- Computers & electronics
- Software
- Computer utilities
- General utility software
- Dell
- PowerSwitch S6000 ON
- User manual
advertisement
1
About this Guide
This guide describes the protocols and features the Dell EMC Networking Operating System (OS) supports and provides configuration instructions and examples for implementing them. For complete information about all the CLI commands, see the Dell EMC Command Line
Reference Guide for your system.
The S6000–ON platform is available with Dell EMC Networking OS version 9.7(0.0) and beyond.
Though this guide contains information about protocols, it is not intended to be a complete reference. This guide is a reference for configuring protocols on Dell EMC Networking systems. For complete information about protocols, see the related documentation, including Internet Engineering Task Force (IETF) requests for comments (RFCs). The instructions in this guide cite relevant RFCs. The
chapter contains a complete list of the supported RFCs and management information base files (MIBs).
Topics:
•
•
•
Audience
This document is intended for system administrators who are responsible for configuring and maintaining networks and assumes knowledge in Layer 2 (L2) and Layer 3 (L3) networking technologies.
Conventions
This guide uses the following conventions to describe command syntax.
Keyword
parameter
{X}
[X] x|y x||y
Keywords are in Courier (a monospaced font) and must be entered in the CLI as listed.
Parameters are in italics and require a number or word to be entered in the CLI.
Keywords and parameters within braces must be entered in the CLI.
Keywords and parameters within brackets are optional.
Keywords and parameters separated by a bar require you to choose one option.
Keywords and parameters separated by a double bar allows you to choose any or all of the options.
Related Documents
For more information about the Dell EMC Networking switches, see the following documents:
• Dell EMC Networking OS Command Line Reference Guide
• Dell EMC Networking OS Installation Guide
• Dell EMC Networking OS Quick Start Guide
• Dell EMC Networking OS Release Notes
32 About this Guide
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
advertisement
Table of contents
- 3 Dell Configuration Guide for the S6000–ON System 9.14.2.6
- 32 About this Guide
- 32 Audience
- 32 Conventions
- 32 Related Documents
- 33 Configuration Fundamentals
- 33 Accessing the Command Line
- 33 CLI Modes
- 35 Navigating CLI Modes
- 37 The do Command
- 38 Undoing Commands
- 38 Obtaining Help
- 38 Entering and Editing Commands
- 39 Command History
- 39 Filtering show Command Outputs
- 40 Multiple Users in Configuration Mode
- 41 Getting Started
- 42 Console Access
- 42 Serial Console
- 42 Accessing the Console Port
- 42 Pin Assignments
- 43 Default Configuration
- 43 Configuring a Host Name
- 43 Accessing the System Remotely
- 43 Configure the Management Port IP Address
- 44 Configure a Management Route
- 44 Configuring a Username and Password
- 45 Configuring the Enable Password
- 45 Configuration File Management
- 45 Copy Files to and from the System
- 46 Mounting an NFS File System
- 47 Save the Running-Configuration
- 48 Configure the Overload Bit for a Startup Scenario
- 48 Viewing Files
- 48 View Configuration Files
- 49 Managing the File System
- 49 View Command History
- 50 Upgrading Dell EMC Networking OS
- 51 Using HTTP for File Transfers
- 51 Verify Software Images Before Installation
- 53 Management
- 53 Configuring Privilege Levels
- 54 Removing a Command from EXEC Mode
- 54 Moving a Command from EXEC Privilege Mode to EXEC Mode
- 54 Allowing Access to CONFIGURATION Mode Commands
- 54 Allowing Access to Different Modes
- 55 Applying a Privilege Level to a Username
- 55 Applying a Privilege Level to a Terminal Line
- 56 Configuring Logging
- 56 Audit and Security Logs
- 56 Enabling Audit and Security Logs
- 57 Displaying Audit and Security Logs
- 57 Clearing Audit Logs
- 57 Configuring Logging Format
- 58 Setting Up a Secure Connection to a Syslog Server
- 59 Log Messages in the Internal Buffer
- 59 Disabling System Logging
- 59 Sending System Messages to a Syslog Server
- 59 Configuring a UNIX System as a Syslog Server
- 60 Track Login Activity
- 60 Restrictions for Tracking Login Activity
- 60 Configuring Login Activity Tracking
- 60 Display Login Statistics
- 62 Limit Concurrent Login Sessions
- 62 Restrictions for Limiting the Number of Concurrent Sessions
- 62 Configuring Concurrent Session Limit
- 62 Enabling the System to Clear Existing Sessions
- 63 Enabling Secured CLI Mode
- 63 Changing System Logging Settings
- 64 Display the Logging Buffer and the Logging Configuration
- 65 Configuring a UNIX Logging Facility Level
- 66 Synchronizing Log Messages
- 66 Enabling Timestamp on Syslog Messages
- 69 File Transfer Services
- 69 Enabling the FTP Server
- 69 Configuring FTP Server Parameters
- 70 Configuring FTP Client Parameters
- 70 Terminal Lines
- 70 Denying and Permitting Access to a Terminal Line
- 71 Configuring Login Authentication for Terminal Lines
- 72 Setting Timeout for EXEC Privilege Mode
- 72 Using Telnet to get to Another Network Device
- 73 Lock CONFIGURATION Mode
- 74 Reloading the system
- 74 Restoring the Factory Default Settings
- 75 Restoring Factory Default Environment Variables
- 76 Viewing the Reason for Last System Reboot
- 76 Disabling Syslog Messages for SNMP Authentication Failure Events
- 77 802.1X
- 78 Port-Authentication Process
- 79 EAP over RADIUS
- 79 Configuring 802.1X
- 80 Important Points to Remember
- 80 Enabling 802.1X
- 81 Configuring dot1x Profile
- 82 Configuring MAC addresses for a do1x Profile
- 82 Configuring the Static MAB and MAB Profile
- 83 Configuring Critical VLAN
- 84 Configuring Request Identity Re-Transmissions
- 84 Configuring a Quiet Period after a Failed Authentication
- 85 Forcibly Authorizing or Unauthorizing a Port
- 85 Re-Authenticating a Port
- 86 Configuring Timeouts
- 87 Configuring Dynamic VLAN Assignment with Port Authentication
- 88 Guest and Authentication-Fail VLANs
- 89 Configuring a Guest VLAN
- 89 Configuring an Authentication-Fail VLAN
- 91 Access Control Lists (ACLs)
- 92 IP Access Control Lists (ACLs)
- 92 CAM Usage
- 92 User Configurable CAM Allocation
- 92 CAM Optimization
- 93 Test CAM Usage
- 93 Implementing ACLs on Dell EMC Networking OS
- 93 Assigning ACLs to VLANs
- 93 ACL Optimization
- 93 Determine the Order in which ACLs are Used to Classify Traffic
- 94 Configure ACL Range Profiles
- 95 Important Points to Remember
- 95 Configuration Task List for Route Maps
- 95 Creating a Route Map
- 96 Configure Route Map Filters
- 97 Configuring Match Routes
- 98 Configuring Set Conditions
- 99 Configure a Route Map for Route Redistribution
- 99 Configure a Route Map for Route Tagging
- 100 Continue Clause
- 100 IP Fragment Handling
- 100 IP Fragments ACL Examples
- 101 Layer 4 ACL Rules Examples
- 101 Configure a Standard IP ACL
- 102 Configuring a Standard IP ACL Filter
- 103 Configure an Extended IP ACL
- 103 Configuring Filters with a Sequence Number
- 104 Configure Filters, ICMP Packets
- 105 Configure Filters, TCP Packets
- 105 Configure Filters, UDP Packets
- 105 Configuring Filters Without a Sequence Number
- 106 Configure Layer 2 and Layer 3 ACLs
- 107 Assign an IP ACL to an Interface
- 107 Applying an IP ACL
- 107 Counting ACL Hits
- 108 Configure Ingress ACLs
- 108 Configure Egress ACLs
- 109 Applying Egress Layer 3 ACLs (Control-Plane)
- 109 IP Prefix Lists
- 110 Configuration Task List for Prefix Lists
- 110 Creating a Prefix List
- 111 Creating a Prefix List Without a Sequence Number
- 111 Viewing Prefix Lists
- 112 Applying a Prefix List for Route Redistribution
- 112 Applying a Filter to a Prefix List (OSPF)
- 113 ACL Remarks
- 113 Configuring a Remark
- 113 Deleting a Remark
- 114 ACL Resequencing
- 114 Resequencing an ACL or Prefix List
- 115 Route Maps
- 116 Flow-Based Monitoring
- 117 Enabling Flow-Based Monitoring
- 118 Configuring IP Mirror Access Group
- 119 Sample Configuration
- 119 Example of viewing IP mirror–access–group applied to an Interface
- 120 Bidirectional Forwarding Detection (BFD)
- 120 How BFD Works
- 121 BFD Packet Format
- 122 BFD Sessions
- 123 BFD Three-Way Handshake
- 124 Session State Changes
- 124 Important Points to Remember
- 124 Configure BFD
- 125 Configure BFD for Physical Ports
- 125 Enabling BFD Globally
- 125 Viewing Physical Port Session Parameters
- 126 Disabling and Re-Enabling BFD
- 126 Configure BFD for Static Routes
- 127 Establishing Sessions for Static Routes for Default VRF
- 127 Establishing Sessions for Static Routes for Nondefault VRF
- 127 Example Configuration and Verification
- 128 Establishing Static Route Sessions on Specific Neighbors
- 129 Changing Static Route Session Parameters
- 129 Disabling BFD for Static Routes
- 129 Configure BFD for IPv6 Static Routes
- 130 Establishing Sessions for IPv6 Static Routes for Default VRF
- 130 Establishing Sessions for IPv6 Static Routes for Nondefault VRF
- 130 Example Configuration and Verification
- 131 Changing IPv6 Static Route Session Parameters
- 131 Configure BFD for OSPF
- 132 Establishing Sessions with OSPF Neighbors for the Default VRF