[PDF] Dell EMC Configuration Guide for the S4048T–ON System 9.14.2.0





Previous PDF Next PDF



FTOS 8.3.16.1 Configuration Guide for the MXL 10/40GbE Switch IO

IP Access Control Lists (ACLs) . Assign an IP ACL to an Interface . ... Bare metal provisioning (BMP) improves accessibility to the MXL 10/40GbE Switch ...



Tree Bitmap : Hardware/Software IP Lookups with Incremental

If it takes 40 nsec per memory access it still takes 4 * 40 = 160 nsec to lookup D1. However



Sr. no Question Option A Option B Option C Option D Answer 1

When a host knows its physical address but not its IP address it can use 40. Write output of following example SELECT SUBSTR('SECURE'



Dell EMC Configuration Guide for the S4048T–ON System 9.14.2.0

Configure the Management Port IP Address. Example of viewing IP mirror–access–group applied to an Interface. ... Splitting 40G Ports without Reload.



HP ScanJet Pro 2500 f1 Flatbed Scanner

Auto-imaging features in the included HP Scan software let you Enhance images and delete blank pages. Scan speeds of up to 40 ipm measured at 300 dpi (black and 



Cisco Small Business IP Telephony Devices Provisioning Guide

40. Profile Rules. 41. Report Rule. 43. Upgrade Rule For both initial and permanent access the provisioning server relies on the client.





WD My Cloud User Manual

(Example: http://wdmycloud.local). 2. Click Go. Using IP Address: 1. Enter the IP address of your WD My Cloud device in.



C O N T E N T S A. CVC Circulars/guidelines

98/ORD/1 Dt. 18.12.03 (Increasing transparency in procurement /Sale). 40-41. 20. OM no. 8/2/04 Dt. 05.02.04 (Common irregularities in award of Contracts).



Nokia 7250 IXR-R Interconnect Routers

in this series are ideal for IP anyhaul aggregation

Dell EMC Configuration Guide for the

S4048T-ON System

9.14.2.0

April 2019

Rev. A00

Notes, cautions, and warningsNOTE: A NOTE indicates important information that helps you make better use of your product.CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid

the problem.WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

© 2018 - 2019 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its

subsidiaries. Other trademarks may be trademarks of their respective owners.

Chapter 1: About this Guide.........................................................................................................32

Related Documents................................................................................................................................

...........................32

Chapter 2: Configuration Fundamentals......................................................................................33

Accessing the Command Line................................................................................................................................

........33

CLI Modes................................................................................................................................

Navigating CLI Modes................................................................................................................................

................35

The do Command................................................................................................................................

..............................38

Undoing Commands................................................................................................................................

..........................38

Obtaining Help................................................................................................................................

....................................39

Entering and Editing Commands................................................................................................................................

...39

Command History................................................................................................................................

..............................40

Filtering show Command Outputs................................................................................................................................

.40

Multiple Users in Configuration Mode...........................................................................................................................41

Chapter 3: Getting Started..........................................................................................................42

Console Access................................................................................................................................

..................................42

Serial Console................................................................................................................................

...............................42

Accessing the CLI Interface and Running Scripts Using SSH................................................................................43

Default Configuration................................................................................................................................

.......................44

Configuring a Host Name................................................................................................................................

................44

Accessing the System Remotely................................................................................................................................

...44

Configure the Management Port IP Address.......................................................................................................45

Configure a Management Route..............................................................................................................................45

Configuring a Username and Password.................................................................................................................45

Configuring the Enable Password................................................................................................................................

.46

Configuration File Management................................................................................................................................

.....47

Copy Files to and from the System.........................................................................................................................47

Mounting an NFS File System................................................................................................................................

..47

Save the Running-Configuration.............................................................................................................................49

Configure the Overload Bit for a Startup Scenario.............................................................................................49

Viewing Files................................................................................................................................

.................................49

Compressing Configuration Files.............................................................................................................................50

Managing the File System................................................................................................................................

...............52

Enabling Software Features on Devices Using a Command Option.....................................................................53

View Command History................................................................................................................................

...................53

Upgrading Dell EMC Networking OS............................................................................................................................54

Verify Software Images Before Installation................................................................................................................54

Using HTTP for File Transfers................................................................................................................................

.......55

Chapter 4: Management..............................................................................................................56

Configuring Privilege Levels................................................................................................................................

...........56

Contents

Contents3

Removing a Command from EXEC Mode..............................................................................................................57

Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................57

Allowing Access to CONFIGURATION Mode Commands..................................................................................57

Allowing Access to Different Modes.......................................................................................................................57

Applying a Privilege Level to a Username.............................................................................................................59

Applying a Privilege Level to a Terminal Line.......................................................................................................59

Configuring Logging................................................................................................................................

.........................59

Audit and Security Logs................................................................................................................................

.............59

Configuring Logging Format ..............................................................................................................................61

Display the Logging Buffer and the Logging Configuration...............................................................................61

Setting Up a Secure Connection to a Syslog Server................................................................................ 62

Sending System Messages to a Syslog Server....................................................................................................63

Track Login Activity................................................................................................................................

..........................63

Restrictions for Tracking Login Activity................................................................................................................63

Configuring Login Activity Tracking........................................................................................................................64

Display Login Statistics................................................................................................................................

..............64

Limit Concurrent Login Sessions................................................................................................................................

...65

Restrictions for Limiting the Number of Concurrent Sessions........................................................................66

Configuring Concurrent Session Limit...................................................................................................................66

Enabling the System to Clear Existing Sessions..................................................................................................66

Enabling Secured CLI Mode................................................................................................................................

............67

Log Messages in the Internal Buffer.............................................................................................................................67

Disabling System Logging................................................................................................................................

................67

Sending System Messages to a Syslog Server..........................................................................................................68

Configuring a UNIX System as a Syslog Server...................................................................................................68

Changing System Logging Settings..............................................................................................................................68

Display the Logging Buffer and the Logging Configuration....................................................................................69

Configuring a UNIX Logging Facility Level..................................................................................................................69

Synchronizing Log Messages................................................................................................................................

.........70

Enabling Timestamp on Syslog Messages....................................................................................................................71

File Transfer Services................................................................................................................................

........................71

Enabling the FTP Server................................................................................................................................

.............71

Configuring FTP Server Parameters.......................................................................................................................72

Configuring FTP Client Parameters........................................................................................................................72

Terminal Lines................................................................................................................................

.....................................73

Denying and Permitting Access to a Terminal Line.............................................................................................73

Configuring Login Authentication for Terminal Lines..........................................................................................74

Setting Timeout for EXEC Privilege Mode..................................................................................................................75

Using Telnet to get to Another Network Device.......................................................................................................75

Lock CONFIGURATION Mode................................................................................................................................

.......76

LPC Bus Quality Degradation................................................................................................................................

.........76

Restoring the Factory Default Settings.......................................................................................................................77

Restoring Factory Default Environment Variables..............................................................................................78

Viewing the Reason for Last System Reboot.............................................................................................................79

Chapter 5: 802.1X.......................................................................................................................80

Port-Authentication Process................................................................................................................................

...........81

EAP over RADIUS................................................................................................................................

........................82

Configuring 802.1X................................................................................................................................

............................83

Important Points to Remember................................................................................................................................

.....834Contents

Enabling 802.1X................................................................................................................................

..................................84

Configuring Request Identity Re-Transmissions.......................................................................................................85

Configuring a Quiet Period after a Failed Authentication..................................................................................86

Forcibly Authorizing or Unauthorizing a Port.............................................................................................................86

Re-Authenticating a Port................................................................................................................................

................87

Configuring Timeouts................................................................................................................................

.......................88

Configuring Dynamic VLAN Assignment with Port Authentication......................................................................89

Guest and Authentication-Fail VLANs.........................................................................................................................90

Configuring a Guest VLAN................................................................................................................................

........90

Configuring an Authentication-Fail VLAN.............................................................................................................90

Chapter 6: Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)....92

Optimizing CAM Utilization During the Attachment of ACLs to VLANs..............................................................92

Guidelines for Configuring ACL VLAN Groups...........................................................................................................93

Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters..........................................93

Configuring ACL VLAN Groups................................................................................................................................93

Configuring FP Blocks for VLAN Parameters.......................................................................................................94

Viewing CAM Usage................................................................................................................................

.........................95

Allocating FP Blocks for VLAN Processes..................................................................................................................96

Unified Forwarding Table (UFT) Modes......................................................................................................................97

Configuring UFT Modes................................................................................................................................

.............97

Chapter 7: Access Control Lists (ACLs).......................................................................................98

IP Access Control Lists (ACLs)................................................................................................................................

.....99

CAM Usage................................................................................................................................

...................................99

Implementing ACLs on Dell EMC Networking OS..............................................................................................100

Important Points to Remember................................................................................................................................

....101

Configuration Task List for Route Maps..............................................................................................................102

Configuring Match Routes................................................................................................................................

......104

Configuring Set Conditions................................................................................................................................

.....105

Configure a Route Map for Route Redistribution..............................................................................................105

Configure a Route Map for Route Tagging.........................................................................................................106

Continue Clause................................................................................................................................

.........................106

IP Fragment Handling................................................................................................................................

.....................107

IP Fragments ACL Examples................................................................................................................................

...107

Layer 4 ACL Rules Examples................................................................................................................................

...107

Configure a Standard IP ACL................................................................................................................................

........108

Configuring a Standard IP ACL Filter....................................................................................................................109

Configure an Extended IP ACL................................................................................................................................

.....110

Configuring Filters with a Sequence Number......................................................................................................110

Configuring Filters Without a Sequence Number................................................................................................111

Configure Layer 2 and Layer 3 ACLs............................................................................................................................111

Assign an IP ACL to an Interface................................................................................................................................

..112

Applying an IP ACL................................................................................................................................

...........................112

Counting ACL Hits................................................................................................................................

......................113

Configure Ingress ACLs................................................................................................................................

..................113

Configure Egress ACLs................................................................................................................................

...................114

Applying Egress Layer 3 ACLs (Control-Plane)..................................................................................................114

IP Prefix Lists................................................................................................................................

Configuration Task List for Prefix Lists................................................................................................................115

ACL Remarks................................................................................................................................

.....................................118

Configuring a Remark................................................................................................................................

................119

Deleting a Remark................................................................................................................................

......................119

ACL Resequencing................................................................................................................................

..........................120

Resequencing an ACL or Prefix List......................................................................................................................120

Route Maps................................................................................................................................

Logging of ACL Processes................................................................................................................................

............122

Guidelines for Configuring ACL Logging..............................................................................................................122

Configuring ACL Logging................................................................................................................................

.........123

Flow-Based Monitoring................................................................................................................................

..................123

Enabling Flow-Based Monitoring...........................................................................................................................125

Configuring UDF ACL................................................................................................................................

.....................126

Configuring IP Mirror Access Group...........................................................................................................................128

Sample Configuration................................................................................................................................

................129

Example of viewing IP mirror-access-group applied to an Interface..........................................................129

Chapter 8: Bidirectional Forwarding Detection (BFD)................................................................130

How BFD Works................................................................................................................................

...............................130

BFD Packet Format................................................................................................................................

....................131

BFD Sessions................................................................................................................................

..............................132

BFD Three-Way Handshake................................................................................................................................

....133

Session State Changes................................................................................................................................

.............134

Important Points to Remember................................................................................................................................

....134

Configure BFD................................................................................................................................

..................................134

Configure BFD for Physical Ports..........................................................................................................................135

Configure BFD for Static Routes...........................................................................................................................136

Configure BFD for IPv6 Static Routes.................................................................................................................140

Configure BFD for OSPF................................................................................................................................

..........142

Configure BFD for OSPFv3................................................................................................................................

.....147

Configure BFD for IS-IS................................................................................................................................

...........149

Configure BFD for BGP................................................................................................................................

.............151

Configure BFD for VRRP................................................................................................................................

.........158

Configuring Protocol Liveness................................................................................................................................160

Chapter 9: Border Gateway Protocol (BGP)...............................................................................161

BGP IP version 4 (BGPv4) Overview..........................................................................................................................161

BGP Autonomous Systems................................................................................................................................

......161

AS4 Number Representation................................................................................................................................

..163

Four-Byte AS Numbers................................................................................................................................

............165

BGP router ID................................................................................................................................

.............................165

Sessions and Peers................................................................................................................................

....................165

Establish a Session................................................................................................................................

....................165

BGP Attributes for selecting Best Path...............................................................................................................166

Multiprotocol BGP................................................................................................................................

......................171

BGP global and address family configuration......................................................................................................172

Implement BGP with Dell EMC Networking OS.................................................................................................173

Configuration Information................................................................................................................................

........176

Basic BGP configuration tasks................................................................................................................................

......1776Contents

Prerequisite for configuring a BGP network.......................................................................................................177

..................................177

Enabling BGP................................................................................................................................

...............................177

Enabling four-byte autonomous system numbers..............................................................................................179

Changing a BGP router ID................................................................................................................................

.......180

Configuring AS4 Number Representations..........................................................................................................180

Configuring a BGP peer................................................................................................................................

............181

Example-Configuring BGP routing between peers............................................................................................182

BGP peer group................................................................................................................................

..........................183

Advanced BGP configuration tasks............................................................................................................................190

Route-refresh and Soft-reconfiguration..............................................................................................................190

Aggregating Routes................................................................................................................................

...................192

Filtering BGP................................................................................................................................

...............................194

Configuring BGP Fast Fall-Over.............................................................................................................................199

Configuring Passive Peering................................................................................................................................

...201

Enabling Graceful Restart................................................................................................................................

........201

Redistributing Routes................................................................................................................................

...............202

Redistributing iBGP Routes into IGP....................................................................................................................203

Enabling Additional Paths................................................................................................................................

........205

Configuring IP Community Lists............................................................................................................................206

Configuring an IP Extended Community List......................................................................................................207

Configure BGP attributes................................................................................................................................

.......208

Enabling Multipath................................................................................................................................

......................211

Route Reflectors................................................................................................................................

........................212

Enabling Route Flap Dampening.............................................................................................................................213

Changing BGP keepalive and hold timers............................................................................................................215

Setting the extended timer................................................................................................................................

.....216

Enabling or disabling BGP neighbors.....................................................................................................................216

Route Map Continue................................................................................................................................

.................217

Configuring BGP Confederations...........................................................................................................................218

Configuring a BGP VRF address family................................................................................................................218

Maintaining Existing AS Numbers During an AS Migration.............................................................................220

Allowing an AS Number to Appear in its Own AS Path...................................................................................220

Enabling MBGP Configurations..............................................................................................................................221

MBGP support for IPv6................................................................................................................................

...........222

Configuring IPv6 MBGP between peers..............................................................................................................222

Example-Configuring IPv4 and IPv6 neighbors..................................................................................................222

Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor...................................224

BGP Regular Expression Optimization.................................................................................................................226

Debugging BGP................................................................................................................................

.........................226

Chapter 10: Content Addressable Memory (CAM)......................................................................229

CAM Allocation................................................................................................................................

quotesdbs_dbs27.pdfusesText_33
[PDF] BMR 1 projet social

[PDF] BMR Famille et visiteurs

[PDF] BMR Tummy Lift IM Rev 2_USA - Mexique Et Amérique Centrale

[PDF] BMRA RECRUTE UN/UNE VENDEUR CONSEIL MENUISERIE

[PDF] BMS CIRCUITS : découvrez l`industrie électronique française et le

[PDF] BMS-Gestion de la relation client - France

[PDF] BMT- Achats 2006 enfants - Anciens Et Réunions

[PDF] bmTom et Nana

[PDF] BMV-600 MANUEL D`INSTALLATION Et D - Le Style Et La Mode

[PDF] BMV-Medien Herrn Marc Weinmann

[PDF] BMVR. Bibliothèque Raoul Mille Club lecture Mars 2015

[PDF] BMW - Anciens Et Réunions

[PDF] bmw (e30) m3 cabriolet - Excel Car

[PDF] BMW - 320 D - 2.0 D 184 CH AUTOMATIQUE Prix : 29800 € TTC

[PDF] BMW - Diag4Bike - France