
Applying DCB Policies in a Switch Stack
271
Configure a Dcbx Operation
271
Dcbx Operation
271
Dcbx Port Roles
272
DCB Configuration Exchange
273
Configuration Source Election
273
Propagation of DCB Information
274
Auto-Detection and Manual Configuration of the Dcbx Version
274
Dcbx Example
275
Dcbx Prerequisites and Restrictions
275
Configuring Dcbx
275
Verifying the DCB Configuration
279
Qos Dot1P Traffic Classification and Queue Assignment
288
Configuring the Dynamic Buffer Method
289
Sample DCB Configuration
290
PFC and ETS Configuration Command Examples
292
13 Dynamic Host Configuration Protocol (DHCP)
293
DHCP Packet Format and Options
293
Assign an IP Address Using DHCP
295
Implementation Information
296
Configure the System to be a DHCP Server
296
Configuring the Server for Automatic Address Allocation
297
Specifying a Default Gateway
298
Configure a Method of Hostname Resolution
298
Using DNS for Address Resolution
298
Using Netbios WINS for Address Resolution
299
Creating Manual Binding Entries
299
Debugging the DHCP Server
299
Using DHCP Clear Commands
300
Configure the System to be a Relay Agent
300
Configure the System to be a DHCP Client
302
Configuring the DHCP Client System
302
DHCP Client on a Management Interface
304
DHCP Client Operation with Other Features
304
Configure the System for User Port Stacking (Option 230)
305
Configure Secure DHCP
305
Option 82
306
DHCP Snooping
306
Enabling Dhcp Snooping
307
Drop DHCP Packets on Snooped Vlans Only
309
Dynamic ARP Inspection
310
Configuring Dynamic ARP Inspection
311
Source Address Validation
312
Enabling IP Source Address Validation
312
DHCP MAC Source Address Validation
313
Enabling IP+MAC Source Address Validation
313
Viewing the Number of SAV Dropped Packets
314
Clearing the Number of SAV Dropped Packets
314
14 Equal Cost Multi-Path (ECMP)
315
ECMP for Flow-Based Affinity
315
Configuring the Hash Algorithm
315
Enabling Deterministic ECMP Next Hop
315
Configuring the Hash Algorithm Seed
316
Link Bundle Monitoring
316
Managing ECMP Group Paths
317
Creating an ECMP Group Bundle
317
Modifying the ECMP Group Threshold
317
Rtag7
318
Flow-Based Hashing for ECMP
319
15 FIP Snooping
322
Fibre Channel over Ethernet
322
Ensure Robustness in a Converged Ethernet Network
322
FIP Snooping on Ethernet Bridges
324
FIP Snooping in a Switch Stack
326
Using FIP Snooping
326
FIP Snooping Prerequisites
326
Important Points to Remember
326
Enabling the Fcoe Transit Feature
327
Enable FIP Snooping on Vlans
328
Configure the FC-MAP Value
328
Configure a Port for a Bridge-To-Bridge Link
328
Configure a Port for a Bridge-To-FCF Link
328
Impact on Other Software Features
328
FIP Snooping Restrictions
329
Configuring FIP Snooping
329
Displaying FIP Snooping Information
330
Fcoe Transit Configuration Example
335
16 Flex Hash and Optimized Boot-Up
337
Flex Hash Capability Overview
337
Configuring the Flex Hash Mechanism
337
Configuring Fast Boot and LACP Fast Switchover
338
Optimizing the Boot Time
338
Booting Process When Optimized Boot Time Mechanism Is Enabled
338
Guidelines for Configuring Optimized Booting Mechanism
339
Interoperation of Applications with Fast Boot and System States
340
LACP and Ipv4 Routing
340
LACP and Ipv6 Routing
340
BGP Graceful Restart
341
Cold Boot Caused by Power Cycling the System
341
Unexpected Reload of the System
341
Software Upgrade
341
LACP Fast Switchover
341
Changes to BGP Multipath
342
Delayed Installation of ECMP Routes into BGP
342
RDMA over Converged Ethernet (Roce) Overview
342
Preserving 802.1Q VLAN Tag Value for Lite Subinterfaces
343
17 FIPS Cryptography
344
Configuration Tasks
344
Preparing the System
344
Enabling FIPS Mode
345
Generating Host-Keys
345
Monitoring FIPS Mode Status
345
Disabling FIPS Mode
346
18 Force10 Resilient Ring Protocol (FRRP)
347
Protocol Overview
347
Ring Status
348
Multiple FRRP Rings
348
Important FRRP Points
349
Important FRRP Concepts
350
Implementing FRRP
351
FRRP Configuration
351
Creating the FRRP Group
351
Configuring the Control VLAN
352
Configuring and Adding the Member Vlans
353
Setting the FRRP Timers
354
Clearing the FRRP Counters
354
Viewing the FRRP Configuration
354
Viewing the FRRP Information
354
Troubleshooting FRRP
355
Configuration Checks
355
Sample Configuration and Topology
355
FRRP Support on VLT
356
Example Scenario
357
Important Points to Remember
358
19 GARP VLAN Registration Protocol (GVRP)
359
Important Points to Remember
359
Configure GVRP
360
Related Configuration Tasks
360
Enabling GVRP Globally
361
Enabling GVRP on a Layer 2 Interface
361
Configure GVRP Registration
361
Configure a GARP Timer
362
RPM Redundancy
362
20 High Availability (HA)
364
Component Redundancy
364
Automatic and Manual Stack Unit Failover
364
Synchronization between Management and Standby Units
365
Forcing a Stack Unit Failover
365
Specifying an Auto-Failover Limit
366
Disabling Auto-Reboot
366
Manually Synchronizing Management and Standby Units
366
Pre-Configuring a Stack Unit Slot
366
Removing a Provisioned Logical Stack Unit
366
Hitless Behavior
367
Graceful Restart
367
Software Resiliency
367
Software Component Health Monitoring
367
System Health Monitoring
367
Failure and Event Logging
368
Hot-Lock Behavior
368
21 Internet Group Management Protocol (IGMP)
369
IGMP Implementation Information
369
IGMP Protocol Overview
369
IGMP Version 2
369
Leaving a Multicast Group
370
IGMP Version 3
371
Configure IGMP
374
Related Configuration Tasks
374
Viewing IGMP Enabled Interfaces
375
Selecting an IGMP Version
375
Viewing IGMP Groups
375
Adjusting Timers
376
Adjusting Query and Response Timers
376
Preventing a Host from Joining a Group
377
Enabling IGMP Immediate-Leave
380
IGMP Snooping
380
IGMP Snooping Implementation Information
380
Configuring IGMP Snooping
380
Removing a Group-Port Association
381
Disabling Multicast Flooding
381
Specifying a Port as Connected to a Multicast Router
382
Configuring the Switch as Querier
382
Fast Convergence after MSTP Topology Changes
383
Egress Interface Selection (EIS) for HTTP and IGMP Applications
383
Protocol Separation
383
Enabling and Disabling Management Egress Interface Selection
384
Handling of Management Route Configuration
385
Handling of Switch-Initiated Traffic
386
Handling of Switch-Destined Traffic
386
Handling of Transit Traffic (Traffic Separation)
387
Mapping of Management Applications and Traffic Type
387
Behavior of Various Applications for Switch-Initiated Traffic
388
Behavior of Various Applications for Switch-Destined Traffic
389
Interworking of EIS with Various Applications
390
Designating a Multicast Router Interface
390
22 Interfaces
392
Basic Interface Configuration
392
Advanced Interface Configuration
392
Interface Types
393
View Basic Interface Information
393
Resetting an Interface to Its Factory Default State
395
Enabling a Physical Interface
396
Physical Interfaces
396
Configuration Task List for Physical Interfaces
396
Overview of Layer Modes
396
Configuring Layer 2 (Data Link) Mode
397
Configuring Layer 2 (Interface) Mode
397
Configuring Layer 3 (Network) Mode
398
Configuring Layer 3 (Interface) Mode
398
Egress Interface Selection (EIS)
399
Important Points to Remember
399
Configuring EIS
399
Management Interfaces
400
Configuring Management Interfaces
400
Configuring a Management Interface on an Ethernet Port
401
VLAN Interfaces
402
Loopback Interfaces
403
Null Interfaces
403
Port Channel Interfaces
403
Port Channel Definition and Standards
404
Port Channel Benefits
404
Port Channel Implementation
404
Interfaces in Port Channels
405
Configuration Tasks for Port Channel Interfaces
405
Creating a Port Channel
405
Adding a Physical Interface to a Port Channel
406
Reassigning an Interface to a New Port Channel
407
Configuring the Minimum Oper up Links in a Port Channel
408
Adding or Removing a Port Channel from a VLAN
408
Assigning an IP Address to a Port Channel
409
Deleting or Disabling a Port Channel
410
Load Balancing through Port Channels
410
Changing the Hash Algorithm
410
Bulk Configuration
411
Interface Range
411
Bulk Configuration Examples
411
Defining Interface Range Macros
413
Define the Interface Range
413
Choosing an Interface-Range Macro
413
Monitoring and Maintaining Interfaces
414
Maintenance Using TDR
415
Non Dell-Qualified Transceivers
415
Splitting 40G Ports Without Reload
416
Splitting QSFP Ports to SFP+ Ports
417
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port
418
Important Points to Remember
418
Example Scenarios
418
Configuring Wavelength for 10-Gigabit SFP+ Optics
420
Link Dampening
420
Important Points to Remember
420
Enabling Link Dampening
420
Link Bundle Monitoring
422
Using Ethernet Pause Frames for Flow Control
422
Enabling Pause Frames
423
Configure the MTU Size on an Interface
424
Port-Pipes
424
Auto-Negotiation on Ethernet Interfaces
425
Setting the Speed of Ethernet Interfaces
425
Set Auto-Negotiation Options
426
View Advanced Interface Information
427
Configuring the Interface Sampling Size
428
Configuring the Traffic Sampling Size Globally
429
Dynamic Counters
430
Clearing Interface Counters
431
23 Internet Protocol Security (Ipsec)
432
Configuring Ipsec
432
24 Ipv4 Routing
434
IP Addresses
435
Implementation Information
435
Configuration Tasks for IP Addresses
435
Assigning IP Addresses to an Interface
435
Configuring Static Routes
436
Configure Static Routes for the Management Interface
437
Ipv4 Path MTU Discovery Overview
438
Using the Configured Source IP Address in ICMP Messages
438
Configuring the ICMP Source Interface
438
Configuring the Duration to Establish a TCP Connection
439
Enabling Directed Broadcast
439
Resolution of Host Names
439
Enabling Dynamic Resolution of Host Names
440
Specifying the Local System Domain and a List of Domains
440
Configuring DNS with Traceroute
441
Arp
441
Configuration Tasks for ARP
442
Configuring Static ARP Entries
442
Enabling Proxy ARP
442
Clearing ARP Cache
443
ARP Learning Via Gratuitous ARP
443
Enabling ARP Learning Via Gratuitous ARP
443
ARP Learning Via ARP Request
443
Configuring ARP Retries
444
Icmp
445
Configuration Tasks for ICMP
445
Enabling ICMP Unreachable Messages
445
UDP Helper
445
Configure UDP Helper
445
Important Points to Remember
446
Enabling UDP Helper
446
Configuring a Broadcast Address
446
Configurations Using UDP Helper
447
UDP Helper with Broadcast-All Addresses
447
UDP Helper with Subnet Broadcast Addresses
448
UDP Helper with Configured Broadcast Addresses
448
UDP Helper with no Configured Broadcast Addresses
449
Troubleshooting UDP Helper
449
25 Ipv6 Routing
450
Protocol Overview
450
Extended Address Space
451
Stateless Autoconfiguration
451
Ipv6 Headers
451
Ipv6 Header Fields
452
Extension Header Fields
454
Addressing
455
Implementing Ipv6 with Dell Networking os
456
Icmpv6
457
Path MTU Discovery
458
Ipv6 Neighbor Discovery
458
Ipv6 Neighbor Discovery of MTU Packets
459
Configuration Task List for Ipv6 RDNSS
459
Configuring the Ipv6 Recursive DNS Server
459
Debugging Ipv6 RDNSS Information Sent to the Host
460
Displaying Ipv6 RDNSS Information
461
Secure Shell (SSH) over an Ipv6 Transport
461
Configuration Tasks for Ipv6
462
Adjusting Your CAM-Profile
462
Assigning an Ipv6 Address to an Interface
463
Assigning a Static Ipv6 Route
463
Configuring Telnet with Ipv6
464
SNMP over Ipv6
464
Displaying Ipv6 Information
464
Displaying an Ipv6 Interface Information
465
Showing Ipv6 Routes
465
Showing the Running-Configuration for an Interface
467
Clearing Ipv6 Routes
467
Disabling ND Entry Timeout
467
Configuring Ipv6 RA Guard
468
Configuring Ipv6 RA Guard on an Interface
469
Monitoring Ipv6 RA Guard
470
26 Iscsi Optimization
471
Iscsi Optimization Overview
471
Monitoring Iscsi Traffic Flows
473
Application of Quality of Service to Iscsi Traffic Flows
473
Information Monitored in Iscsi Traffic Flows
473
Detection and Auto-Configuration for Dell Equallogic Arrays
474
Configuring Detection and Ports for Dell Compellent Arrays
474
Synchronizing Iscsi Sessions Learned on VLT-Lags with VLT-Peer
475
Enable and Disable Iscsi Optimization
475
Default Iscsi Optimization Values
476
Iscsi Optimization Prerequisites
476
Configuring Iscsi Optimization
476
Iscsi Enable
477
Displaying Iscsi Optimization Information
478
27 Intermediate System to Intermediate System
480
IS-IS Protocol Overview
480
IS-IS Addressing
480
Multi-Topology IS-IS
481
Transition Mode
481
Interface Support
482
Adjacencies
482
Graceful Restart
482
Timers
482
Implementation Information
482
Configuration Information
483
Configuration Tasks for IS-IS
484
Configuring the Distance of a Route
491
Changing the IS-Type
492
Redistributing Ipv4 Routes
494
Redistributing Ipv6 Routes
495
Configuring Authentication Passwords
496
Setting the Overload Bit
496
Debugging IS-IS
497
IS-IS Metric Styles
498
Configure Metric Values
498
Maximum Values in the Routing Table
498
Change the IS-IS Metric Style in One Level Only
498
Leaks from One Level to Another
500
Sample Configurations
501
28 Link Aggregation Control Protocol (LACP)
503
Introduction to Dynamic Lags and LACP
503
Important Points to Remember
503
LACP Modes
504
Configuring LACP Commands
504
LACP Configuration Tasks
505
Creating a LAG
505
Configuring the LAG Interfaces as Dynamic
505
Setting the LACP Long Timeout
506
Monitoring and Debugging LACP
506
Shared LAG State Tracking
507
Configuring Shared LAG State Tracking
507
Important Points about Shared LAG State Tracking
509
LACP Basic Configuration Example
509
Configure a LAG on ALPHA
509
29 Layer 2
518
Manage the MAC Address Table
518
Clearing the MAC Address Table
518
Setting the Aging Time for Dynamic Entries
518
Configuring a Static MAC Address
519
Displaying the MAC Address Table
519
MAC Learning Limit
519
Setting the MAC Learning Limit
520
Mac Learning-Limit Dynamic
520
Mac Learning-Limit Mac-Address-Sticky
520
Mac Learning-Limit Station-Move
521
Mac Learning-Limit No-Station-Move
521
Learning Limit Violation Actions
521
Setting Station Move Violation Actions
522
Recovering from Learning Limit and Station Move Violations
522
Disabling MAC Address Learning on the System
523
NIC Teaming
523
Configure Redundant Pairs
524
Important Points about Configuring Redundant Pairs
526
Far-End Failure Detection
527
FEFD State Changes
528
Configuring FEFD
529
Enabling FEFD on an Interface
529
Debugging FEFD
530
30 Link Layer Discovery Protocol (LLDP)
532
802.1AB (LLDP) Overview
532
Protocol Data Units
532
Optional Tlvs
533
Management Tlvs
533
TIA-1057 (LLDP-MED) Overview
535
TIA Organizationally Specific Tlvs
535
Configure LLDP
539
Related Configuration Tasks
539
Important Points to Remember
539
LLDP Compatibility
540
CONFIGURATION Versus INTERFACE Configurations
540
Enabling LLDP
540
Disabling and Undoing LLDP
541
Enabling LLDP on Management Ports
541
Disabling and Undoing LLDP on Management Ports
541
Advertising Tlvs
541
Viewing the LLDP Configuration
543
Viewing Information Advertised by Adjacent LLDP Agents
543
Configuring LLDPDU Intervals
544
Configuring Transmit and Receive Mode
545
Configuring the Time to Live Value
545
Debugging LLDP
546
Relevant Management Objects
547
31 Microsoft Network Load Balancing
552
NLB Unicast Mode Scenario
552
NLB Multicast Mode Scenario
552
Limitations of the NLB Feature
553
Microsoft Clustering
553
Enable and Disable VLAN Flooding
553
Configuring a Switch for NLB
553
Enabling a Switch for Multicast NLB
554
32 Multicast Source Discovery Protocol (MSDP)
555
Protocol Overview
555
Anycast RP
556
Implementation Information
557
Configure Multicast Source Discovery Protocol
557
Related Configuration Tasks
557
Enable MSDP
561
Manage the Source-Active Cache
562
Viewing the Source-Active Cache
562
Limiting the Source-Active Cache
562
Clearing the Source-Active Cache
563
Enabling the Rejected Source-Active Cache
563
Accept Source-Active Messages that Fail the RFP Check
563
Specifying Source-Active Messages
566
Limiting the Source-Active Messages from a Peer
567
Preventing MSDP from Caching a Local Source
567
Preventing MSDP from Caching a Remote Source
568
Preventing MSDP from Advertising a Local Source
568
Logging Changes in Peership States
569
Terminating a Peership
569
Clearing Peer Statistics
570
Debugging MSDP
570
MSDP with Anycast RP
571
Configuring Anycast RP
572
Reducing Source-Active Message Flooding
573
Specifying the RP Address Used in SA Messages
573
MSDP Sample Configurations
575
33 Multiple Spanning Tree Protocol (MSTP)
578
Protocol Overview
578
Spanning Tree Variations
579
Implementation Information
579
Configure Multiple Spanning Tree Protocol
579
Related Configuration Tasks
580
Enable Multiple Spanning Tree Globally
580
Adding and Removing Interfaces
580
Creating Multiple Spanning Tree Instances
581
Influencing MSTP Root Selection
582
Interoperate with Non-Dell Bridges
582
Changing the Region Name or Revision
583
Modifying Global Parameters
583
Modifying the Interface Parameters
584
Configuring an Edgeport
585
Flush MAC Addresses after a Topology Change
586
MSTP Sample Configurations
586
Router 1 Running-Configurationrouter 2 Running-Configurationrouter 3 Running-Configurationsftos Example Running-Configuration
587
Debugging and Verifying MSTP Configurations
590
34 Multicast Features
592
Enabling IP Multicast
592
Implementation Information
592
Multicast Policies
593
Ipv4 Multicast Policies
593
Understanding Multicast Traceroute (Mtrace)
600
Important Points to Remember
601
Printing Multicast Traceroute (Mtrace) Paths
601
Supported Error Codes
602
Mtrace Scenarios
603
35 Object Tracking
609
Object Tracking Overview
609
Track Layer 2 Interfaces
610
Track Layer 3 Interfaces
610
Track Ipv4 and Ipv6 Routes
611
Set Tracking Delays
612
VRRP Object Tracking
612
Object Tracking Configuration
612
Tracking a Layer 2 Interface
612
Tracking a Layer 3 Interface
613
Track an Ipv4/Ipv6 Route
615
Displaying Tracked Objects
618
36 Open Shortest Path First (Ospfv2 and Ospfv3)
620
Protocol Overview
620
Autonomous System (AS) Areas
620
Area Types
621
Networks and Neighbors
622
Router Types
622
Designated and Backup Designated Routers
624
Link-State Advertisements (Lsas)
624
Router Priority and Cost
625
OSPF with Dell Networking os
626
Graceful Restart
627
Fast Convergence (Ospfv2, Ipv4 Only)
628
Multi-Process Ospfv2 with VRF
628
OSPF ACK Packing
628
Setting OSPF Adjacency with Cisco Routers
628
Configuration Information
629
Configuration Task List for Ospfv2 (OSPF for Ipv4)
629
Router Ospf
630
Ip Ospf Cost
636
Show Ip Route Summary
641
Show Ip Ospf Database
641
Show Ip Ospf Neighbor
641
Configuration Task List for Ospfv3 (OSPF for Ipv6)
643
Clear Ipv6 Ospf Process
646
Configuration Task List for Ospfv3 (OSPF for Ipv6)
656
Enabling Ipv6 Unicast Routing
657
Applying Cost for Ospfv3
657
Assigning Ipv6 Addresses on an Interface
658
Assigning Area ID on an Interface
658
Assigning Ospfv3 Process ID and Router ID Globally
658
Assigning Ospfv3 Process ID and Router ID to a VRF
659
Configuring Stub Areas
659
Configuring Passive-Interface
660
Redistributing Routes
660
Configuring a Default Route
660
Enabling Ospfv3 Graceful Restart
661
Ospfv3 Authentication Using Ipsec
663
Troubleshooting Ospfv3
669
37 Policy-Based Routing (PBR)
671
Overview
671
Implementing PBR
672
Configuration Task List for Policy-Based Routing
672
PBR Exceptions (Permit)
673
Create a Redirect List
673
Create a Rule for a Redirect-List
673
Apply a Redirect-List to an Interface Using a Redirect-Group
675
Sample Configuration
677
Create the Redirect-List Goldassign Redirect-List GOLD to Interface 2/11View Redirect-List GOLD
678
38 PIM Sparse-Mode (PIM-SM)
682
Implementation Information
682
Protocol Overview
682
Requesting Multicast Traffic
682
Refuse Multicast Traffic
683
Send Multicast Traffic
683
Configuring PIM-SM
683
Related Configuration Tasks
684
Enable PIM-SM
684
Configuring S,G Expiry Timers
685
Configuring a Static Rendezvous Point
686
Overriding Bootstrap Router Updates
686
Configuring a Designated Router
686
Creating Multicast Boundaries and Domains
687
39 PIM Source-Specific Mode (PIM-SSM)
688
Implementation Information
688
Important Points to Remember
688
Configure PIM-SSM
689
Related Configuration Tasks
689
Enabling PIM-SSM
689
Use PIM-SSM with IGMP Version 2 Hosts
689
Configuring PIM-SSM with Igmpv2
690
Electing an RP Using the BSR Mechanism
691
Enabling RP to Server Specific Multicast Groups
692
40 Port Monitoring
693
Important Points to Remember
693
Port Monitoring
694
Configuring Port Monitoring
696
Configuring Monitor Multicast Queue
697
Enabling Flow-Based Monitoring
698
Remote Port Mirroring
699
Remote Port Mirroring Example
699
Configuring Remote Port Mirroring
700
Displaying Remote-Port Mirroring Configurations
702
Configuring the Sample Remote Port Mirroring
702
Encapsulated Remote Port Monitoring
705
ERPM Behavior on a Typical Dell Networking os
707
Decapsulation of ERPM Packets at the Destination IP/ Analyzer
707
Port Monitoring on VLT
708
VLT Non-Fail over Scenario
708
VLT Fail-Over Scenario
709
RPM over VLT Scenarios
709
Advertisement
Dell S4048T-ON Getting Started Manual (35 pages)
Brand:
Dell
| Category:
Network Hardware
| Size: 1.45 MB
Table of Contents
About this Guide
3
NEBS Compliance
4
Hardware Installation
6
System Installation
16
Installing a Fan Module
22
Supply Power and Power up the System
24
Software Configuration
25
Navigating CLI Modes
26
Console Access
26
Default Configuration
28
Host Name Configuration
29
Remote Access
29
System Connection
31
Technical Specifications
32
Advertisement
Related Products
Dell Networking S4048
Dell S4048-ON
Dell S4048T
Dell S4810-ON
Dell S4100-ON Series
Dell S4148F-ON Series
Dell S4128F-ON Series
Dell S4248FBL-ON
Dell S4148FE
Dell PowerSwitch S4148T-ON
Dell Categories
Laptop
Desktop
Server
Monitor
Storage
More Dell Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL