White Papers

Table Of Contents
Configuring a Source IP Address for NTP Packets.......................................................................................... 873
Configuring NTP Authentication........................................................................................................................... 874
Configuring NTP control key password...............................................................................................................876
Configuring a Custom-defined Period for NTP time Synchronization......................................................... 876
Dell EMC Networking OS Time and Date..................................................................................................................876
Configuration Task List ...........................................................................................................................................876
Setting the Time and Date for the Switch Software Clock............................................................................ 877
Setting the Timezone............................................................................................................................................... 877
Set Daylight Saving Time........................................................................................................................................ 878
Setting Daylight Saving Time Once...................................................................................................................... 878
Setting Recurring Daylight Saving Time.............................................................................................................. 878
Chapter 54: Tunneling............................................................................................................... 880
Configuring a Tunnel...................................................................................................................................................... 880
Configuring Tunnel Keepalive Settings.......................................................................................................................881
Configuring a Tunnel Interface.....................................................................................................................................881
Configuring Tunnel Allow-Remote Decapsulation...................................................................................................882
Configuring Tunnel source anylocal Decapsulation................................................................................................ 882
Guidelines for Configuring Multipoint Receive-Only Tunnels...............................................................................883
Multipoint Receive-Only Tunnels................................................................................................................................ 883
Chapter 55: Uplink Failure Detection (UFD).............................................................................. 884
Feature Description........................................................................................................................................................ 884
How Uplink Failure Detection Works..........................................................................................................................885
UFD and NIC Teaming................................................................................................................................................... 886
Important Points to Remember...................................................................................................................................886
Configuring Uplink Failure Detection..........................................................................................................................887
Clearing a UFD-Disabled Interface............................................................................................................................. 888
Displaying Uplink Failure Detection.............................................................................................................................889
Sample Configuration: Uplink Failure Detection......................................................................................................890
Chapter 56: Upgrade Procedures...............................................................................................892
Chapter 57: Virtual LANs (VLANs)............................................................................................. 893
Default VLAN................................................................................................................................................................... 893
Port-Based VLANs......................................................................................................................................................... 894
VLANs and Port Tagging...............................................................................................................................................894
Configuration Task List................................................................................................................................................. 895
Creating a Port-Based VLAN.................................................................................................................................895
Assigning Interfaces to a VLAN.............................................................................................................................896
Moving Untagged Interfaces..................................................................................................................................897
Assigning an IP Address to a VLAN......................................................................................................................898
Configuring Native VLANs............................................................................................................................................898
Enabling Null VLAN as the Default VLAN................................................................................................................. 899
Chapter 58: Virtual Link Trunking (VLT)....................................................................................900
Overview...........................................................................................................................................................................900
VLT Terminology....................................................................................................................................................... 902
Layer-2 Traffic in VLT Domains.............................................................................................................................903
26
Contents