Administrator Guide

Table Of Contents
Following is the sample syslog displayed when the recovery action is complete:
May 8 17:21:57 %STKUNIT1-M:CP %IFMGR-5-ERR_DIS_RECOVERY_COMPLETE: Error Disable Recovery
timer expired for interface Gi 2/18.
Configuring an automatic recovery for an Err-disabled interface
To configure automatic Err-disabled recovery of an interface and time-out interval, use the following commands.
1. Configure automatic recovery of an interface from Err-disabled state based on the cause.
CONFIGURATION mode
errdisable recovery cause {bpduguard | fefd | maclearnlimit | arp-insection}
NOTE: This command has to be configured before the interface moves to Err-disabled state. If not, the recovery action
is not performed.
2. Configure the recovery time-out interval. You can enter the interval from the range of 30 to 86,400 seconds. The default is
300 seconds.
CONFIGURATION mode
errdisable recovery interval seconds
NOTE: In Dell EMC Networking OS, for optimal performance of FEFD, the best practice is to set the error disable
recover timer not exceeding 30 seconds with FEFD interval set to default. Thus, avoiding any potential interface flap and
overlapping of recovery timings causing the FEFD enabled interface to stay in error-disabled state for a longer interval.
However, this timer value need to be applied only if the FEFD error-disable mode is set to aggressive mode.
Whenever the Err-disable recovery timer is reconfigured, it will get effective only after the current timer expires. Following
message is displayed after each Err-disable recovery timer configuration:
DellEMC(conf)# errdisable recovery interval 30
New timer interval will be effective from the next timer instance only.
Following is the sample steps to configure the recovery cause and the timer interval for automatic recovery of an interface.
DellEMC# configure termimal
DellEMC(conf)# errdisable recovery cause fefd
DellEMC(conf)# errdisable recovery interval 30
DellEMC(conf)#
Egress Interface Selection (EIS)
EIS allows you to isolate the management and front-end port domains by preventing switch-initiated traffic routing between
the two domains. This feature provides additional security by preventing flooding attacks on front-end ports. The following
protocols support EIS: DNS, FTP, NTP, RADIUS, sFlow, SNMP, SSH, Syslog, TACACS, Telnet, and TFTP. This feature does not
support sFlow on stacked units.
When you enable this feature, all management routes (connected, static, and default) are copied to the management EIS routing
table. Use the management route command to add new management routes to the default and EIS routing tables. Use the
show ip management-eis-route command to view the EIS routes.
Important Points to Remember
Deleting a management route removes the route from both the EIS routing table and the default routing table.
If the management port is down or route lookup fails in the management EIS routing table, the outgoing interface is selected
based on route lookup from the default routing table.
If a route in the EIS table conflicts with a front-end port route, the front-end port route has precedence.
Due to protocol, ARP packets received through the management port create two ARP entries (one for the lookup in the EIS
table and one for the default routing table).
324
Interfaces