ExtremWare Software UserGuide
ExtremWare Software UserGuide
Extreme Networks, Inc. 3585 Monroe Street Santa Clara, California 95051 (888) 257-3000 http://www.extremenetworks.com
Published: October 17, 2003 Part number: 100049-00 Rev 09
2003 Extreme Networks, Inc. All rights reserved. Extreme Networks, ExtremeWare and BlackDiamond are registered trademarks of Extreme Networks, Inc. in the United States and certain other jurisdictions. ExtremeWare Vista, ExtremeWorks, ExtremeAssist, ExtremeAssist1, ExtremeAssist2, PartnerAssist, Extreme Standby Router Protocol, ESRP, SmartTraps, Alpine, Summit, Summit1, Summit4, Summit4/FX, Summit7i, Summit24, Summit48, Summit Virtual Chassis, SummitLink, SummitGbX, SummitRPS and the Extreme Networks logo are trademarks of Extreme Networks, Inc., which may be registered or pending registration in certain jurisdictions. The Extreme Turbodrive logo is a service mark of Extreme Networks, which may be registered or pending registration in certain jurisdictions. Specifications are subject to change without notice. NetWare and Novell are registered trademarks of Novell, Inc. Merit is a registered trademark of Merit Network, Inc. Solaris is a trademark of Sun Microsystems, Inc. F5, BIG/ip, and 3DNS are registered trademarks of F5 Networks, Inc. see/IT is a trademark of F5 Networks, Inc. Data Fellows, the triangle symbol, and Data Fellows product names and symbols/logos are trademarks of Data Fellows. F-Secure SSH is a registered trademark of Data Fellows.
All other registered trademarks, trademarks and service marks are property of their respective owners.
Authors: Hugh Bussell, Julie Laccabue, Megan Mahar, Richard Small Production: Hugh Bussell
Contents
Preface
Introduction Terminology Conventions Related Publications 25 26 26 26
Part 1
Chapter 1
Using ExtremeWare
ExtremeWare Overview
Summary of Features Virtual LANs (VLANs) Spanning Tree Protocol Quality of Service Unicast Routing IP Multicast Routing Load Sharing Software Licensing Router Licensing Security Licensing Software Factory Defaults 31 32 33 33 33 34 34 34 34 36 36
Chapter 2
Contents
Limits Line-Editing Keys Command History Common Commands Configuring Management Access User Account Administrator Account Default Accounts Creating a Management Account Domain Name Service Client Services Checking Basic Connectivity Ping Traceroute
42 42 43 43 45 45 46 46 47 48 48 49 49
Chapter 3
Contents
SNMPv3 Overview Message Processing SNMPv3 Security MIB Access Control Notification Authenticating Users RADIUS Client TACACS+ Configuring RADIUS Client and TACACS+ Using Network Login Using the Simple Network Time Protocol Configuring and Using SNTP SNTP Example
66 66 67 69 70 72 72 73 73 73 73 73 77
Chapter 4
Contents
95
Chapter 5
Chapter 6
Contents
Chapter 7
Chapter 8
Contents
Creating NAT Rules Creating Static and Dynamic NAT Rules Creating Portmap NAT Rules Creating Auto-Constrain NAT Rules Advanced Rule Matching Configuring Time-outs Displaying NAT Settings Disabling NAT
Chapter 9
Contents
Chapter 10
Chapter 11
Security
Security Overview 225
Contents
Network Access Security MAC-Based VLANs IP Access Lists (ACLs) Using IP Access Lists How IP Access Lists Work Precedence Numbers IP Access Rules The permit-established Keyword Adding and Deleting Access List Entries Verifying Access List Configurations IP Access List Examples MAC Address Security Limiting Dynamic MAC Addresses MAC Address Lock Down Network Login Web-Based and 802.1x Authentication Campus and ISP Modes Interoperability Requirements Multiple supplicant support Exclusions and Limitations Configuring Network Login Web-Based Authentication User Login Using Campus Mode DHCP Server on the Switch Displaying DHCP Information Displaying Network Login Settings Disabling Network Login Additional Configuration Details Switch Protection Routing Access Profiles Using Routing Access Profiles Creating an Access Profile Configuring an Access Profile Mode Adding an Access Profile Entry Deleting an Access Profile Entry Applying Access Profiles Routing Profiles for RIP Routing Access Profiles for IPX Routing Access Profiles for OSPF Routing Access Profiles for DVMRP Routing Access Profiles for PIM Routing Access Profiles for BGP Making Changes to a Routing Access Policy Removing a Routing Access Policy
225 226 226 226 226 227 227 228 229 229 229 233 233 235 236 236 238 239 239 240 240 242 243 244 244 244 244 245 245 245 246 246 246 249 249 249 250 251 252 253 254 254 255
10
Contents
Route Maps Using Route Maps Creating a Route Map Add Entries to the Route Map Add Statements to the Route Map Entries Route Map Operation Changes to Route Maps Route Maps in BGP Denial of Service Protection Configuring Denial of Service Protection Enabling Denial of Service Protection Disabling Denial of Service Protection Displaying Denial of Service Settings How to Deploy DoS Protection Blocking SQL Slammer DoS Attacks Management Access Security Authenticating Users Using RADIUS or TACACS+ RADIUS Client Configuring TACACS+ Secure Shell 2 (SSH2) Enabling SSH2 for Inbound Switch Access Using SCP2 from an External SSH2 Client SSH2 Client Functions on the Switch
255 255 255 255 256 258 259 259 260 260 261 261 261 261 262 263 263 263 269 270 270 271 272
Part 2
Chapter 12
11
Contents
Configuring the EAPS Control VLAN Configuring the EAPS Protected VLANs Enabling and Disabling an EAPS Domain Enabling and Disabling EAPS Unconfiguring an EAPS Ring Port Displaying EAPS Status Information Configuring EAPS Shared Ports Steady State Common Link Failures Creating and Deleting a Shared Port Defining the Mode of the Shared Port Configuring the Link ID of the Shared Port Unconfiguring an EAPS Shared Port Displaying EAPS Shared-Port Status Information EAPS Shared Port Configuration Rules EAPS Shared Port Configuration Examples Basic Configuration Basic Core Configuration Right Angle Configuration Combined Basic Core and Right Angle Configuration Large Core and Access Rings Configuration Advanced Configuration
284 285 285 285 286 286 289 290 290 291 291 292 292 292 293 293 293 294 294 295 295 296
Chapter 13
12
Contents
Configuring STP on the Switch STP Configuration Examples Displaying STP Settings
Chapter 14
Chapter 15
13
Contents
Determining the VRRP Master VRRP Tracking Electing the Master Router Additional VRRP Highlights VRRP Port Restart VRRP Operation Simple VRRP Network Configuration Fully-Redundant VRRP Network VRRP Configuration Parameters VRRP Examples Configuring the Simple VRRP Network Configuring the Fully-Redundant VRRP Network
348 348 351 351 352 352 352 353 354 356 356 357
Chapter 16
IP Unicast Routing
Overview of IP Unicast Routing Router Interfaces Populating the Routing Table Subnet-Directed Broadcast Forwarding Proxy ARP ARP-Incapable Devices Proxy ARP Between Subnets Relative Route Priorities Configuring IP Unicast Routing Verifying the IP Unicast Routing Configuration Routing Configuration Example IP Multinetting IP Multinetting Operation IP Multinetting Examples Configuring DHCP/BOOTP Relay Verifying the DHCP/BOOTP Relay Configuration UDP-Forwarding Configuring UDP-Forwarding UDP-Forwarding Example ICMP Packet Processing UDP Echo Server VLAN Aggregation VLAN Aggregation Properties VLAN Aggregation Limitations VLAN Aggregation SubVLAN Address Range Checking Isolation Option for Communication Between Sub-VLANs VLAN Aggregation Example 359 360 361 362 363 363 364 364 365 365 365 367 368 369 370 370 370 371 371 371 372 372 374 374 374 375 375
14
Contents
375
Chapter 17
Chapter 18
15
Contents
BGP Attributes BGP Communities BGP Features Route Reflectors Route Confederations Route Aggregation IGP Synchronization Using the Loopback Interface BGP Peer Groups BGP Route Flap Dampening BGP Route Selection Stripping Out Private AS Numbers from Route Updates Route Re-Distribution Configuring Route Re-Distribution
402 402 402 403 403 406 407 407 407 408 411 411 411 412
Chapter 19
IP Multicast Routing
Overview DVMRP Overview PIM Overview IGMP Overview Multicast Tools Performance Enhancements for the BlackDiamond Switch Configuring IP Multicasting Routing Configuration Examples PIM-DM Configuration Example Configuration for IR1 Configuration for ABR1 413 414 414 415 416 417 418 419 419 420 421
Chapter 20
IPX Routing
Overview of IPX Router Interfaces IPX Routing Performance IPX Load Sharing IPX Encapsulation Types Tagged IPX VLANs Populating the Routing Table IPX/RIP Routing Routing SAP Advertisements Configuring IPX Verifying IPX Router Configuration Protocol-Based VLANs for IPX IPX Configuration Example 423 423 424 425 425 425 426 426 427 427 428 428 429
16
Contents
Part 3
Chapter 21
Configuring Modules
Accounting and Routing Module (ARM)
Summary of Features ARM Module Limitations About IP Unicast Forwarding About Selective Longest Prefix Match About Destination-Sensitive Accounting Configuring the ARM Basic Accounting Configuration Information Basic SLPM Configuration Information Configuring Access Profiles Using Route Maps ARM Configuration Examples Configuring Destination-Sensitive Accounting Based on Destination IP Subnets Configuring Destination-Sensitive Accounting Based on BGP Community Strings Configuring Routing Using SLPM Retrieving Accounting Statistics Using the CLI to Retrieve Accounting Statistics Using SNMP to Retrieve Accounting Statistics Diagnostics Commands Layer 2 and Layer 3 Switching Attributes Debug Trace Commands 433 434 434 434 436 437 437 439 441 441 443 443 447 449 452 452 453 453 454 454 455
Chapter 22
17
Contents
Configuring the Signal Fail Threshold Configuring the Signal Degrade Threshold Configuring the Section Trace Identifier Configuring the Path Trace Identifier Configuring the Signal Label Resetting SONET Configuration Parameter Values Displaying SONET Status Information on ATM ports SONET Events on ATM Ports Configuring VLAN-Related Attributes Configuring Tagged VLAN 802.1p and 802.1Q Functions Generic VLAN Registration Protocol Functions Configuring Forwarding Database Attributes Configuring Spanning Tree Attributes Configuring QoS Functions Configuring a QoS Profile Classification and Replacement Policies Configuring DiffServ Enhanced RED Support QoS Monitor Intra-Subnet QoS Limitations and Unsupported Features Configuring Port Attributes Jumbo Frame Support Configuring IGMP Attributes Configuring Layer 2 and 3 Switching Attributes Configuring Access List Attributes Changing Image and Configuration Attributes
469 470 470 471 471 472 472 473 474 475 477 477 477 477 478 479 480 482 488 488 489 489 489 490 490 490 490
Chapter 23
18
Contents
Configuring SONET Clocking Configuring the Signal Fail Threshold Configuring the Signal Degrade Threshold Configuring the Section Trace Identifier Configuring the Path Trace Identifier Configuring the Signal Label Resetting SONET Configuration Parameter Values Displaying SONET Port Status Information SONET Events Configuring and Monitoring PPP Functions PPP Overview Creating a PPP User Account Configuring the PoS Checksum Configuring PoS Scrambling Configuring Link Maintenance Configuring PPP Link Quality Monitoring Configuring PPP Authentication Configuring the Name and Password for the Port Creating an Authentication Database Entry Configuring the Network Control Protocol Configuring the MPLS Control Protocol Configuring the OSI Network Layer Control Protocol Configuring the Delayed-Down-Time Interval Displaying PPP Information Resetting PPP Configuration Parameter Values Configuring VLAN-Related Attributes Configuring Tagged VLAN 802.1p and 802.1Q Functions Generic VLAN Registration Protocol Functions Configuring Forwarding Database Attributes Configuring Spanning Tree Attributes Configuring QoS Functions Configuring a QoS Profile Classification and Replacement Policies Configuring DiffServ Enhanced RED Support QoS Monitor Intra-Subnet QoS Configuring and Monitoring Flow Statistics Flow Statistics Background Information Collection Port and Filtering Options Collection Architecture Scalability and Reliability Export Criteria MIB Support for Flow Statistics Configuring and Monitoring APS Functions
505 505 505 506 506 507 507 507 508 510 510 514 514 514 515 515 516 516 517 518 519 519 520 520 521 522 522 525 525 525 525 525 526 527 530 536 536 536 537 539 539 540 546 546
19
Contents
APS Network Configuration Options Sample Line-Switching Scenario APS Benefits Enabling and Disabling APS Creating and Deleting an APS Group Adding a Port to an APS Group Deleting a Port from an APS Group Configuring APS Authentication Configuring Nonrevertive or Revertive Mode Configuring APS Timers Configuring APS Lockout Configuring Forced Switch Mode Configuring Manual Switch Mode Resetting APS Group Configuration Parameters Displaying APS Group Status Information MIB Support for APS Configuring Port Tunneling Configuring the PoS Port Tunnel Configuring the Ethernet Module Configuring the MPLS tls-Tunnel Limitations and Unsupported Commands Configuring General Switch Attributes PoS Module Limitations Configuring Port Attributes Jumbo Frame Support Configuring Access List Attributes Changing Image and Configuration Attributes
548 550 553 556 556 556 557 557 558 559 559 560 561 561 562 563 563 564 565 565 565 566 566 566 566 568 568
Chapter 24
20
Contents
Configuring PPP and MLPPP Multilink PPP and Multilink Groups Configuring a PPP/MLPPP Link WAN Multilink Configuration Examples Configuring a Bridged PPP/MLPPP Link Example Configuring a Routed PPP/MLPPP Link Example VLAN Tunneling (VMANs) VMAN Transport by WAN Links VMAN Termination at WAN ports
Chapter 25
Chapter 26
Configuring RSVP-TE
RSVP Elements Message Types Reservation Styles Bandwidth Reservation Traffic Engineering 616 616 618 618 620
21
Contents
RSVP Tunneling RSVP Objects RSVP Features Route Recording Explicit Route Path LSPs Redundant LSPs Improving LSP Scaling Configuring RSVP-TE Configuring RSVP-TE on a VLAN Configuring RSVP-TE Protocol Parameters Configuring an RSVP-TE Path Configuring an Explicit Route Configuring an RSVP-TE Profile Configuring an Existing RSVP-TE Profile Configuring an RSVP-TE LSP Adding a Path to an RSVP-TE LSP Displaying RSVP-TE LSP Configuration Information Displaying the RSVP-TE Routed Path Displaying the RSVP-TE Path Profile Displaying the RSVP-TE LSP Configuration Example
620 620 621 621 622 622 623 624 624 624 625 626 627 628 628 629 629 630 630 630 630
Chapter 27
22
Contents
Chapter 28
Part 4
Appendix A
Appendixes
Software Upgrade and Boot Options
Downloading a New Image Selecting a Primary or a Secondary Image Downloading Images to Slots and Modules Understanding the Image Version String Software Signatures Rebooting the Switch Rebooting a Module Saving Configuration Changes Returning to Factory Defaults Using TFTP to Upload the Configuration Using TFTP to Download the Configuration Downloading a Complete Configuration Downloading an Incremental Configuration Scheduled Incremental Configuration Download Remember to Save Synchronizing MSMs Upgrading and Accessing BootROM Upgrading BootROM Accessing the BootROM Menu 667 668 668 669 670 670 671 671 672 672 673 673 673 674 674 674 675 675 675
Appendix B
Troubleshooting
23
Contents
LEDs Using the Command-Line Interface Port Configuration VLANs STP Debug Tracing/Debug Mode TOP Command System Health Check System Memory Dump System Odometer Memory Scanning and Memory Mapping Modes of Operation Memory Scanning and Memory Mapping Functions Using Memory Scanning to Screen I/O Modules Reboot Loop Protection Minimal Mode Contacting Extreme Technical Support
677 678 680 680 681 682 682 683 683 684 685 685 686 692 693 693 694
Appendix C
24
Preface
This preface provides an overview of this guide, describes guide conventions, and lists other publications that might be useful.
Introduction
This guide provides the required information to configure ExtremeWare software running on either modular or stand-alone switches from Extreme Networks. This guide is intended for use by network administrators who are responsible for installing and setting up network equipment. It assumes a basic working knowledge of: Local area networks (LANs) Ethernet concepts Ethernet switching and bridging concepts Routing concepts Internet Protocol (IP) concepts Routing Information Protocol (RIP) and Open Shortest Path First (OSPF). Border Gateway Protocol (BGP-4) concepts IP Multicast concepts Distance Vector Multicast Routing Protocol (DVMRP) concepts Protocol Independent Multicast (PIM) concepts Internet Packet Exchange (IPX) concepts Server Load Balancing (SLB) concepts Simple Network Management Protocol (SNMP) NOTE If the information in the release notes shipped with your switch differs from the information in this guide, follow the release notes.
25
Preface
Terminology
When features, functionality, or operation is specific to a modular or stand-alone switch family, the family name is used. Explanations about features and operations that are the same across all product families simply refer to the product as the switch.
Conventions
Table 1 and Table 2 list conventions that are used throughout this guide. Table 1: Notice Icons
Icon Notice Type Note Alerts you to... Important features or instructions.
Caution
Warning
Related Publications
The publications related to this one are: ExtremeWare release notes ExtremeWare 7.1.0 Software Command Reference Guide ExtremeWare 7.1.0 Software Quick Reference Guide Extreme Networks Consolidated Hardware Guide
26
Related Publications
Documentation for Extreme Networks products is available on the World Wide Web at the following location: http://www.extremenetworks.com/
27
Preface
28
Part 1
Using ExtremeWare
ExtremeWare Overview
This chapter covers the following topics: Summary of Features on page 31 Software Licensing on page 34 Software Factory Defaults on page 36 ExtremeWare is the full-featured software operating system that is designed to run on the Extreme Networks families of modular and stand-alone Gigabit Ethernet switches.
NOTE ExtremeWare 7.1.0 only supports Extreme Networks products that contain the i or t series chipset. This includes the BlackDiamond, Alpine, and Summit i series platforms, but does not include the Summit 24e3 and Summit 200 series platforms.
Summary of Features
The features of ExtremeWare include: Virtual local area networks (VLANs) including support for IEEE 802.1Q and IEEE 802.1p VLAN aggregation Spanning Tree Protocol (STP) (IEEE 802.1D) with multiple STP domains Policy-Based Quality of Service (PB-QoS) Wire-speed Internet Protocol (IP) routing IP Multinetting DHCP/BOOTP Relay Extreme Standby Router Protocol (ESRP) Virtual Router Redundancy Protocol (VRRP) Routing Information Protocol (RIP) version 1 and RIP version 2 Open Shortest Path First (OSPF) routing protocol Border Gateway Protocol (BGP) version 4
31
ExtremeWare Overview
Wire-speed IP multicast routing support Diffserv support Access-policy support for routing protocols Access list support for packet filtering IGMP snooping to control IP multicast traffic Distance Vector Multicast Routing Protocol (DVMRP) Protocol Independent Multicast-Dense Mode (PIM-DM) Protocol Independent Multicast-Sparse Mode (PIM-SM) Wire-speed IPX, IPX/RIP, and IPX/SAP support Server Load Balancing (SLB) support Load sharing on multiple ports, across all blades (modular switches only) RADIUS client and per-command authentication support TACACS+ support Console command line interface (CLI) connection Telnet CLI connection SSH2 connection ExtremeWare Vista Web-based management interface Simple Network Management Protocol (SNMP) support Remote Monitoring (RMON) System Monitoring (SMON) Traffic mirroring Network Login support Accounting and Routing Module (ARM) support Asynchronous Transfer Mode Module (ATM) support Packet over SONET (PoS) Module support WAN Module support MultiProtocol Label Switching (MPLS) support Destination-Sensitive Accounting (DSA) support NOTE For more information on Extreme Networks switch components (the BlackDiamond 6800 family, the Alpine 3800 family, or the Summit switch family), see the Extreme Networks Consolidated Hardware Guide.
32
Summary of Features
VLANs help to control broadcast traffic. If a device in VLAN Marketing transmits a broadcast frame, only VLAN Marketing devices receive the frame. VLANs provide extra security. Devices in VLAN Marketing can only communicate with devices on VLAN Sales using routing services. VLANs ease the change and movement of devices on networks. NOTE For more information on VLANs, see Chapter 5.
Quality of Service
ExtremeWare has Policy-Based Quality of Service (QoS) features that enable you to specify service levels for different traffic groups. By default, all traffic is assigned the normal QoS policy profile. If needed, you can create other QoS policies and apply them to different traffic types so that they have different guaranteed minimum bandwidth, maximum bandwidth, and priority. NOTE For more information on Quality of Service, see Chapter 7.
Unicast Routing
The switch can route IP or IPX traffic between the VLANs that are configured as virtual router interfaces. Both dynamic and static IP routes are maintained in the routing table. The following routing protocols are supported: RIP version 1 RIP version 2 OSPF version 2 IS-IS IPX/RIP BGP version 4
33
ExtremeWare Overview
NOTE For more information on IP unicast routing, see Chapter 16. For more information on IPX/RIP, see Chapter 20.
IP Multicast Routing
The switch can use IP multicasting to allow a single IP host to transmit a packet to a group of IP hosts. ExtremeWare supports multicast routes that are learned by way of the Distance Vector Multicast Routing Protocol (DVMRP) or the Protocol Independent Multicast (dense mode or sparse mode). NOTE For more information on IP multicast routing, see Chapter 19.
Load Sharing
Load sharing allows you to increase bandwidth and resiliency by using a group of ports to carry traffic in parallel between systems. The load sharing algorithm allows the switch to use multiple ports as a single logical port. For example, VLANs see the load-sharing group as a single virtual port. The algorithm also guarantees packet sequencing between clients. NOTE For information on load sharing, see Chapter 4.
Software Licensing
Some Extreme Networks products have capabilities that are enabled by using a license key. Keys are typically unique to the switch, and are not transferable. Keys are stored in NVRAM and, once entered, persist through reboots, software upgrades, and reconfigurations. The following sections describe the features that are associated with license keys.
Router Licensing
Some switches support software licensing for different levels of router functionality. In ExtremeWare version 6.0 and above, routing protocol support is separated into two sets: Basic and Full L3. Basic is a subset of Full L3.
Basic Functionality
Basic functionality requires no license key. All Extreme switches have Basic layer 3 functionality, without the requirement of a license key. Basic functionality includes all switching functions, and also includes all available layer 3 QoS, access list, and ESRP functions. Layer 3 routing functions include support for: IP routing using RIP version 1 and/or RIP version 2 IP routing between directly attached VLANs IP routing using static routes
34
Software Licensing
Full L3 Functionality
On switches that support router licensing, the Full L3 license enables support of additional routing protocols and functions, including: IP routing using OSPF IP multicast routing using DVMRP IP multicast routing using PIM (Dense Mode or Sparse Mode) IP routing using BGP IPX routing (direct, static, and dynamic using IPX/RIP and IPX/SAP) Server load balancing Web cache redirection EAPS NAT IS-IS MPLS ARM PoS ATM
Product Support
The Summit1i switch and all BlackDiamond 6800 series switches ship with Full L3 functionality. All other Summit models and the Alpine 3800 series switches are available with either Basic or Full L3 functionality.
35
ExtremeWare Overview
or by phoning Extreme Networks Technical Support at: (800) 998-2408 (408) 579-2826
Security Licensing
Certain additional ExtremeWare security features, such as the use of Secure Shell (SSH2) encryption, may be under United States export restriction control. Extreme Networks ships these security features in a disabled state. You can obtain information on enabling these features at no charge from Extreme Networks.
36
802.1Q tagging Spanning Tree Protocol Forwarding database aging period IP Routing RIP OSPF IP multicast routing IGMP IGMP snooping DVMRP GVRP PIM-DM IPX routing NTP DNS Port mirroring MPLS
NOTE For default settings of individual ExtremeWare features, see individual chapters in this guide.
37
ExtremeWare Overview
38
This chapter covers the following topics: Understanding the Command Syntax on page 39 Line-Editing Keys on page 42 Command History on page 43 Common Commands on page 43 Configuring Management Access on page 45 Domain Name Service Client Services on page 48 Checking Basic Connectivity on page 48
39
3 The value part of the command specifies how you want the parameter to be set. Values include numerics, strings, or addresses, depending on the parameter. 4 After entering the complete command, press [Return]. NOTE If an asterisk (*) appears in front of the command-line prompt, it indicates that you have outstanding configuration changes that have not been saved. For more information on saving configuration changes, see Appendix A.
Syntax Helper
The CLI has a built-in syntax helper. If you are unsure of the complete syntax for a particular command, enter as much of the command as possible and press [Tab]. The syntax helper provides a list of options for the remainder of the command, and places the cursor at the end of the command you have entered so far, ready for the next option. If the command is one where the next option is a named component, such as a VLAN, access profile, or route map, the syntax helper will also list any currently configured names that might be used as the next option. In situations where this list might be very long, the syntax helper will list only one line of names, followed by an ellipses to indicate that there are more names than can be displayed. The syntax helper also provides assistance if you have entered an incorrect command.
Abbreviated Syntax
Abbreviated syntax is the shortest unambiguous allowable abbreviation of a command or parameter. Typically, this is the first three letters of the command. If you do not enter enough letters to allow the switch to determine which command you mean, the syntax helper will provide a list of the options based on the portion of the command you have entered. NOTE When using abbreviated syntax, you must enter enough characters to make the command unambiguous and distinguishable to the switch.
Command Shortcuts
All named components of the switch configuration must have a unique name. Components are typically named using the create command. When you enter a command to configure a named component, you do not need to use the keyword of the component. For example, to create a VLAN, you must enter a unique VLAN name:
create vlan engineering
Once you have created the VLAN with a unique name, you can then eliminate the keyword vlan from all other commands that require the name to be entered. For example, instead of entering the modular switch command
configure vlan engineering delete port 1:3,4:6
40
You can add additional slot and port numbers to the list, separated by a comma:
port 3:1,4:8,6:10
indicates all ports on slot 3. You can specify a range of slots and ports. For example,
port 2:3-4:5
You can add additional port numbers to the list, separated by a comma:
port 1-3,6,8
Names
All named components of the switch configuration must have a unique name. Names must begin with an alphabetical character and are delimited by whitespace, unless enclosed in quotation marks. Names are not case-sensitive. Names cannot be tokens used on the switch.
41
Symbols
You may see a variety of symbols shown as part of the command syntax. These symbols explain how to enter the command, and you do not type them as part of the command itself. Table 4 summarizes command syntax symbols. Table 4: Command Syntax Symbols
Symbol angle brackets < > Description Enclose a variable or value. You must specify the variable or value. For example, in the syntax configure vlan <vlan name> ipaddress <ip_address> you must supply a VLAN name for <vlan name> and an address for <ip_address> when entering the command. Do not type the angle brackets. square brackets [ ] Enclose a required value or list of required arguments. One or more values or arguments can be specified. For example, in the syntax use image [primary | secondary] you must specify either the primary or secondary image when entering the command. Do not type the square brackets. vertical bar | Separates mutually exclusive items in a list, one of which must be entered. For example, in the syntax configure snmp community [read-only | read-write] <string> you must specify either the read or write community string in the command. Do not type the vertical bar. braces { } Enclose an optional value or a list of optional arguments. One or more values or arguments can be specified. For example, in the syntax reboot {<date> <time> | cancel} you can specify either a particular date and time combination, or the keyword cancel to cancel a previously scheduled reboot. If you do not specify an argument, the command will prompt, asking if you want to reboot the switch now. Do not type the braces.
Limits
The command line can process up to 200 characters, including spaces. If you enter more than 200 characters, the switch generates a stack overflow error and processes the first 200 characters.
Line-Editing Keys
Table 5 describes the line-editing keys available using the CLI. Table 5: Line-Editing Keys
Key(s) Backspace Delete or [Ctrl] + D [Ctrl] + K Insert Left Arrow Description Deletes character to left of cursor and shifts remainder of line to left. Deletes character under cursor and shifts remainder of line to left. Deletes characters from under cursor to end of line. Toggles on and off. When toggled on, inserts text and shifts previous text to right. Moves cursor to left.
42
Command History
Command History
ExtremeWare remembers the last 49 commands you entered. You can display a list of these commands by using the following command:
history
Common Commands
Table 6 describes some of the common commands used to manage the switch. Commands specific to a particular feature may also be described in other chapters of this guide. For a detailed description of the commands and their options, see the ExtremeWare Software Command Reference Guide. Table 6: Common Commands
Command clear session <number> configure account <username> Description Terminates a Telnet session from the switch. Configures a user account password. The switch will interactively prompt for a new password, and for reentry of the password to verify it. Passwords must have a minimum of 1 character and can have a maximum of 30 characters. Passwords are case-sensitive; user names are not case sensitive. configure banner Configures the banner string. You can enter up to 24 rows of 79-column text that is displayed before the login prompt of each session. Press [Return] at the beginning of a line to terminate the command and apply the banner. To clear the banner, press [Return] at the beginning of the first line. Configures the network login banner string. You can enter up to 1024 characters to be displayed before the login prompt of each session.
configure ports <portlist> auto off {speed [10 | 100 | Manually configures the port speed and duplex setting of 1000]} duplex [half | full] one or more ports on a switch. configure slot <slot number> module <module name> Configures a slot for a particular I/O module card.
43
create vlan <vlan name> delete account <username> delete vlan <vlan name> disable bootp vlan [<vlan name> | all] disable cli-config-logging disable clipaging disable idletimeouts
disable ports [<portlist> | all] disable ssh2 disable telnet disable web enable bootp vlan [<vlan name> | all] enable cli-config-logging enable clipaging
enable idletimeouts
44
User Account
A user-level account has viewing access to all manageable parameters, with the exception of: User account database. SNMP community strings. A user-level account can use the ping command to test device reachability, and change the password assigned to the account name. If you have logged on with user capabilities, the command-line prompt ends with a (>) sign. For example:
Summit1:2>
45
Administrator Account
An administrator-level account can view and change all switch parameters. It can also add and delete users, and change the password associated with any account name. The administrator can disconnect a management session that has been established by way of a Telnet connection. If this happens, the user logged on by way of the Telnet connection is notified that the session has been terminated. If you have logged on with administrator capabilities, the command-line prompt ends with a (#) sign. For example:
Summit1:18#
Prompt Text
The prompt text is taken from the SNMP sysname setting. The number that follows the colon indicates the sequential line/command number. If an asterisk (*) appears in front of the command-line prompt, it indicates that you have outstanding configuration changes that have not been saved. For example:
*Summit1:19#
Default Accounts
By default, the switch is configured with two accounts, as shown in Table 7. Table 7: Default Accounts
Account Name admin user Access Level This user can access and change all manageable parameters. The admin account cannot be deleted. This user can view (but not change) all manageable parameters, with the following exceptions: This user cannot view the user account database. This user cannot view the SNMP community strings.
46
5 Re-enter the new password at the prompt. To add a password to the default user account, follow these steps: 1 Log in to the switch using the name admin. 2 At the password prompt, press [Return], or enter the password that you have configured for the admin account. 3 Add a default user password by entering the following command:
configure account user
4 Enter the new password at the prompt. 5 Re-enter the new password at the prompt. NOTE If you forget your password while logged out of the command line interface, contact your local technical support representative, who will advise on your next course of action.
4 Enter the password at the prompt. 5 Re-enter the password at the prompt.
Viewing Accounts
To view the accounts that have been created, you must have administrator privileges. Use the following command to see the accounts:
show accounts
47
Deleting an Account
To delete a account, you must have administrator privileges. To delete an account, use the following command:
delete account <username>
NOTE Do not delete the default administrator account. If you do, it is automatically restored, with no password, the next time you download a configuration. To ensure security, change the password on the default account, but do not delete it. The changed password will remain intact through configuration uploads and downloads. If you must delete the default account, first create another administrator-level account. Remember to manually delete the default account again every time you download a configuration.
You can specify a default domain for use when a host name is used without a domain. Use the following command:
configure dns-client default-domain <domain name>
For example, if you specify the domain xyz-inc.com as the default domain, then a command such as ping accounting1 will be taken as if it had been entered ping accounting1.xyz-inc.com.
48
Ping
The ping command enables you to send Internet Control Message Protocol (ICMP) echo messages to a remote IP device. The ping command is available for both the user and administrator privilege level. The ping command syntax is:
ping {udp} {continuous} {size <start_size> {- <end_size>}} [<ip_address> | <hostname>] {from <src_address> | with record-route | from <src_ipaddress> with record-route}
Options for the ping command are described in Table 8. Table 8: Ping Command Parameters
Parameter udp continuous size Description Specifies that UDP messages should be sent instead of ICMP echo messages. When specified, from and with record-route options are not supported. Specifies ICMP echo messages to be sent continuously. This option can be interrupted by pressing any key. Specifies the size of the ICMP request. If both the start_size and end_size are specified, transmits ICMP requests using 1 byte increments, per packet. If no end_size is specified, packets of start_size are sent. Specifies the IP address of the host. Specifies the name of the host. To use the hostname, you must first configure DNS. Uses the specified source address in the ICMP packet. If not specified, the address of the transmitting interface is used. Decodes the list of recorded routes and displays them when the ICMP echo reply is received.
If a ping request fails, the switch continues to send ping messages until interrupted. Press any key to interrupt a ping request. The statistics are tabulated after the ping is interrupted.
Traceroute
The traceroute command enables you to trace the routed path between the switch and a destination endstation. The traceroute command syntax is:
traceroute [<ip_address> | <hostname>] {from <src_ipaddress>} {ttl <TTL>} {port <port>}
where: ip_address is the IP address of the destination endstation. hostname is the hostname of the destination endstation. To use the hostname, you must first configure DNS. from uses the specified source address in the ICMP packet. If not specified, the address of the transmitting interface is used. ttl configures the switch to trace the hops until the time-to-live has been exceeded for the switch. port uses the specified UDP port number.
49
50
This chapter covers the following topics: Overview on page 51 Using the Console Interface on page 52 Using the 10/100 Ethernet Management Port on page 52 Using Telnet on page 53 Using Secure Shell 2 (SSH2) on page 56 Using ExtremeWare Vista on page 56 Using SNMP on page 61 Authenticating Users on page 72 Using Network Login on page 73 Using the Simple Network Time Protocol on page 73
Overview
Using ExtremeWare, you can manage the switch using the following methods: Access the CLI by connecting a terminal (or workstation with terminal-emulation software) to the console port. Access the switch remotely using TCP/IP through one of the switch ports or through the dedicated 10/100 unshielded twisted pair (UTP) Ethernet management port (on switches that are so equipped). Remote access includes: Telnet using the CLI interface. SSH2 using the CLI interface. ExtremeWare Vista web access using a standard web browser. SNMP access using EPICenter or another SNMP manager. Download software updates and upgrades. For more information, see Appendix B, Software Upgrade and Boot Options.
51
The switch supports up to the following number of concurrent user sessions: One console session Two console sessions are available on a modular switch that has two management modules installed. Eight Telnet sessions Eight SSH2 sessions One web session
52
Using Telnet
Using Telnet
Any workstation with a Telnet facility should be able to communicate with the switch over a TCP/IP network using VT-100 terminal emulation. Up to eight active Telnet sessions can access the switch concurrently. If idletimeouts are enabled, the Telnet connection will time out after 20 minutes of inactivity. If a connection to a Telnet session is lost inadvertently, the switch terminates the session within two hours. Before you can start a Telnet session, you must set up the IP parameters described in Configuring Switch IP Parameters later in this chapter. Telnet is enabled by default.
NOTE Maximize the Telnet screen so that automatically updating screens display correctly. To open the Telnet session, you must specify the IP address of the device that you want to manage. Check the user manual supplied with the Telnet facility if you are unsure of how to do this. After the connection is established, you will see the switch prompt and you may log in.
If the TCP port number is not specified, the Telnet session defaults to port 23. Only VT100 emulation is supported.
53
If you configure the switch to use BOOTP, the switch IP address is not retained through a power cycle, even if the configuration has been saved. To retain the IP address through a power cycle, you must configure the IP address of the VLAN using the command-line interface, Telnet, or web interface. All VLANs within a switch that are configured to use BOOTP to get their IP address use the same MAC address. Therefore, if you are using BOOTP relay through a router, the BOOTP server relays packets based on the gateway portion of the BOOTP packet.
Administrator capabilities enable you to access all switch functions. The default user names have no passwords assigned. If you have been assigned a user name and password with administrator privileges, enter them at the login prompt. 4 At the password prompt, enter the password and press [Return]. When you have successfully logged in to the switch, the command-line prompt displays the name of the switch in its prompt. 5 Assign an IP address and subnetwork mask for the default VLAN by using the following command:
configure vlan <vlan name> ipaddress <ipaddress> {<subnet_mask>}
54
Using Telnet
For example:
configure vlan default ipaddress 123.45.67.8 255.255.255.0
Your changes take effect immediately. NOTE As a general rule, when configuring any IP addresses for the switch, you can express a subnet mask by using dotted decimal notation, or by using classless inter-domain routing notation (CIDR). CIDR uses a forward slash plus the number of bits in the subnet mask. Using CIDR notation, the command identical to the one above would be:
configure vlan default ipaddress 123.45.67.8 / 24
6 Configure the default route for the switch using the following command:
configure iproute add default <gateway> {<metric>}
For example:
configure iproute add default 123.45.67.1
7 Save your configuration changes so that they will be in effect after the next switch reboot, by typing:
save
8 When you are finished using the facility, log out of the switch by typing:
logout or quit
Use the none option to remove a previously configured access profile. To display the status of Telnet, use the following command:
show management
55
To re-enable Telnet on the switch, at the console port use the following:
enable telnet
NOTE For more information on assigning an IP address, see Configuring Switch IP Parameters on page 53. The default home page of the switch can be accessed using the following command: http://<ipaddress> When you access the home page of the switch, you are presented with the Logon screen.
56
Use the none option to remove a previously configured access profile. Apply an access profile only when ExtremeWare Vista is enabled. To display the status of web access, use the following command:
show management
To re-enable web access, use the enable web command. By default, web access uses TCP port 80. To specify a different port, use the port option in the enable
web command.
To configure the timeout for user to enter username/password in the pop-up window use the following command:
configure web login-timeout <seconds>
By default this timeout is set to 30 seconds. You will need to reboot the system in order for these changes to take effect.
57
Turn off one or more of the browser toolbars to maximize the viewing space of the ExtremeWare Vista content screen. If you will be using ExtremeWare Vista to send an email to the Extreme Networks Technical Support department, configure the email settings in your browser. Configure the browser to use the following recommended fonts: Proportional fontTimes New Roman Fixed-width fontCourier New
To correct this situation, log out of the switch and log in again.
Task Frame
The task frame has two sections: menu buttons and submenu links. The four task menu buttons are: Configuration Statistics Support Logout
58
Below the task buttons are options. Options are specific to the task button that you select. When you select an option, the information displayed in the content frame changes. However, when you select a new task button, the content frame does not change until you select a new option.
NOTE Submitting a configuration page with no change will result in an asterisk (*) appearing at the CLI prompt, even though actual configuration values have not changed.
Content Frame
The content frame contains the main body of information in ExtremeWare Vista. For example, if you select an option from the Configuration task button, enter configuration parameters in the content frame. If you select the Statistics task button, statistics are displayed in the content frame. Browser Controls. Browser controls include drop-down list boxes, check boxes, and multiselect list boxes. A multiselect list box has a scrollbar on the right side of the box. Using a multiselect list box, you can select a single item, all items, a set of contiguous items, or multiple noncontiguous items. Table 9 describes how to make selections from a multiselect list box. Table 9: Multiselect List Box Key Definitions
Selection Type Single item All items Contiguous items Selected noncontiguous items Key Sequence Click the item using the mouse. Click the first item, and drag to the last item. Click the first desired item, and drag to the last desired item. Hold down [Ctrl], click the first desired item, click the next desired item, and so on.
Status Messages
Status messages are displayed at the top of the content frame. The four types of status messages are: InformationDisplays information that is useful to know prior to, or as a result of, changing configuration options. WarningDisplays warnings about the switch configuration. ErrorDisplays errors caused by incorrectly configured settings. SuccessDisplays informational messages after you click Submit. The message displayed reads, Request was submitted successfully.
Standalone Buttons
At the bottom of some of the content frames is a section that contains standalone buttons. Standalone buttons are used to perform tasks that are not associated with a particular configuration option. An example of this is the Reboot Switch button.
59
Saving Changes
You can save your changes to nonvolatile storage in either of two ways using ExtremeWare Vista: Select Save Configuration from the Configuration task button, Switch option. This field contains a drop-down list box that allows you to select either the primary or secondary configuration area. After you select the configuration area, click Submit to save the changes. Click the Logout button. If you attempt to log out without saving your changes, ExtremeWare Vista prompts you to save your changes. If you select Yes, the changes are saved to the selected configuration area. To change the selected configuration area, you must go to the Configuration task button, Switch option.
Filtering Information
Some pages have a Filter button. The Filter button is used to display a subset of information on a given page. For example, on the OSPF configuration page, you can configure authentication based on the VLAN, area identifier, or virtual link. Once you select a filtering option and click the Filter button, the form that provides the configuration options displays the available interfaces in the drop-down menu, based on your filtering selection. Similarly, in certain Configuration and Statistics pages, information is shown based on a particular slot. Because modular switches allow you to preconfigure modules without having them physically available in the chassis, the configuration pages offer a drop-down menu to select any module card that has been configured on the system, whether or not the module is physically available. By default, information for the first configured module that is found in the chassis is displayed on the page. You can configure available slots and ports by filtering on a selected module from the Sort by Slot drop-down menu. On the Statistics pages, you can only view information for cards that are configured and physically inserted into the chassis. On these pages, the Sort by Slot drop-down menu displays only these modules.
60
Using SNMP
Using SNMP
Any Network Manager running the Simple Network Management Protocol (SNMP) can manage the switch, provided the Management Information Base (MIB) is installed correctly on the management station. Each Network Manager provides its own user interface to the management facilities. The following sections describe how to get started if you want to use an SNMP manager. It assumes you are already familiar with SNMP management. If not, refer to the following publication: The Simple Book by Marshall T. Rose ISBN 0-13-8121611-9 Published by Prentice Hall.
To prevent access using SNMPv1/v2c methods and allow access using SNMPv3 methods only, use the following commands:
enable snmp access disable snmp access snmp-v1v2c
There is no way to configure the switch to allow SNMPv1/v2c access and prevent SNMPv3 access. Most of the commands that support SNMPv1/v2c use the keyword snmp, most of the commands that support SNMPv3 use the keyword snmpv3.
61
Supported MIBs
In addition to private MIBs, the switch supports the standard MIBs listed in Appendix C.
See the Command Reference for a listing of the available traps. You can delete a trap receiver using the configure snmp delete trapreceiver command. Entries in the trap receiver list can also be created, modified, and deleted using the RMON2 trapDestTable MIB variable, as described in RFC 2021. SNMP read accessThe ability to read SNMP information can be restricted through the use of an access profile. An access profile permits or denies a named list of IP addresses and subnet masks. To configure SNMPv1/v2c read access to use an access profile, use the following command:
configure snmp access-profile readonly [<access_profile> | none]
Use the none option to remove a previously configured access profile. SNMP read/write accessThe ability to read and write SNMP information can be restricted through the use of an access profile. An access profile permits or denies a named list of IP addresses and subnet masks. To configure SNMPv1/v2c read/write access to use an access profile, use the following command:
configure snmp access-profile readwrite [<access_profile> | none]
Use the none option to remove a previously configured access-profile. Community stringsThe community strings allow a simple method of authentication between the switch and the remote Network Manager. There are two types of community strings on the switch. Read community strings provide read-only access to the switch. The default read-only community string is public. Read-write community strings provide read and write access to the switch. The default read-write community string is private. System contact (optional)The system contact is a text field that enables you to enter the name of the person(s) responsible for managing the switch.
62
Using SNMP
System nameThe system name is the name that you have assigned to this switch. The default name is the model name of the switch (for example, Summit1 switch). System location (optional)Using the system location field, you can enter an optional location for this switch. Enabling/disabling link up and link down traps (optional)By default, link up and link down traps (also called port-up-down traps) are enabled on the switch for all ports. You can disable or re-enable the sending of these traps on a per port basis, by using the following commands:
disable snmp traps port-up-down ports [all | mgmt | <portlist>] enable snmp traps port-up-down ports [all | mgmt | <portlist>]
The mgmt option will only appear on platforms having a management port. Enabling/disabling MAC-security traps (optional)MAC-security traps are sent on ports when limit-learning is configured and a new MAC address appears on the port after the port has already learned MAC addresses up to the configured limit. At such instants, a log message is generated in the syslog, a trap is sent out and the port is blackholed. By default, MAC-security traps are disabled on the switch. To enable or re-disable them, the following commands must be used:
enable snmp traps mac-security disable snmp traps mac-security
NOTE To configure learning limits on a set of ports, the command configure ports <portlist> limit-learning can be used.
This command displays the following information: Enable/disable state for Telnet, SSH2, SNMP, and web access, along with access profile information SNMP community strings Authorized SNMP station list SNMP MAC-security traps Link up/ link down traps enabled on ports SNMP trap receiver list SNMP trap groups RMON polling configuration Login statistics Enable/disable status of link up and link down traps Enable/disable status of MAC-security traps.
63
predefined filters are associated with a trap receiver, so that only those traps are sent. If you have already been using SNMPv1/v2c trap receivers, trap groups are very easy to incorporate into your network. You cannot define your own trap groups. If you need to define more selectively which notifications to receive, you will need to use the notification filter capabilities available in SNMPv3. To configure trap groups, use the following command:
configure snmp add trapreceiver <ip address> {port <number>} community {hex} <community string> {from <source ip address>} {mode [enhanced | standard]} trap-group {auth-traps{,}} {bgp-traps{,}} {extreme-traps{,}} {link-up-down-traps{,}} {ospf-traps{,} {ping-traceroute-traps{,}} {rmon-traps{,}} {security-traps {,}} {smart-traps{,}} {stp-traps{,}} {system-traps{,}} {vrrp-traps{,}}
For example, to send system and link up/link down traps to the receiver at 10.20.30.44 port 9347 with the community string private, use the following command:
configure snmp add trapreceiver 10.20.30.44 port 9347 community private trap-group link-up-down-traps , system-traps
Table 10 lists the currently defined SNMP trap groups. From time to time, new trap groups may be added to this command.
ospf-traps
64
Using SNMP
extreme-traps
SNMPv3
Beginning in ExtremeWare version 7.1.0, support was added for SNMPv3. SNMPv3 is an enhanced standard for SNMP that improves the security and privacy of SNMP access to managed devices, and provides sophisticated control of access to the device MIB. The prior standard versions of SNMP, SNMPv1 and SNMPv2c provided no privacy and little (or no) security. The following six RFCs provide the foundation for Extreme Networks implementation of SNMPv3: RFC 3410, Introduction to version 3 of the Internet-standard Network Management Framework, provides an overview of SNMPv3. RFC 3411, An Architecture for Describing SNMP Management Frameworks, talks about SNMP architecture, especially the architecture for security and administration. RFC 3412, Message Processing and Dispatching for the Simple Network Management Protocol (SNMP), talks about the message processing models and dispatching that can be a part of an SNMP engine. RFC 3413, SNMPv3 Applications, talks about the different types of applications that can be associated with an SNMPv3 engine. RFC 3414, The User-Based Security Model for Version 3 of the Simple Network Management Protocol (SNMPv3), describes the User-Based Security Model (USM).
65
RFC 3415, View-based Access Control Model (V ACM) for the Simple Network Management Protocol (SNMP), talks about VACM as a way to access the MIB.
SNMPv3 Overview
The SNMPv3 standards for network management were primarily driven the need for greater security and access control. The new standards use a modular design and model management information by cleanly defining a message processing subsystem, a security subsystem, and an access control subsystem. The message processing (MP) subsystem helps identify the MP model to be used when processing a received Protocol Data Unit (PDU), the packets used by SNMP for communication. This layer helps in implementing a multi-lingual agent, so that various versions of SNMP can coexist simultaneously in the same network. The security subsystem features the use of various authentication and privacy protocols with various timeliness checking and engine clock synchronization schemes. SNMPv3 is designed to be secure against: Modification of information, where an in-transit message is altered. Masquerades, where an unauthorized entity assumes the identity of an authorized entity. Message stream modification, where packets are delayed and/or replayed. Disclosure, where packet exchanges are sniffed (examined) and information is learned about the contents. The access control subsystem provides the ability to configure whether access to a managed object in a local MIB is allowed for a remote principal. The access control scheme allows you to define access policies based on MIB views, groups, and multiple security levels. In addition, the SNMPv3 target and notification MIBs provide a more procedural approach for the generation and filtering of notifications. SNMPv3 objects are stored in non-volatile memory unless specifically assigned to volatile storage. Objects defined as permanent cannot be deleted or modified.
NOTE In SNMPv3, many objects can be identified by a human-readable string or by a string of hex octets. In many commands, you can use either a character string, or a colon separated string of hex octets to specify objects. This is indicated by the keyword hex used in the command.
Message Processing
A particular network manager may require messages that conform to a particular version of SNMP. The choice of the SNMPv1, SNMPv2, or SNMPv3 message processing model can be configured for each network manager as its target address is configured. The selection of the message processing model is configured with the mp-model keyword in the following command: configure snmpv3 add target-params {hex} <param name> user {hex} <user name> mp-model [snmpv1 | snmpv2c | snmpv3] sec-model [snmpv1 | snmpv2c | usm] {sec-level [noauth | authnopriv | priv]} {volatile}
66
Using SNMP
SNMPv3 Security
In SNMPv3 the User-Based Security Model (USM) for SNMP was introduced. USM deals with security related aspects like authentication, encryption of SNMP messages and defining users and their various access security levels. This standard also encompass protection against message delay and message replay.
67
NOTE In the SNMPv3 specifications there is the concept of a security name. In the ExtremeWare implementation, the user name and security name are identical. In this manual we use both terms to refer to the same thing. Groups. Groups are used to manage access for the MIB. You use groups to define the security model, the security level, and the portion of the MIB that members of the group can read or write. To underscore the access function of groups, groups are defined using the following command: configure snmpv3 add access {hex} <group name> {sec-model [snmpv1 | snmpv2 | usm]} {sec-level [noauth | authnopriv | priv]} {read-view {hex} <view name>} { write-view {hex} <view name>} {notify-view {hex} <view name>} {volatile} The security model and security level are discussed in the section labeled Security Models and Levels. The view names associated with a group define a subset of the MIB (subtree) that can be accessed by members of the group. The read view defines the subtree that can be read, write view defines the subtree that can be written to, and notify view defines the subtree that notifications can originate from. MIB views are discussed in the section MIB Access Control. There are a number of default (permanent) groups already defined. These groups are: admin, initial, initialmd5, initialsha, initialmd5Priv, initialshaPriv, v1v2c_ro, v1v2c_rw. Use the following command to display information about the access configuration of a group or all groups: show snmpv3 access {{hex} <group name>} Users are associated with groups using the following command: configure snmpv3 add group {hex} <group name> user {hex} <user name> {sec-model [snmpv1| snmpv2 | usm]} {volatile} To show which users are associated with a group, use the following command: show snmpv3 group {{hex} <group name> {user {hex} <user name>}} To delete a group, use the following command: configure snmpv3 delete access [all-non-defaults | {{hex} <group name> {sec-model [snmpv1 | snmpv2c | usm] sec-level [noauth | authnopriv | priv]}}] When you delete a group, you do not remove the association between the group. To delete the association between a user and a group, use the following command: configure snmpv3 delete group {{hex} <group name>} user [all-non-defaults | {{hex} <user name> {sec-model [snmpv1|snmpv2c|usm]}}] Security Models and Levels. For compatibility, SNMPv3 supports three security models: SNMPv1no security SNMPv2ccommunity strings based security SNMPv3USM security
68
Using SNMP
The default is User-Based Security Model (USM). You can select the security model based on the network manager in your network. The three security levels supported by USM are: noAuthnoPrivNo authentication, no privacy. This is the case with existing SNMPv1/v2c agents. AuthnoPrivAuthentication, no privacy. Messages are tested only for authentication. AuthPrivAuthentication, privacy. This represents the highest level of security and requires every message exchange to pass the authentication and encryption tests. When a user is created, an authentication method is selected, and the authentication and privacy passwords or keys are entered. When MD5 authentication is specified, HMAC-MD5-96 is used to achieve authentication with a 16-octet key, which generates an 128-bit authorization code. This code is inserted in msgAuthenticationParameters field of SNMPv3 PDUs when the security level is specified as either AuthnoPriv or AuthPriv. Specifying SHA authentication uses the HMAC-SHA protocol with a 20-octet key for authentication. For privacy, a 16-octet key is provided as input to DES-CBS encryption protocol, which generates an encrypted PDU to be transmitted. DES uses bytes 1-7 to make a 56 bit key. This key (encrypted itself) is placed in msgPrivacyParameters of SNMPv3 PDUs when the security level is specified as AuthPriv.
The mask can also be expressed in hex notation (this is used for the ExtremeWare CLI):
1.3.6.1.2.1.1 / fe
To define a view that includes the entire MIB-2, use the following subtree/mask:
1.3.6.1.2.1.1 / 1.1.1.1.1.0.0.0
When you create the MIB view, you can choose to include the MIB subtree/mask, or to exclude the MIB subtree/mask. To create a MIB view, use the following command:
69
configure snmpv3 add mib-view {hex} <view name> subtree <object identifier> {/<subtree mask>} {type [included | excluded]} {[volatile | non-volatile]}
Once the view is created, you can repeatedly use the configure snmpv3 add mib-view command to include and/or exclude MIB subtree/mask combinations to precisely define the items you wish to control access to. In addition to the user created MIB views, there are three default views. They are of storage type permanent and cannot be deleted, but they can be modified. The default views are: defaultUserView, defaultAdminView, and defaultNotifyView. To show MIB views, use the following command:
show snmpv3 mib-view {{hex} <view name> {subtree <object identifier>}}
To delete a MIB view, use the following command: configure snmpv3 delete mib-view [all-non-defaults | {{hex} <view name> {subtree <object identifier>}}] MIB views which are being used by security groups cannot be deleted.
Notification
SNMPv3 notification is an enhancement to the concept of SNMP traps. Notifications are messages sent from an agent to the network manager, typically in response to some state change on the agent system. With SNMPv3, you can define precisely which traps you want sent, to which receiver by defining filter profiles to use for the notification receivers. To configure notifications, you will configure a target address for the process that receives the notification, a target parameters name, and a list of notification tags. The target parameters specify the security and message processing models to use for the notifications to the target. The target parameters name also points to the filter profile used to filter the notifications. Finally, the notification tags are added to a notification table so that any target addresses using that tag will receive notifications.
Target Addresses
A target address is similar to the earlier concept of a trap receiver. To configure a target address, use the following command: configure snmpv3 add target-addr {hex} <addr name> param {hex} <param name> ipaddress <ip address> {transport-port <port>} {from <source IP address>} {tag-list {hex} <tag>, {hex} <tag>, ...} {volatile} In configuring the target address you will supply an address name that will be used to identify the target address, a parameters name that will indicate the message processing model and security for the messages sent to the target address, and the IP address and port for the receiver. The parameters name also is used to indicate the filter profile used for notifications. The target parameters will be discussed in the section Target Parameters. The from option sets the source IP address in the notification packets. The tag-list option allows you to associate a list of tags with the target address. The tag defaultNotify is set by default. Tags are discussed in the section Notification Tags. To display target addresses, use the following command: show snmpv3 target-addr {{hex} <addr name>
70
Using SNMP
To delete a single target address or all target addresses, use the following command:
configure snmpv3 delete target-addr [{{hex} <addr name>} | all]
Target Parameters
Target parameters specify the message processing model, security model, security level, and user name (security name) used for messages sent to the target address. See the sections Message Processing and Users, Groups, and Security for more details on these topics. In addition, the target parameter name used for a target address points to a filter profile used to filter notifications. When you specify a filter profile, you will associate it with a parameter name, so you will need to create different target parameter names if you will use different filters for different target addresses. Use the following command to create a target parameter name, and set the message processing and security settings associated with it:
configure snmpv3 add target-params {hex} <param name> user {hex} <user name> mp-model [snmpv1 | snmpv2c | snmpv3] sec-model [snmpv1 | snmpv2c | usm] {sec-level [noauth | authnopriv | priv]} {volatile}
To display the options associated with a target parameters name, or all target parameters names, use the following command:
show snmpv3 target-params {{hex} <param name>}
To delete one or all the target parameters, use the following command: configure snmpv3 delete target-params [{{hex} <param name>} | all]
Once the profile name is created, you can associate filters with it using the following command: configure snmpv3 add filter {hex} <profile name> {hex} subtree <object identifier> {/<subtree mask>} type [included | excluded] {volatile} The MIB subtree and mask are discussed in the section MIB Access Control, as filters are closely related to MIB views. You can add filters together, including and excluding different subtrees of the MIB until your filter meets your needs. To display the association between parameter names and filter profiles, use the following command: show snmpv3 filter-profile {{hex} <profile name>} {{hex} <param name>} To display the filters that belong a filter profile, use the following command: show snmpv3 filter {{hex} <profile name> {{subtree} <object identifier>} To delete a filter or all filters from a filter profile, use the following command:
71
configure snmpv3 delete filter [all | [{hex} <profile name> {subtree <object identifier>}]] To remove the association of a filter profile or all filter profiles with a parameter name, use the following command: configure snmpv3 delete filter-profile [all |{hex}<profile name> {param {hex}<param name>}]
Notification Tags
When you create a target address, you associate a list of notification tags with the target, or by default, the defaultNotify tag is associated with the target. When notifications are generated, only targets associated with tags currently in an internal structure, called snmpNotifyTable, will be notified. To add an entry to the table, use the following command:
configure snmpv3 add notify {hex} <notify name> tag {hex} <tag> {volatile}
Any targets associated with tags in the snmpNotifyTable will be notified, based on the filter profile associated with the target. To display the notifications that are set, use the following command: show snmpv3 notify {{hex} <notify name>} To delete an entry from the snmpNotifyTable, use the following command: configure snmpv3 delete notify [{{hex} <notify name>} | all-non-defaults] You cannot delete the default entry from the table, so any targets configured with the defaultNotify tag will always receive notifications consistent with any filter profile specified.
Configuring Notifications
Since the target parameters name is used to point to a number of objects used for notifications, configure the target parameter name entry first. You can then configure the target address, filter profiles and filters, and any necessary notification tags.
Authenticating Users
ExtremeWare provides two methods to authenticate users who login to the switch: RADIUS client TACACS+ NOTE You cannot configure RADIUS and TACACS+ at the same time.
RADIUS Client
Remote Authentication Dial In User Service (RADIUS, RFC 2138) is a mechanism for authenticating and centrally administrating access to network nodes. The ExtremeWare RADIUS client implementation allows authentication for Telnet, Vista, or console access to the switch.
72
TACACS+
Terminal Access Controller Access Control System Plus (TACACS+) is a mechanism for providing authentication, authorization, and accounting on a centralized server, similar in function to the RADIUS client. The ExtremeWare version of TACACS+ is used to authenticate prospective users who are attempting to administer the switch. TACACS+ is used to communicate between the switch and an authentication database.
73
By default, Daylight Saving Time is assumed to begin on the first Sunday in April at 2:00 AM, and end the last Sunday in October at 2:00 AM, and be offset from standard time by one hour. If this is the case in your timezone, you can set up automatic daylight savings adjustment with the command:
configure timezone <GMT_offset> autodst
If your timezone uses starting and ending dates and times that differ from the default, you can specify the starting and ending date and time in terms of a floating day, as follows:
configure timezone name MET 60 autodst name MDT begins every last sunday march at 1 ends every last sunday october at 1
You can also specify a specific date and time, as shown in the following command.
configure timezone name NZST 720 autodst name NZDT 60 begins every first sunday october at 2 ends on 3/16/2002 at 2
The optional timezone IDs are used to identify the timezone in display commands such as show switch. Table 11 describes the command options in detail: Table 11: Time Zone Configuration Command Options
GMT_offset std-timezone-ID autodst dst-timezone-ID dst_offset floating_day Specifies a Greenwich Mean Time (GMT) offset, in + or - minutes. Specifies an optional name for this timezone specification. May be up to six characters in length. The default is an empty string. Enables automatic Daylight Savings Time. Specifies an optional name for this DST specification. May be up to six characters in length. The default is an empty string. Specifies an offset from standard time, in minutes. Value is in the range of 1 to 60. Default is 60 minutes. Specifies the day, week, and month of the year to begin or end DST each year. Format is: <week><day><month> where: <week> is specified as [first | second | third | fourth | last] or 1-5 <day> is specified as [sunday | monday | tuesday | wednesday | thursday | friday | saturday] or 1-7 (where 1 is Sunday) <month> is specified as [january | february | march | april | may | june | july | august | september | october | november | december] or 1-12
Default for beginning is first sunday april; default for ending is last sunday october. absolute_day Specifies a specific day of a specific year on which to begin or end DST. Format is: <month>/<day>/<year> where: time_of_day noautodst <month> is specified as 1-12 <day> is specified as 1-31 <year> is specified as 1970 - 2035
The year must be the same for the begin and end dates. Specifies the time of day to begin or end Daylight Savings Time. May be specified as an hour (0-23) or as hour:minutes. Default is 2:00. Disables automatic Daylight Savings Time.
Automatic Daylight Savings Time (DST) changes can be enabled or disabled. The default setting is enabled. To disable automatic DST, use the command:
configure timezone {name <std_timezone_ID>} <GMT_offset> noautodst
74
Once enabled, the switch sends out a periodic query to the NTP servers defined later (if configured) or listens to broadcast NTP updates from the network. The network time information is automatically saved into the on-board real-time clock. 4 If you would like this switch to use a directed query to the NTP server, configure the switch to use the NTP server(s). If the switch listens to NTP broadcasts, skip this step. To configure the switch to use a directed query, use the following command:
configure sntp-client [primary | secondary] server <host name/ip>
NTP queries are first sent to the primary server. If the primary server does not respond within 1 second, or if it is not synchronized, the switch queries the secondary server (if one is configured). If the switch cannot obtain the time, it restarts the query process. Otherwise, the switch waits for the sntp-client update interval before querying again. 5 Optionally, the interval for which the SNTP client updates the real-time clock of the switch can be changed using the following command:
configure sntp-client update-interval <seconds>
The default sntp-client update-interval value is 64 seconds. 6 You can verify the configuration using the following commands: show sntp-client This command provides configuration and statistics associated with SNTP and its connectivity to the NTP server. show switch This command indicates the GMT offset, the Daylight Savings Time configuration and status, and the current local time. NTP updates are distributed using GMT time. To properly display the local time in logs and other timestamp information, the switch should be configured with the appropriate offset to GMT based on geographical location. Table 12 describes GMT offsets.
Cities London, England; Dublin, Ireland; Edinburgh, Scotland; Lisbon, Portugal; Reykjavik, Iceland; Casablanca, Morocco
75
BT - Baghdad, Russia Zone 2 ZP4 - Russia Zone 3 ZP5 - Russia Zone 4 IST India Standard Time ZP6 - Russia Zone 5 WAST - West Australian Standard CCT - China Coast, Russia Zone 7 JST - Japan Standard, Russia Zone 8 EAST - East Australian Standard GST - Guam Standard Russia Zone 9
+11:00 +12:00
+660 +720 IDLE - International Date Line East NZST - New Zealand Standard NZT - New Zealand Wellington, New Zealand; Fiji, Marshall Islands
76
SNTP Example
In this example, the switch queries a specific NTP server and a backup NTP server. The switch is located in Cupertino, CA, and an update occurs every 20 minutes. The commands to configure the switch are as follows:
configure timezone -480 autodst configure sntp-client update interval 1200 enable sntp-client configure sntp-client primary server 10.0.1.1 configure sntp-client secondary server 10.0.1.2
77
78
This chapter covers the following topics: Configuring a Slot on a Modular Switch on page 79 Configuring Ports on a Switch on page 81 Jumbo Frames on page 84 Load Sharing on the Switch on page 86 Switch Port-Mirroring on page 90 Extreme Discovery Protocol on page 91 Software-Controlled Redundant Port and Smart Redundancy on page 92 Performance Enhancements for Load Sharing on page 90
NOTE For information on saving the configuration, see Appendix A. You can configure the modular switch with the type of I/O module that is installed in each slot. To do this, use the following command:
configure slot <slot number> module
You can also preconfigure the slot before inserting the module. This allows you to begin configuring the module and ports before installing the module in the chassis. If a slot is configured for one type of module, and a different type of module is inserted, the inserted module is put into a mismatch state, and is not brought online. To use the new module type in a slot,
79
the slot configuration must be cleared or configured for the new module type. To clear the slot of a previously assigned module type, use the following command:
clear slot <slot number>
All configuration information related to the slot and the ports on the module is erased. If a module is present when you issue this command, the module is reset to default settings. To display information about a particular slot, use the following command:
show slot {<slot number>}
Information displayed includes: Card type, serial number, part number. Current state (power down, operational, diagnostic, mismatch). Port information. If no slot is specified, information for all slots is displayed.
The three modes of switch operation are: ExtendedIn extended mode, all slots (slots 1, 2, and 3) are enabled. Slot 1 supports all existing Alpine I/O modules: Alpine Ethernet I/O modules (modules with a green stripe on the front of the module) and Alpine Access I/O modules (modules with a silver stripe on the front of the module). Slots 2 and 3 support only Alpine Access I/O modules (silver stripe). StandardIn standard mode, only slots 1 and 2 are enabled. Slot 3 is disabled. Slots 1 and 2 support all existing Alpine I/O modules: Alpine Ethernet I/O modules (green stripe) and Alpine Access I/O modules (silver stripe). AutoIn auto mode, the switch determines if it is in standard or extended mode depending upon the type of modules installed in the chassis or the slot preconfigurations. If an Alpine I/O module with a green stripe (for example, an FM-32Ti module) is installed or preconfigured in slot 2, the switch operates in standard mode. If an Alpine I/O module with a silver stripe (for example, a WM-4Ti module) is installed or preconfigured in slots 2 or 3, the switch operates in extended mode. By default, the Alpine 3802 operates in auto mode. If you insert a module into the Alpine 3802 that is not allowed in a particular slot, the switch logs an error to the syslog. For example, if you insert a GM-WDMi module in slot 3, a module type not supported in slot 3, the switch logs an error.
80
For example, if a G4X I/O module (having a total of four ports) is installed in slot 2 of the BlackDiamond 6808 chassis, the following ports are valid: 2:1 2:2 2:3 2:4 You can also use wildcard combinations (*) to specify multiple modular slot and port combinations. The following wildcard combinations are allowed: slot:*Specifies all ports on a particular I/O module. slot:x-slot:ySpecifies a contiguous series of ports on a particular I/O module. slota:x-slotb:ySpecifies a contiguous series of ports that begin on one I/O module and end on another I/O module.
To enable or disable one or more ports on a stand-alone switch, use the following command:
[enable | disable] ports [ all | <portlist>]
For example, to disable slot 7, ports 3, 5, and 12 through 15 on a modular switch, use the following command:
disable ports 7:3,7:5,7:12-7:15
For example, to disable ports 3, 5, and 12 through 15 on a stand-alone switch, use the following command:
disable ports 3,5,12-15
Even though a port is disabled, the link remains enabled for diagnostic purposes.
81
Gigabit Ethernet ports are statically set to 1 Gbps, and their speed cannot be modified. VDSL ports default to 10 Mbps, and their speed can be configured as 5 Mbps, 10 Mbps, or to support the European Telecommunications Standards Institute (ETSI) VDSL standard, ETSI Plan 997. To configure VDSL ports, use the following command:
configure ports <portlist> vdsl [5meg | 10meg | etsi]
All ports on a stand-alone switch can be configured for half-duplex or full-duplex operation. By default, the ports autonegotiate the duplex setting. To configure port speed and duplex setting, use the following command:
configure ports <portlist> auto off {speed [10 | 100 | 1000 | 10000]} duplex [half | full]
Flow control is fully supported only on Gigabit Ethernet ports. Gigabit ports both advertise support and respond to pause frames. 10/100 Mbps Ethernet ports also respond to pause frames, but do not advertise support. Neither 10/100 Mbps or Gigabit Ethernet ports initiate pause frames. Flow Control is enabled or disabled as part of autonegotiation. If autonegotiation is set to off, flow control is disabled. When autonegotiation is turned on, flow control is enabled.
NOTE 1000BASE-TX ports support only autonegotiation. The following example turns autonegotiation off for port 1 on a G4X or G6X module located in slot 1 of a modular switch:
configure ports 1:1 auto off duplex full
The following example turns autonegotiation off for port 4 (a Gigabit Ethernet port) on a stand-alone switch:
configure ports 4 auto off duplex full
82
where the following is true: portlistSpecifies one or more ports on the switch allSpecifies all of the ports on the switch offDisables the autopolarity detection feature on the specified ports onEnables the autopolarity detection feature on the specified ports Under certain conditions, you might opt to turn autopolarity off on one or more 10BASE-T and 100BASE-TX ports. The following example turns autopolarity off for ports 3-5 on a Summit48si switch:
configure ports 3-5 auto-polarity off
NOTE If you attempt to invoke this command on a Gigabit Ethernet switch port, the system displays a message indicating that the specified port is not supported by this feature. When autopolarity is disabled on one or more Ethernet ports, you can verify that status by using the command:
show configuration
This command will list the ports for which the feature has been disabled. You can also verify the current autopolarity status by using the command:
show ports {<portlist> | all} info detail
83
Extreme Networks switches over 10 Gigabit Ethernet links. Use the following command to modify the Interpacket Gap:
configure port <slot:port> interpacket-gap <byte_time>
Jumbo Frames
Jumbo frames are Ethernet frames that are larger than 1522 bytes, including four bytes used for the cyclic redundancy check (CRC). Extreme products support switching and routing of jumbo frames at wire-speed on all ports. Jumbo frames are used between endstations that support larger frame sizes for more efficient transfers of bulk data. Both endstations involved in the transfer must be capable of supporting jumbo frames. The switch only performs IP fragmentation, or participates in maximum transmission unit (MTU) negotiation on behalf of devices that support jumbo frames.
The jumbo frame size range is 1523 to 9216. This value describes the maximum size of the frame in transit (on the wire), and includes 4 bytes of CRC plus another 4 bytes if 802.1Q tagging is being used. Set the MTU size for the VLAN, using the following command:
configure ip-mtu <size> vlan <vlan name>
NOTE PoS or ATM must be rebooted if the IP-MTU configuration is changed. Next, enable support on the physical ports that will carry jumbo frames using the following command:
enable jumbo-frame ports [<portlist> | all]
NOTE Some network interface cards (NICs) have a configured maximum MTU size that does not include the additional 4 bytes of CRC. Ensure that the NIC maximum MTU size is at or below the maximum MTU size configured on the switch. Frames that are larger than the MTU size configured on the switch are dropped at the ingress port.
84
Jumbo Frames
the path, the Extreme switch discards the datagrams and returns an ICMP Destination Unreachable message to the sending host, with a code meaning fragmentation needed and DF set. When the source host receives the message (sometimes called a Datagram Too Big message), the source host reduces its assumed path MTU and retransmits the datagrams. The path MTU discovery process ends when one of the following is true: The source host sets the path MTU low enough that its datagrams can be delivered without fragmentation. The source host does not set the DF bit in the datagram headers. If it is willing to have datagrams fragmented, a source host can choose not to set the DF bit in datagram headers. Normally, the host continues to set DF in all datagrams, so that if the route changes and the new path MTU is lower, the host can perform path MTU discovery again.
NOTE Jumbo frame-to-jumbo frame fragmentation is not supported. Only jumbo frame-to-normal frame fragmentation is supported. To configure VLANs for IP fragmentation, follow these steps: 1 Enable jumbo frames on the incoming port. 2 Add the port to a VLAN. 3 Assign an IP address to the VLAN. 4 Enable ipforwarding on the VLAN. 5 Set the MTU size for the VLAN, using the following command:
configure ip-mtu <size> vlan <vlan name>
The ip-mtu value can be 1500 or 9194, with 1500 the default. NOTE To set the MTU size greater than 1500, all ports in the VLAN must have jumbo frames enabled.
85
3 Assign an IP address to the VLAN. 4 Enable ipforwarding on the VLAN. If you leave the MTU size configured to the default value, when you enable jumbo frame support on a port on the VLAN you will receive a warning that the ip-mtu size for the VLAN is not set at maximum jumbo frame size. You can ignore this warning if you want IP fragmentation within the VLAN, only. However, if you do not use jumbo frames, IP fragmentation can only be used for traffic that stays within the same VLAN. For traffic that is set to other VLANs, to use IP fragmentation, all ports in the VLAN must be configured for jumbo frame support.
NOTE Load sharing must be enabled on both ends of the link or a network loop may result. The load-sharing types (dynamic, static) must match, but the load-sharing algorithms do not need to be the same on both ends.
Load-Sharing Algorithms
Load-sharing algorithms allow you to select the distribution technique used by the load-sharing group to determine the output port selection. Algorithm selection is not intended for use in predictive traffic engineering. You can only choose the algorithm used in static load sharing, as dynamic load sharing exclusively uses an address-based algorithm. You can configure one of three load-sharing algorithms on the switch, as follows:
86
Port-basedUses the ingress port to determine which physical port in the load-sharing group is used to forward traffic out of the switch. Address-basedUses addressing information to determine which physical port in the load-sharing group to use for forwarding traffic out of the switch. Addressing information is based on the packet protocol, as follows: IP packetsUses the source and destination MAC and IP addresses, and the TCP port number. IPX packetsUses the source and destination MAC address, and IPX network identifiers. All other packetsUses the source and destination MAC address. Round-robinWhen the switch receives a stream of packets, it forwards one packet out of each physical port in the load-sharing group using a round-robin scheme. NOTE Using the round-robin algorithm, packet sequencing between clients is not guaranteed. If you do not explicitly select an algorithm, the port-based scheme is used. However, the address-based algorithm has a more even distribution and is the recommended choice, except when running MPLS, in which case port-based is recommended.
where: l2Indicates that the switch should examine the MAC source and destination address. l3Indicates that the switch should examine the IP source and destination address. l4Indicates that the switch should examine the UDP or TCP well-known port number. This feature is available for the address-based load-sharing algorithm, only. To verify your configuration, use the following command:
show sharing address-based
87
All the ports in a load-sharing group must have the same exact configuration, including auto negotiation, duplex setting, ESRP host attach or dont-count, and so on. All the ports in a load-sharing group must also be of the same bandwidth class. The following rules apply: One group can contain up to 8 ports. The ports in the group do not need to be contiguous. If dynamic load sharing is used (LACP), the ports in the group must be on the same I/O module. A load share group that spans multiple modules must use ports that are all of the same maximum bandwidth capability. On BlackDiamond 6804 and 6808 chassis, the following limitation applies: The chassis must use the MSM-3 if you are going to configure a load share group that spans multiple modules (cross-module trunking). On BlackDiamond 6816 chassis, the following limitation applies: The ports in the group must be on the same I/O module. To define a load-sharing group, you assign a group of ports to a single, logical port number. To enable or disable a load-sharing group, use the following commands:
enable sharing <port> grouping <portlist> {dynamic | algorithm {port-based | address-based | round-robin}} disable sharing <port>
NOTE Do not disable a port that is part of a load-sharing group. Disabling the port prevents it from forwarding traffic, but still allows the link to initialize. As a result, a partner switch does not receive a valid indication that the port is not in a forwarding state, and the partner switch will continue to forward packets.
NOTE BlackDiamond modules implement local switching; packets that ingress and egress on the same module are not passed to the chassis backplane but switched on the module from the ingress to the egress port. For this reason, packets arriving on a module that contains any of the configured cross-module load sharing ports will only be shared with the ports on that module, and not with the ports on any other modules.
Loopback Detection
Each port may enable loop detection. This optional feature detects that a port has been looped back to the local system. If a loopback is detected, the port is disabled. Note that loopbacks may exist between different ports. The feature will disable any port that both has the feature enabled, and receives an LACP message that was sent from the local system. To enable or disable loopback detection, use the following commands:
enable lbdetect port <portlist> [retry-timeout<seconds>]
88
Load-Sharing Examples
This section provides examples of how to define load-sharing on modular and stand-alone switches.
In this example, logical port 3:9 represents physical ports 3:9 through 3:12 and 5:7 through 5:10. When using load sharing, you should always reference the master logical port of the load-sharing group (port 3:9 in the previous example) when configuring or viewing VLANs. VLANs configured to use other ports in the load-sharing group will have those ports deleted from the VLAN when load sharing becomes enabled. For BlackDiamond chassis, packets are locally switched when possible, even with load sharing enabled. For example, in the configuration above, packets received on port 3:2 that are destined for the load-sharing group will only be shared with the ports 3:9-3:12 and not with ports 5:7-5:10. In contrast, packets received on port 2:2 that are destined for the load-sharing group will be shared with the all the ports in the load-sharing group (ports 3:9-3:12 and 5:7-5:10).
In this example, logical port 3:9 represents physical ports 3:9 through 3:12. When using load sharing, you should always reference the master logical port of the load-sharing group (port 3:9 in the previous example) when configuring or viewing VLANs. VLANs configured to use other ports in the load-sharing group will have those ports deleted from the VLAN when load sharing becomes enabled.
89
When using load sharing, you should always reference the master logical port of the load-sharing group (port 9 in the previous example) when configuring or viewing VLANs. VLANs configured to use other ports in the load-sharing group will have those ports deleted from the VLAN when load sharing becomes enabled.
NOTE Do not disable a port that is part of a load-sharing group. Disabling the port prevents it from forwarding traffic, but still allows the link to initialize. As a result, a partner switch does not receive a valid indication that the port is not in a forwarding state, and the partner switch will continue to forward packets.
and specify the following: address-basedaddress-based load-sharing algorithm port-basedport-based load-sharing algorithm round-robinround-robin load-sharing algorithm For more information about the load-sharing algorithms, see Load-Sharing Algorithms on page 86.
Switch Port-Mirroring
Port-mirroring configures the switch to copy all traffic associated with one or more ports. The monitor port can be connected to a network analyzer or RMON probe for packet analysis. The system uses a traffic filter that copies a group of traffic to the monitor port. The traffic filter can be defined based on one of the following criteria: Physical portAll data that traverses the port, regardless of VLAN configuration, is copied to the monitor port. VLANAll data to and from a particular VLAN, regardless of the physical port configuration, is copied to the monitor port. Virtual portAll data specific to a VLAN on a specific port is copied to the monitor port.
90
Up to eight mirroring filters and one monitor port can be configured. Once a port is specified as a monitor port, it cannot be used for any other function.
NOTE Frames that contain errors are not mirrored. The mirrored port transmits tagged or untagged frames. This allows you to mirror multiple ports or VLANs to a mirror port, while preserving the ability of a single protocol analyzer to track and differentiate traffic within a broadcast domain (VLAN) and across broadcast domains (for example, across VLANs when routing).
The following example sends all traffic coming into or out of the system on slot 8, port 1 and the VLAN default to the mirror port:
enable mirroring to port 8:4 configure mirroring add port 8:1 vlan default
The following example sends all traffic coming into or out of the switch on port 1 and the VLAN default to the mirror port:
configure mirroring add port 1 vlan default
91
EDP is enabled on all ports by default. To disable EDP on one or more ports, use the following command:
disable edp ports <portlist>
To view EDP port information on the switch, use the following command:
show edp
92
10
11
12
13
14
15
16
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Primary
Backup
17
4 5
20 21
EW_076
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Primary
Backup
17
4 5
20 21
EW_075
Only one side of the link needs to be configured as redundant, since the redundant port link is held in standby state on both sides of the link.
93
The first port specified is the primary port. The second port specified is the redundant port. To unconfigure a software-controlled redundant port, use the following command:
unconfigure port <portlist> redundant
94
To configure the switch for the Smart Redundancy feature, use the following command:
enable smartredundancy <portlist>
The following example is identical to the previous one, but each redundant port is configured individually:
enable enable config config config config sharing 1:1 group 1:1-1:4 sharing 2:1 group 2:1-2:4 ports 1:1 redundant 2:1 ports 1:2 redundant 2:2 ports 1:3 redundant 2:3 ports 1:4 redundant 2:4
95
96
This chapter covers the following topics: Overview of Virtual LANs on page 97 Types of VLANs on page 98 VLAN Names on page 106 Configuring VLANs on the Switch on page 107 Displaying VLAN Settings on page 108 VLAN Tunneling (VMANs) on page 110 MAC-Based VLANs on page 112 VLAN Translation on page 115 Setting up Virtual Local Area Networks (VLANs) on the switch eases many time-consuming tasks of network administration while increasing efficiency in network operations.
Benefits
Implementing VLANs on your networks has the following advantages: VLANs help to control trafficWith traditional networks, congestion can be caused by broadcast traffic that is directed to all network devices, regardless of whether they require it. VLANs increase the efficiency of your network because each VLAN can be set up to contain only those devices that must communicate with each other. VLANs provide extra securityDevices within each VLAN can only communicate with member devices in the same VLAN. If a device in VLAN Marketing must communicate with devices in VLAN Sales, the traffic must cross a routing device.
97
VLANs ease the change and movement of devicesWith traditional networks, network administrators spend much of their time dealing with moves and changes. If users move to a different subnetwork, the addresses of each endstation must be updated manually.
Types of VLANs
VLANs can be created according to the following criteria: Physical port 802.1Q tag Ethernet, LLC SAP, or LLC/SNAP Ethernet protocol type MAC address A combination of these criteria
Port-Based VLANs
In a port-based VLAN, a VLAN name is given to a group of one or more ports on the switch. All ports are members of the port-based VLAN default. Before you can add any port to another port-based VLAN, you must remove it from the default VLAN, unless the new VLAN uses a protocol other than the default protocol any. A port can be a member of only one port-based VLAN. On the Summit7i switch in Figure 3, ports 9 through 14 are part of VLAN Marketing; ports 25 through 29 are part of VLAN Sales; and ports 21 through 24 and 30 through 32 are in VLAN Finance. Figure 3: Example of a port-based VLAN on the Summit7i switch
Marketing
Finance
Sales
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
EW_027
For the members of the different IP VLANs to communicate, the traffic must be routed by the switch, even if they are physically part of the same I/O module. This means that each VLAN must be configured as a router interface with a unique IP address.
98
Types of VLANs
Sales
System 1
1 2 3 4 A B 5 6 7 8
System 2
10
11
12
13
14
15
16
17
1
18
19
20
21
22
23
24
25
2
26
27
28
29
30
31
32
EW_028
To create multiple VLANs that span two switches in a port-based VLAN, a port on system 1 must be cabled to a port on system 2 for each VLAN you want to have span across the switches. At least one port on each switch must be a member of the corresponding VLANs, as well. Figure 5 illustrates two VLANs spanning two switches. On system 2, ports 25 through 29 are part of VLAN Accounting; ports 21 through 24 and ports 30 through 32 are part of VLAN Engineering. On system 1, all port on slot 1 are part of VLAN Accounting; all ports on slot 8 are part of VLAN Engineering.
99
System 1
1 2 3 4 A B 5 6 7 8
50015
Accounting
System 2
Engineering
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
EW_030
VLAN Accounting spans system 1 and system 2 by way of a connection between system 2, port 29 and system 1, slot 1, port 6. VLAN Engineering spans system 1 and system 2 by way of a connection between system 2, port 32, and system 1, slot 8, port 6. Using this configuration, you can create multiple VLANs that span multiple switches, in a daisy-chained fashion. Each switch must have a dedicated port for each VLAN. Each dedicated port must be connected to a port that is a member of its VLAN on the next switch.
Tagged VLANs
Tagging is a process that inserts a marker (called a tag) into the Ethernet frame. The tag contains the identification number of a specific VLAN, called the VLANid. NOTE The use of 802.1Q tagged packets may lead to the appearance of packets slightly bigger than the current IEEE 802.3/Ethernet maximum of 1,518 bytes. This may affect packet error counters in other devices, and may also lead to connectivity problems if non-802.1Q bridges or routers are placed in the path.
100
Types of VLANs
NOTE Packets arriving tagged with a VLANid that is not configured on a port will be discarded. Figure 6 illustrates the physical view of a network that uses tagged and untagged traffic.
101
M = Marketing S = Sales
System 1
50015
M M
1
M
2
S S
S
3
S
4
System 2
EW_029
Figure 7 is a logical diagram of the same network. Figure 7: Logical diagram of tagged and untagged traffic
Marketing
System 1 Ports 1-4 & 9-12 System 2 Slot 1, Port 2 Slot 2, Ports 1-8 & 17-24 System 1 Port 25 * Port 29 * System 2 Slot 1, Port 1 *
Sales
System 1 Ports 5-8, 13-16 & 32 System 2 Slot 1, Port 3 Slot 1, Port 4 Slot 2, Ports 9-16 & 25-32
*Tagged Ports
EW_025
In Figure 6 and Figure 7: The trunk port on each switch carries traffic for both VLAN Marketing and VLAN Sales. The trunk port on each switch is tagged.
102
Types of VLANs
The server connected to port 25 on system 1 has a NIC that supports 802.1Q tagging. The server connected to port 25 on system 1 is a member of both VLAN Marketing and VLAN Sales. All other stations use untagged traffic. As data passes out of the switch, the switch determines if the destination port requires the frames to be tagged or untagged. All traffic coming from and going to the server is tagged. Traffic coming from and going to the trunk ports is tagged. The traffic that comes from and goes to the other stations on this network is not tagged.
Protocol-Based VLANs
Protocol-based VLANs enable you to define a packet filter that the switch uses as the matching criteria to determine if a particular packet belongs to a particular VLAN. Protocol-based VLANs are most often used in situations where network segments contain hosts running multiple protocols. For example, in Figure 8, the hosts are running both the IP and NetBIOS protocols. The IP traffic has been divided into two IP subnets, 192.207.35.0 and 192.207.36.0. The subnets are internally routed by the switch. The subnets are assigned different VLAN names, Finance and Personnel, respectively. The remainder of the traffic belongs to the VLAN named MyCompany. All ports are members of the VLAN MyCompany.
103
192.207.35.1
192.207.36.1
For example:
create protocol fred
104
Types of VLANs
The protocol name can have a maximum of 32 characters. 2 Configure the protocol using the following command:
configure protocol <protocol_name> add <protocol_type> <hex_value>
Supported protocol types include: etypeEtherType. The values for etype are four-digit hexadecimal numbers taken from a list maintained by the IEEE. This list can be found at the following URL:
http://standards.ieee.org/regauth/ethertype/index.html
llcLLC Service Advertising Protocol (SAP). The values for llc are four-digit hexadecimal numbers that are created by concatenating a two-digit LLC Destination SAP (DSAP) and a two-digit LLC Source SAP (SSAP). snapEthertype inside an IEEE SNAP packet encapsulation. The values for snap are the same as the values for etype, described previously. For example:
configure protocol fred add llc feff configure protocol fred add snap 9999
A maximum of 15 protocol filters, each containing a maximum of six protocols, can be defined. On products that use the Inferno chip set, all 15 protocol filters can be active and configured for use. On all other platforms, no more than seven protocols can be active and configured for use.
NOTE For more information on SNAP for Ethernet protocol types, see TR 11802-5:1997 (ISO/IEC) [ANSI/IEEE std. 802.1H, 1997 Edition].
105
VLAN Names
Each VLAN is given a name that can be up to 32 characters. VLAN names can use standard alphanumeric characters. The following characters are not permitted in a VLAN name: Space Comma Quotation mark VLAN names must begin with an alphabetical letter. Quotation marks can be used to enclose a VLAN name that includes special characters, including single quotation marks or commas. Spaces may not be included, even within quotation marks. For example, the names test, test1, and test_15 are acceptable VLAN names. The names test&5 and joes may be used if enclosed in quotation marks. Names such as 5test or test 5 are not permitted. VLAN names can be specified using the tab key for command completion. VLAN names are locally significant. That is, VLAN names used on one switch are only meaningful to that switch. If another switch is connected to it, the VLAN names have no significance to the other switch.
NOTE You should use VLAN names consistently across your entire network.
Default VLAN
The switch ships with one default VLAN that has the following properties: The VLAN name is default. It contains all the ports on a new or initialized switch. The default VLAN is untagged on all ports. It has an internal VLANid of 1.
Renaming a VLAN
To rename an existing VLAN, use the following command:
configure vlan <old_name> name <new_name>
The following rules apply to renaming VLANs: Once you change the name of the default VLAN, it cannot be changed back to default. You cannot create a new VLAN named default. You cannot change the VLAN name MacVlanDiscover. Although the switch accepts a name change, once it is rebooted, the original name is recreated.
106
NOTE If you plan to use this VLAN as a control VLAN for an EAPS domain, do NOT assign an IP address to the VLAN. 3 Assign a VLANid, if any ports in this VLAN will use a tag. 4 Assign one or more ports to the VLAN. As you add each port to the VLAN, decide if the port will use an 802.1Q tag.
NOTE Because VLAN names are unique, you do not need to enter the keyword vlan after you have created the unique VLAN name. You can use the VLAN name alone. The following stand-alone switch example creates a tag-based VLAN named video. It assigns the VLANid 1000. Ports 4 through 8 are added as tagged ports to the VLAN.
create vlan video configure video tag 1000 configure video add port 4-8 tagged
The following stand-alone switch example creates a VLAN named sales, with the VLANid 120. The VLAN uses both tagged and untagged ports. Ports 1 through 3 are tagged, and ports 4 and 7 are untagged. Note that when not explicitly specified, ports are added as untagged.
create vlan sales configure sales tag 120 configure sales add port 1-3 tagged
107
configure default delete port 4,7 configure sales add port 4,7
The following modular switch example creates a protocol-based VLAN named ipsales. Slot 5, ports 6 through 8, and slot 6, ports 1, 3, and 4-6 are assigned to the VLAN. In this example, you can add untagged ports to a new VLAN without first deleting them from the default VLAN, because the new VLAN uses a protocol other than the default protocol.
create vlan ipsales configure ipsales protocol ip configure ipsales add port 5:6-5:8,6:1,6:3-6:6
The following modular switch example defines a protocol filter, myprotocol and applies it to the VLAN named myvlan. This is an example only, and has no real-world application.
create protocol myprotocol configure protocol myprotocol add etype 0xf0f0 configure protocol myprotocol add etype 0xffff create vlan myvlan configure myvlan protocol myprotocol
The show command displays summary information about each VLAN, which includes: Name. VLANid. How the VLAN was created. IP address. IPX address (if configured). STPD information. Protocol information. QoS profile information. Ports assigned. Tagged/untagged status for each port. How the ports were added to the VLAN. Number of VLANs configured on the switch. Use the detail option to display the detailed format.
108
The information displayed includes: Transmitted and received unicast packets. Transmitted and received multicast packets. Transmitted and received broadcast packets. Transmitted and received bytes. You can display statistics for multiple VLANs by entering the name of each VLAN on the command line.
You can monitor up to four VLANs on the same port by issuing the command four times. For example, if you want to monitor VLAN dog1, dog2, dog3, and dog4 on port 1, use the following command configuration:
configure configure configure configure ports ports ports ports 1:* 1:* 1:* 1:* monitor monitor monitor monitor vlan vlan vlan vlan dog1 dog2 dog3 dog4
After you configure the port, you can use this command to display information for the configured port:
show ports <portlist> vlan statistics
After you have configured per-port monitoring, every time you issue the show ports command, the latest statistics are displayed directly from the hardware in real-time. This information is not logged. To remove the port mask, use the following command:
unconfigure ports <portlist> monitor vlan <vlan name>
You must issue the unconfigure command for each VLAN you have configured for the port. For example:
unconfigure unconfigure unconfigure unconfigure ports ports ports ports 1:* 1:* 1:* 1:* monitor monitor monitor monitor vlan vlan vlan vlan dog1 dog2 dog3 dog4
109
This show command displays protocol information, which includes: Protocol name. List of protocol fields. VLANs that use the protocol.
110
1:1 31 32
vMAN core
31 32
Two tunnels are depicted that have ingress/egress ports on each Summit7i switch. The configuration for the Summit7i switches shown in Figure 9 is:
configure dot1q ethertype 88a8 enable jumbo-frame ports 31,32 configure jumbo-frame size 1530 create vlan Tunnel1 configure vlan Tunnel1 tag 50 configure vlan Tunnel1 add port 1-4 untag configure vlan Tunnel1 add port 31,32 tagged create vlan Tunnel2 configure vlan Tunnel2 tag 60 configure vlan Tunnel2 add port 5-8 untag create vlan Tunnel2 add port 31,32 tagged
Specific to this configuration, a layer 1 or layer 2 redundancy method would also be employed, such as Spanning Tree or other methods ExtremeWare offers.
111
MAC-Based VLANs
MAC-Based VLANs allow physical ports to be mapped to a VLAN based on the source MAC address learned in the FDB. This feature allows you to designate a set of ports that have their VLAN membership dynamically determined by the MAC address of the end station that plugs into the physical port. You can configure the source MAC address-to-VLAN mapping either offline or dynamically on the switch. For example, you could use this application for a roaming user who wants to connect to a network from a conference room. In each room, the user plugs into one of the designated ports on the switch and is mapped to the appropriate VLAN. Connectivity is maintained to the network with all of the benefits of the configured VLAN in terms of QoS, routing, and protocol support.
The group any is equivalent to the group 0. Ports that are configured as any allow any MAC address to be assigned to a VLAN, regardless of group association. Partial configurations of the MAC to VLAN database can be downloaded to the switch using the timed download configuration feature.
112
MAC-Based VLANs
113
Example
In relation to MAC-based VLANs, the downloaded file is an ASCII file that consists of CLI commands used to configure the most recent MAC-to-VLAN database. This feature is different from the normal download configuration command in that it allows incremental configuration without the automatic rebooting of the switch. The following example shows an incremental configuration file for MAC-based VLAN information that updates the database and saves changes:
configure configure configure . . configure configure save mac-vlan add mac-address 00:00:00:00:00:01 mac-group any engineering mac-vlan add mac-address 00:00:00:00:ab:02 mac-group any engineering mac-vlan add mac-address 00:00:00:00:cd:04 mac-group any sales
mac-vlan add mac-address 00:00:00:00:ab:50 mac-group any sales mac-vlan add mac-address 00:00:00:00:cd:60 mac-group any sales
114
VLAN Translation
VLAN Translation
VLAN translation provides the ability to translate the 802.1Q tags for several VLANs into a single VLAN tag. This allows you to aggregate layer 2 VLAN traffic from multiple clients into a single uplink VLAN, improving VLAN scaling. Figure 10: An Application of VLAN Translation
PC1
VLAN 101
PC4
IAD PH1
VLAN 201
PC2
VLAN 102
IAD PH2
VLAN 202
PC3
VLAN 103 VLAN 103 (data) VLAN 203 (voice)
IAD PH3
VLAN 203
EW_105
In the figure, VLANs 101, 102, and 103 carry data traffic while VLANs 201, 202, and 203 carry voice traffic. The voice and data traffic are combined on Integrated Access Devices (IAD) that connect to the VLAN translation switch. Each of the three clusters of phones and PCs use two VLANs to separate the voice and data traffic. As the traffic is combined, the six VLANs are translated into two. This simplifies administration, and scales much better for large installations. Conceptually, this is very similar to the existing layer 3 VLAN Aggregation (super-VLANS and sub-VLANs) that currently exists in ExtremeWare. The primary differences between these two features are: VLAN translation is strictly a layer 2 feature. VLAN translation does not allow communications between the member VLANs. VLAN translation requires the translation VLAN (unlike a super-Vlan) to contain one or more ports.
115
Unicast Traffic
Traffic on the member VLANs may be either tagged or untagged. Traffic is switched locally between client devices on the same member VLAN as normal. Traffic cannot be switched between clients on separate member VLANs. Traffic from any member VLAN destined to the translation VLAN is switched and the VLAN tag is translated appropriately. Traffic from the translation VLAN destined to any member VLAN is switched and the VLAN tag is translated.
Broadcast Behavior
Broadcast traffic generated on a member VLAN will be replicated in every other active port of that VLAN as normal. In addition, the member VLAN traffic will be replicated to every active port in the translation VLAN and the VLAN tag will be translated appropriately. Broadcast traffic generated on the translation VLAN will be replicated to every other active port in this VLAN as usual. The caveat in this scenario is that this traffic will also be replicated to every active port in every member VLAN, with VLAN tag translation. In effect, the broadcast traffic from the translation VLAN will leak onto all member VLANs.
Multicast Behavior
IGMP snooping may be enabled on member and translation VLANs so that multicast traffic can be monitored within the network. IGMP snooping software examines all IGMP control traffic that enters the switch. IGMP control traffic received on a VLAN translation port is forwarded by the CPU to all other ports in the translation group. Software VLAN translation is performed on the packets which cross the translation boundary between member and translation VLANs. The snooping software will detect ports joining and leaving multicast streams. When a VLAN translation port joins a multicast group, an FDB entry will be created using information from the IGMP message. The FDB entry will be added for the requested multicast address and will contain a multicast PTAG. When a VLAN translation port leaves a multicast group, the port will be removed from the multicast list. The last VLAN translation port to leave a multicast group will cause the multicast FDB entry to be removed.
116
VLAN Translation
DHCP cannot be enabled on ports that are included in a member or translation VLAN Member or translation VLANs cannot be used by TLS EDP may be enabled on ports that are included in member and translation VLANs ESRP cannot be enabled on member or translation VLANs ESRP BPDUs will be translated through the switch (BPDU tunneling) ESRP redundancy may be provided by adding a translation VLAN as a member of an ESRP domain STP redundancy may be provided by protecting ports that are included in member VLANs EAPS protected VLANs may not be either member or translation VLANs IGMP snooping may be enabled on member and translation VLANs VMAN encapsulated VLAN tags are not translated VLAN translation MACs are accounted for at each port during learning, thus these MACs are used in the calculations for sending MAC security traps.
Interfaces
Use the following information for selecting and configuring VLAN translation interfaces: Member and translation VLANs may only contain Ethernet ports, therefore POS, ATM, and WAN (T1, E1, T3) ports are not supported. A single physical port may be added to multiple member VLANs, using different VLAN tags. Member VLANs and translation VLANs may include both tagged and untagged ports.
117
EW_106
The following configuration commands create the translation VLAN and enables VLAN translation:
create vlan v1000 configure v1000 tag configure v1000 add configure v1000 add configure v1000 add configure v1000 add configure v1000 add 1000 ports 2:1 tagged member-vlan v101 member-vlan v102 member-vlan v103 member-vlan v104
118
VLAN Translation
Extreme switch with VLAN VLAN 101, 102, 103, 104 translation (SW2) (1:3)
(1:3)
EVLAN (2:2)
(1:4) (1:3) VLAN 1000 (2:1)
EW_107
The configuration for SW2 and SW3 will be identical for this example. The following configuration commands create the member VLANs on SW2:
create vlan v101 configure v101 tag configure v101 add create vlan v102 configure v102 tag configure v102 add create vlan v103 configure v103 tag configure v103 add create vlan v104 configure v104 tag configure v104 add 101 ports 1:3 tagged 102 ports 1:3 tagged 103 ports 1:3 tagged 104 ports 1:3 tagged
119
This set of configuration commands create the translation VLANs and enables VLAN translation on SW2:
create vlan v1000 configure v1000 tag configure v1000 add configure v1000 add configure v1000 add configure v1000 add configure v1000 add 1000 ports 2:1 tagged member-vlan v101 member-vlan v102 member-vlan v103 member-vlan v104
The last set of configuration commands create the ESRP control VLAN and enables ESRP protection on the translation VLAN for SW2:
create vlan evlan configure evlan add ports 2:2 enable esrp evlan configure evlan add domain-member v1000
VLAN 101, 102, 103, 104 VLAN 103 (1:1) (1:4) (1:3) (1:4)
EW_108
The following configuration commands create the member VLANs and enables STP on SW1:
create vlan v101 configure v101 tag configure v101 add configure v101 add configure v101 add create vlan v102 configure v102 tag configure v102 add configure v102 add 101 ports 1:1 tagged ports 1:3 tagged ports 1:4 tagged 102 ports 1:2 tagged ports 1:3 tagged
120
VLAN Translation
configure v102 add create vlan v103 configure v103 tag configure v103 add configure v103 add create vlan v104 configure v104 tag configure v104 add configure v104 add create stpd stp1 configure stp1 tag configure stp1 add configure stp1 add configure stp1 add configure stp1 add enable stpd stp1
ports 1:4 tagged 103 ports 1:3 tagged ports 1:4 tagged 104 ports 1:3 tagged ports 1:4 tagged 101 vlan vlan vlan vlan
These configuration commands create the member VLANs and enables STP on SW2:
create vlan v103 configure v103 tag configure v103 add configure v103 add configure v103 add create vlan v104 configure v104 tag configure v104 add configure v104 add configure v104 add create vlan v101 configure v101 tag configure v101 add configure v101 add create vlan v102 configure v102 tag configure v102 add configure v102 add create stpd stp1 configure stp1 tag configure stp1 add configure stp1 add configure stp1 add configure stp1 add enable stpd stp1 103 ports 1:1 tagged ports 1:3 tagged ports 1:4 tagged 104 ports 1:2 tagged ports 1:3 tagged ports 1:4 tagged 101 ports 1:3 tagged ports 1:4 tagged 102 ports 1:3 tagged ports 1:4 tagged 101 vlan vlan vlan vlan
This set of configuration commands create the member VLANs and enables STP on SW3:
create vlan v101 configure v101 tag configure v101 add configure v101 add create vlan v102 configure v102 tag configure v102 add configure v102 add create vlan v103 configure v103 tag 101 ports 1:3 tagged ports 1:4 tagged 102 ports 1:3 tagged ports 1:4 tagged 103
121
configure v103 add configure v103 add create vlan v104 configure v104 tag configure v104 add configure v104 add create stpd stp1 configure stp1 tag configure stp1 add configure stp1 add configure stp1 add configure stp1 add enable stpd stp1
ports 1:3 tagged ports 1:4 tagged 104 ports 1:3 tagged ports 1:4 tagged 101 vlan vlan vlan vlan
The last set of configuration commands creates the translation VLAN and enables VLAN translation on SW3:
create vlan v1000 configure v1000 tag configure v1000 add configure v1000 add configure v1000 add configure v1000 add configure v1000 add 1000 ports 2:1 tagged member-vlan v101 member-vlan v102 member-vlan v103 member-vlan v104
122
This chapter describes the following topics: Overview of the FDB on page 123 Associating QoS Profiles with an FDB Entry on page 126 Scanning the FDB on page 126 FDB Configuration Examples on page 128 MAC-Based Security on page 129 Displaying FDB Entries on page 130
FDB Contents
Each FDB entry consists of the MAC address of the device, an identifier for the port and VLAN on which it was received, and the age of the entry. Frames destined for MAC addresses that are not in the FDB are flooded to all members of the VLAN.
123
124
Non-permanent static entries are created by the switch software for various reasons, typically upon switch boot up. They are identified by the s flag in show fdb output. If the FDB entry aging time is set to zero, all entries in the database are considered static, non-aging entries. This means that they do not age, but they are still deleted if the switch is reset. Permanent entriesPermanent entries are retained in the database if the switch is reset or a power off/on cycle occurs. Permanent entries must be created by the system administrator through the command line interface. A permanent entry can either be a unicast or multicast MAC address. Permanent entries may be static, meaning they do not age or get updated, or they may be dynamic, meaning that they do age and can be updated via learning. Permanent entries can have QoS profiles associated with the MAC address. A different QoS profiles may be associated with the MAC address when it is a destination address (an egress QoS profile) than when it is a source address (ingress QoS profile). The stand-alone switches can support a maximum of 64 permanent entries, and the modular switches support a maximum of 254 permanent entries. Blackhole entriesA blackhole entry configures the switch to discard packets with a specified MAC address. Blackhole entries are useful as a security measure or in special circumstances where a specific source or destination address must be discarded. Blackhole entries may be created through the CLI, or they may be created by the switch when a ports learning limit has been exceeded. Blackhole entries are treated like permanent entries in the event of a switch reset or power off/on cycle. Blackhole entries are never aged out of the database.
If MAC address learning is disabled, only broadcast traffic, EDP traffic, and packets destined to a permanent MAC address matching that port number, are forwarded. Use this command in a secure environment where access is granted via permanent forwarding databases (FDBs) per port. If you disable MAC address learning, you can enable packet flooding on one or more ports. When flooding is enabled on a particular port, all frames and packets are passed on to other member ports that also have flooding enabled. This includes all broadcast, multicast, known and unknown unicast packets (including EPD). To make effective use of this feature you should have flooding enabled on more than one port. You can enable flooding on specified ports using the following command:
enable flooding ports <portlist>
You can disable flooding on specified ports using the following command:
disable flooding ports <portlist>
Learning and flooding are mutually exclusive. To enable flooding, learning must be disabled. When ports are configured for flooding, the FDB will be flushed for the entire system, which means all the entries in the dynamic FDB must be relearned.
125
This command associates QoS profiles with packets received from or destined for the specified MAC address, while still allowing the FDB entry to be dynamically learned. If you specify only the ingress QoS profile, the egress QoS profile defaults to none, and vice-versa. If both profiles are specified, the source MAC address of an ingress packet and the destination MAC address of an egress packet are examined for QoS profile assignment. The FDB entry is not actually created until the MAC address is encountered as the source MAC address in a packet. Thus, initially the entry may not appear in the show fdb output. Once the entry has been learned, it is created as a permanent dynamic entry, designated by dpm in the flags field of the show fdb output. You can use the show fdb permanent command to display permanent FDB entries, including their QoS profile associations. To associate a QoS profile with a permanent FDB entry, use the following command:
create fdbentry <mac_address> vlan <vlan name> ports [<portlist | all] {qosprofile <qosprofile>} {ingress-qosprofile <iqosprofile>}
This entry will not be aged out, and no learning will occur. If the same MAC address is encountered through a virtual port not specified in the portlist, it will be handled as a blackhole entry. Using the any-mac keyword, you can enable traffic from a QoS VLAN to have higher priority than 802.1p traffic. Normally, an 802.1p packet has a higher priority over the VLAN classification. In order to use this feature, you must create a wildcard permanent FDB entry named any-mac and apply the QoS profile to the individual MAC entry.
126
where the following is true: allSpecifies all of the slots in the chassis. This is available on modular switches only. backplaneSpecifies the backplane of the Alpine chassis. This is available on Alpine switches only. slot numberSpecifies the slot number of the module to scan. This is available on BlackDiamond switches only. msm-aSpecifies the MSM installed in slot A. This is available on BlackDiamond switches only. msm-bSpecifies the MSM installed in slot B. This is available on BlackDiamond switches only.
If you disable FDB scanning for a slot and the system health check is enabled, the slot is still scanned by the system health checker.
The default is 30 seconds. The range is 1 - 60 seconds. If you configure a timer interval of less than 15 seconds, the following warning message is displayed and you are asked to confirm the change:
Setting period below (15) may starve other tasks. Do you wish to do this? (yes, no, cancel) 06/19/2003 10:29.28 <INFO:SYST> serial admin: configure fdb-scan period 1 n
127
NOTE Extreme Networks recommends an interval period of at least 15 seconds. To return the FDB scan interval to the factory default of 30 seconds, use the following command:
unconfigure fdb-scan period
If the switch detects too many failures within the specified scan period, the messages are either sent to the syslog or the configured system health check action is taken. To configure the action the switch takes when too many failures are detected, use the following command:
configure fdb-scan failure-action [log | sys-health-check]
where the following is true: logMessages are sent to the syslog. Only one instance of an error messages is logged at this level. This is the default configuration. sys-health-checkThe configured system health check action is taken. To return the switch to the factory default of sending messages to the syslog, use the following command:
unconfigure fdb-scan failure-action
The following is an example of the type of FDB scan statistics output displayed:
FDB Scan results: CardState NumFail BPLNE : Operational 0 NumScan 64 Entry LastFailTime
The permanent entry has the following characteristics: MAC address is 00:E0:2B:12:34:56. VLAN name is marketing. Slot number for this device is 3. Port number for this device is 4.
128
MAC-Based Security
If the MAC address 00:E0:2B:12:34:56 is encountered on any port/VLAN other than VLAN marketing, port 3:4, it will be handled as a blackhole entry, and packets from that source will be dropped. This example associates the QoS profile qp2 with a dynamic entry for the device at MAC address 00:A0:23:12:34:56 on VLAN net34 that will be learned by the FDB:
create fdbentry 00:A0:23:12:34:56 vlan net34 dynamic qosprofile qp2
This entry has the following characteristics: MAC address is 00:A0:23:12:34:56. VLAN name is net34. The entry will be learned dynamically. QoS profile qp2 will be applied as an egress QoS profile when the entry is learned.
If the aging time is set to zero, all aging entries in the database are defined as static, nonaging entries. This means they will not age out, but non-permanent static entries can be deleted if the switch is reset.
MAC-Based Security
MAC-based security allows you to control the way the FDB is learned and populated. By managing entries in the FDB, you can block, assign priority (queues), and control packet flows on a per-address basis. MAC-based security allows you to limit the number of dynamically-learned MAC addresses allowed per virtual port. You can also lock the FDB entries for a virtual port, so that the current entries will not change, and no additional addresses can be learned on the port. You can also prioritize or stop packet flows based on the source MAC address of the ingress VLAN or the destination MAC address of the egress VLAN. For detailed information about MAC-based security, see Chapter 11.
129
where the following is true: mac_addressDisplays the entry for a particular MAC address. broadcast-macSpecifies the broadcast MAC address. May be used as an alternate to the colon-separated byte form of the address ff:ff:ff:ff:ff:ff permanentDisplays all permanent entries, including the ingress and egress QoS profiles. ports <portlist>Displays the entries for a set of ports or slots and ports. remapDisplays the remapped FDB entries. vlan <vlan name>Displays the entries for a VLAN. With no options, the command displays all FDB entries. See the ExtremeWare Software Command Reference Guide for details of the commands related to the FDB.
130
This chapter covers the following topics: Overview of Policy-Based Quality of Service on page 132 Applications and Types of QoS on page 132 Configuring QoS on page 134 QoS Profiles on page 135 Traffic Groupings on page 136 IP-Based Traffic Groupings on page 136 MAC-Based Traffic Groupings on page 137 Explicit Class of Service (802.1p and DiffServ) Traffic Groupings on page 138 Configuring DiffServ on page 140 Physical and Logical Groupings on page 143 Configuring QoS Traffic Grouping Priorities on page 144 Verifying Configuration and Performance on page 145 Modifying a QoS Configuration on page 146 Bi-Directional Rate Shaping on page 146 Dynamic Link Context System on page 149 Policy-based Quality of Service (QoS) is a feature of ExtremeWare and the Extreme switch architecture that allows you to specify different service levels for traffic traversing the switch. Policy-based QoS is an effective control mechanism for networks that have heterogeneous traffic patterns. Using Policy-based QoS, you can specify the service level that a particular traffic type receives. This chapter does not describe the additional ingress and egress QoS capabilities available on the High Density Gigabit Ethernet 3 series I/O modules. For more information and a full description of the High Density Gigabit Ethernet module, see Chapter 28.
131
NOTE Policy-based QoS has no impact on switch performance. Using even the most complex traffic groupings has no cost in terms of switch performance. Policy-based QoS can be configured to perform per-port Random Early Detection (RED). Using this capability, the switch detects when traffic is filling up in any of the eight hardware queues, and performs a random discard on subsequent packets, based on the configured RED drop-probability. Instead of dropping sessions during times when the queue depth is exceeded, RED causes the switch to lower session throughput. The destination node detects the dropped packet, and, using standard TCP windowing mechanisms, slows the transmission from the source node. RED drop-probability is configured on a system-wide basis, and has a valid range from 0% to 100%.
132
General guidelines for each traffic type are given below and summarized in Table 13. Consider them as general guidelines and not strict recommendations. Once QoS parameters are set, you can monitor the performance of the application to determine if the actual behavior of the applications matches your expectations. It is very important to understand the needs and behavior of the particular applications you wish to protect or limit. Behavioral aspects to consider include bandwidth needs, sensitivity to latency and jitter, and sensitivity and impact of packet loss.
Voice Applications
Voice applications typically demand small amounts of bandwidth. However, the bandwidth must be constant and predictable because voice applications are typically sensitive to latency (inter-packet delay) and jitter (variation in inter-packet delay). The most important QoS parameter to establish for voice applications is minimum bandwidth, followed by priority.
Video Applications
Video applications are similar in needs to voice applications, with the exception that bandwidth requirements are somewhat larger, depending on the encoding. It is important to understand the behavior of the video application being used. For example, in the playback of stored video streams, some applications can transmit large amounts of data for multiple streams in one spike, with the expectation that the end-stations will buffer significant amounts of video-stream data. This can present a problem to the network infrastructure, because it must be capable of buffering the transmitted spikes where there are speed differences (for example, going from Gigabit Ethernet to Fast Ethernet). Key QoS parameters for video applications include minimum bandwidth, priority, and possibly buffering (depending upon the behavior of the application).
133
Configuring QoS
To configure QoS, you define how your switch responds to different categories of traffic by creating and configuring QoS profiles. You then group traffic into categories (according to application, as previously discussed) and assign each category to a QoS profile. Configuring QoS is a three-step process: 1 Configure the QoS profile. QoS profileA class of service that is defined through minimum and maximum bandwidth parameters, configuration of buffering and RED, and prioritization settings. The bandwidth and level of service that a particular type of traffic or traffic grouping receives is determined by assigning it to a QoS profile. 2 Create traffic groupings. Traffic groupingA classification or traffic type that has one or more attributes in common. These can range from a physical port to a VLAN to IP layer 4 port information. You assign traffic groupings to QoS profiles to modify switch forwarding behavior. Traffic groupings transmitting out the same port that are assigned to a particular QoS profile share the assigned bandwidth and prioritization characteristics, and hence share the class of service. 3 Monitor the performance of the application with the QoS monitor to determine whether the policies are meeting the desired results. The next sections describe each of these QoS components in detail.
134
QoS Profiles
QoS Profiles
A QoS profile defines a class of service by specifying traffic behavior attributes, such as bandwidth. The parameters that make up a QoS profile include: Minimum bandwidthThe minimum percentage of total link bandwidth that is reserved for use by a hardware queue on a physical port. Bandwidth unused by the queue can be used by other queues. The minimum bandwidth for all queues should add up to less than 90%. The default value on all minimum bandwidth parameters is 0%. Maximum bandwidthThe maximum percentage of total link bandwidth that can be transmitted by a hardware queue on a physical port. The default value on all maximum bandwidth parameters is 100%. PriorityThe level of priority assigned to a hardware queue on a physical port. There are eight different available priority settings. By default, each of the default QoS profiles is assigned a unique priority. You would use prioritization when two or more hardware queues on the same physical port are contending for transmission on the same physical port, only after their respective bandwidth management parameters have been satisfied. If two hardware queues on the same physical port have the same priority, a round-robin algorithm is used for transmission, depending on the available link bandwidth. When configured to do so, the priority of a QoS profile can determine the 802.1p bits used in the priority field of a transmitted packet (described later). The priority of a QoS profile determines the DiffServ code point value used in an IP packet when the packet is transmitted (described later). BufferThis parameter reserves buffer memory for use exclusively by a QoS profile across all affected ports. The default value for buffer settings is 0%. The sum of all QoS profile buffer parameters should not exceed 100%. The maxbuf parameter allows you to set a maximum buffer size (in Kbytes or Mbytes) for each queue, so that a single queue will not consume all of the un-allocated buffer space. The default buffer size is 256K. You should not modify the buffer parameter unless specific situations and application behavior indicate. A QoS profile does not alter the behavior of the switch until it is assigned to a traffic grouping. Recall that QoS profiles are linked to hardware queues. There are multiple hardware queues per physical port. By default, a QoS profile links to the identical hardware queue across all the physical ports of the switch. The default QoS profiles cannot be deleted. Also by default, a QoS profile maps directly to a specific hardware queue across all physical ports. The settings for the default QoS parameters are summarized in Table 14.
135
Traffic Groupings
Once a QoS profile is modified for bandwidth and priority, you assign traffic a grouping to the profile. A traffic grouping is a classification of traffic that has one or more attributes in common. Traffic is typically grouped based on the applications discussed starting on page 132. Traffic groupings are separated into the following categories for discussion: IP-based information, such as IP source/destination and TCP/UDP port information Destination MAC (MAC QoS groupings) Explicit packet class of service information, such as 802.1p or DiffServ (IP TOS) Physical/logical configuration (physical source port or VLAN association) In the event that a given packet matches two or more grouping criteria, there is a predetermined precedence for which traffic grouping will apply. In general, the more specific traffic grouping takes precedence. By default, all traffic groupings are placed in the QoS profile Qp1. The supported traffic groupings are listed in Table 15. The groupings are listed in order of precedence (highest to lowest). The four types of traffic groupings are described in detail on the following pages.
Destination Address MAC-Based Groupings Permanent Dynamic Blackhole Broadcast/unknown rate limiting
136
Traffic Groupings
IP-based traffic groupings are defined using access lists. Access lists are discussed in detail in Chapter 11. By supplying a named QoS profile at the end of the access list command syntax, you can prescribe the bandwidth management and priority handling for that traffic grouping. This level of packet filtering has no impact on performance.
The MAC address options, defined below, are as follows: Permanent Dynamic Blackhole Broadcast/unknown rate limiting
The QoS profile is assigned when the MAC address is learned. If a clients location moves, the assigned QoS profile moves with the device. If the MAC address entry already exists in the FDB, you can clear the forwarding database so that the QoS profile can be applied when the entry is added again. Use the following command to clear the FDB:
clear fdb
137
For example, if you want to limit broadcast and unknown traffic on the VLAN default to the bandwidth and priority defined in QoS profile qp3, the command is:
create fdbentry ff:ff:ff:ff:ff:ff vlan default dynamic qp3
NOTE IP multicast traffic is subject to broadcast and unknown rate limiting only when IGMP snooping is disabled.
or the command
show qosprofile <qosprofile>
138
Traffic Groupings
802.1p priority
802.1Q VLAN ID
Destination address
Source address
IP packet
CRC
EW_024
139
priority of 7, by default, and egresses the VLAN through the highest queue. If you want to set a different tag (and priority) use the following command to set the priority to a number between 0 and 7:
configure vlan <vlan name> priority <number>
Other traffic transported across the switch and VLAN will not be changed, in other words, the 802.1p values will not be affected by the VLAN priority setting.
802.1p priority information is replaced according to the hardware queue that is used when transmitting from the switch. The mapping is described in Table 17. This mapping cannot be changed. Table 17: Queue to 802.1p Priority Replacement Value
Hardware Queue Q0 Q1 Q2 Q3 Q4 Q5 Q6 Q7 802.1p Priority Replacement Value
0 1 2 3 4 5 6 7
Configuring DiffServ
Contained in the header of every IP packet is a field for IP Type of Service (TOS), now also called the DiffServ field. The TOS field is used by the switch to determine the type of service provided to the packet. Observing DiffServ code points as a traffic grouping mechanism for defining QoS policies and overwriting the Diffserv code point fields are supported. Figure 15 shows the encapsulation of an IP packet header.
140
Traffic Groupings
DiffServ code point 0 Version bits IHL Type-of-service Flags Protocol Source address Destination address Options (+ padding) Data (variable)
EW_023
Identification Time-to-live
Header checksum
141
You can change the QoS profile assignment for all 64 code points using the following command:
configure diffserv examination code-point <code_point> qosprofile <qosprofile> ports [<portlist> | all]
Once assigned, the rest of the switches in the network prioritize the packet using the characteristics specified by the QoS profile.
The default 802.1p priority value to code point mapping is described in Table 19. Table 19: Default 802.1p Priority Value-to-Code Point Mapping
802.1p Priority Hardware Queue value Q0 Q1 Q2 Q3 Q4 Q5 Q6 Q7 0 1 2 3 4 5 6 7 Code Point 0 8 16 24 32 40 48 56
You then change the 802.1p priority to DiffServ code point mapping to any code point value using the following command:
configure diffserv replacement priority <vpri> code_point <code_point> ports [<portlist> | all]
By doing so, the hardware queue used to transmit a packet determines the DiffServ value replaced in the IP packet. To verify the DiffServ configuration, use the following command:
show ports <portlist> info {detail}
142
Traffic Groupings
DiffServ Example
In this example, we use DiffServ to signal a class of service throughput and assign any traffic coming from network 10.1.2.x with a specific DiffServ code point. This allows all other network switches to send and observe the Diffserv code point instead of repeating the same QoS configuration on every network switch. To configure the switch that handles incoming traffic from network 10.1.2.x, follow these steps: 1 Configure parameters of the QoS profile QP3:
configure qp3 min 10 max 100
4 Configure the switch so that other switches can signal class of service that this switch should observe:
enable diffserv examination
Table 14 indicates that qp3 is tied to hardware queue Q2. We also know that when replacement is enabled all traffic sent out Q2 will contain code point value 16 (according to Table 19). If this is the desired code point to use, all traffic from 10.1.2.x will be sent out QP3 (at 10% minimum and 100% maximum) with a code point value of 16.
Source port
A source port traffic grouping implies that any traffic sourced from this physical port uses the indicated QoS profile when the traffic is transmitted out to any other port. To configure a source port traffic grouping, use the following command:
configure ports <portlist> qosprofile <qosprofile>
In the following modular switch example, all traffic sourced from slot 5 port 7 uses the QoS profile named qp3 when being transmitted.
configure ports 5:7 qosprofile qp3
VLAN
A VLAN traffic grouping indicates that all intra-VLAN switched traffic and all routed traffic sourced from the named VLAN uses the indicated QoS profile. To configure a VLAN traffic grouping, use the following command:
configure vlan <vlan name> qosprofile <qosprofile>
143
For example, all devices on VLAN servnet require use of the QoS profile qp4. The command to configure this example is as follows:
configure vlan servnet qosprofile qp4
The same information is also available for ports or VLANs using one of the following commands:
show ports <portlist> info {detail}
or
show vlan
The valid priority values are 0 - 15. The default values are shown in Table 20. Table 20: Traffic Grouping Priority Default Values
QoS Type source-mac dest-mac access-list vlan diffserv dot1p Default Value 7 8 11 1 3 2
QoS types with a greater value take higher precedence. For example, to force FDB source-mac QoS to take a higher precedence over FDB dest-mac QoS, use the commands:
configure qostype priority source-mac 9
where 9 is greater than the default value assigned to the dest-mac QoS type. Traffic groupings based on the source port always have the lowest priority, and all other traffic groupings take priority. You cannot change the priority for source port-based traffic groupings.
144
QoS Monitor
The QOS monitor is a utility that monitors the hardware queues associated with any port(s). The QOS monitor keeps track of the number of frames and the frames per second that a specific queue is responsible for transmitting on a physical port. Two options are available: a real-time display, and a separate option for retrieving information in the background and writing it to the log.
QoS monitor sampling is configured as follows: The port is monitored for 20 seconds before the switch moves on to the next port in the list. A port is sampled for five seconds before the packets per second (pps) value is displayed on the screen.
145
Displayed information includes: QoS profile name Minimum bandwidth Maximum bandwidth Priority A list of all traffic groups to which the QoS profile is applied Additionally, QoS information can be displayed from the traffic grouping perspective by using one or more of the following commands: show fdb permanentDisplays destination MAC entries and their QoS profiles. show switchDisplays information including PACE enable/disable information. show vlanDisplays the QoS profile assignments to the VLAN. show ports <portlist> info {detail}Displays information including QoS information for the port.
146
Bandwidth Settings
You apply bandwidth settings to QoS profiles as a percentage of bandwidth. QoS profile bandwidth settings are in turn applied to queues on physical ports. The impact of the bandwidth setting is determined by the port speed (10, 100, or 1000 Mbps).
147
If you choose a setting not listed in Table 21, the setting is rounded up to the next value.
NOTE Keep the sum of the minimum bandwidth values for the applied QoS profiles less than 90%. If the sum exceeds 90%, a lower priority queue might be unable to transmit in a sustained over-subscription situation.
148
If you choose a setting not listed in Table 22, the setting is rounded up to the next value. If the actual bandwidth used is below the minimum bandwidth, the additional bandwidth is available for other queues on that physical port.
DLCS Guidelines
Follow these guidelines when using DLCS: Only one user is allowed on one workstation at a given time. A user can be logged into many workstations simultaneously. An IP-address can be learned on only one port in the network at a given time. Multiple IP-addresses can be learned on the same port. DLCS mapping is flushed when a user logs in or logs out, or when an end-station is shutdown.
149
DLCS Limitations
Consider the following limitations concerning data received from WINS snooping: DLCS does not work for the WINS server. This is because the WINS server does not send NETBIOS packets on the network (these packets are address to itself). When the IP address of a host is changed, and the host is not immediately rebooted, the old host-to-IP address mapping is never deleted. You must delete the mapping of the host-to-IP address through the Policy Manager. When the host is moved from one port to another port on a switch, the old entry does not age out unless the host is rebooted or a user login operation is performed after the host is moved. DLCS information is dynamic, therefore, if the switch is rebooted, the information is lost. This information is still stored in the policy-server. To delete the information from the policy system, you must explicitly delete configuration parameters from the EEM or EPICenter Policy Applet user interface. As a workaround, you can delete the switch that was rebooted from the list of managed devices in the EEM or EPICenter Inventory Applet, and re-add the switch to the Inventory Manager. DLCS is not supported on hosts that have multiple NIC cards. IPQoS is not supported to a WINS server that is serving more than one VLAN. If you attempt to add a WINS server to serve more than one VLAN, and there are IPQoS rules defined for that server, the command to add the WINS server is rejected.
150
This chapter covers the following topics: Overview on page 151 Internet IP Addressing on page 152 Configuring VLANs for NAT on page 152 Configuring NAT on page 154 Creating NAT Rules on page 154 Displaying NAT Settings on page 156 Disabling NAT on page 157
Overview
NAT is a feature that allows one set of IP addresses, typically private IP addresses, to be converted to another set of IP addresses, typically public Internet IP addresses. This conversion is done transparently by having a NAT device (any Extreme Networks switch using the i chipset) rewrite the source IP address and Layer 4 port of the packets. Figure 16: NAT Overview
Inside
NAT switch
Outside
Private Network
Outgoing
Outgoing
Internet
Incoming
Incoming
EW_078
151
You can configure NAT to conserve IP address space by mapping a large number of inside (private) addresses to a much smaller number of outside (public) addresses. In implementing NAT, you must configure at least two separate VLANs involved. One VLAN is configured as inside, and corresponds to the private IP addresses you would like to translate into other IP addresses. The other type of VLAN is configured as outside, which corresponds to the public (probably Internet) IP addresses you want the inside addresses translated to. The mappings between inside and outside IP addresses are done via rules that specify the IP subnets involved and the algorithms used to translate the addresses.
NOTE The NAT modes in ExtremeWare support translating traffic that initiates only from inside addresses. NAT rules are associated with a single outside VLAN. Multiple rules per outside VLAN are allowed. The rules take effect in the order they are displayed using the show command. Any number of inside VLANs can use a single outside VLAN, assuming that you have created proper rules. Similarly, a single inside VLAN can use any number of different outside VLANs, assuming that the rules and routing are set up properly. Both TCP and UDP have layer 4 port numbers ranging from 1 to 65535. These layer 4 ports, in combination with the IP addresses, form a unique identifier which allows hosts (as well as the NAT switch) to distinguish between separate conversations. NAT operates by replacing the inside IP packets source IP and layer 4 port with an outside IP and layer 4 port. The NAT switch maintains a connection table to map the return packets on the outside VLAN back into their corresponding inside sessions.
Internet IP Addressing
When implementing NAT in an Internet environment, it is strongly recommended that you use one of the reserved private IP address ranges for your inside IP addresses. These ranges have been reserved specifically for networks not directly attached to the Internet. Using IP addresses within these ranges prevents addressing conflicts with public Internet sites to which you want to connect. The ranges are as follows: 10.0.0.0/8Reserved Class A private address space 172.16.0.0/12Reserved Class B private address space 192.168.0.0/16Reserved Class C private address space
When a VLAN is configured to be inside, traffic from that VLAN is translated only if it has a matching NAT rule. Any unmatched traffic will be routed normally and not be translated. Because all traffic runs through the central processing unit (CPU), it cannot run at line-rate.
152
When a VLAN is configured to be outside, it routes all traffic. Because all traffic runs through the CPU, it cannot run at line-rate. Normally, outside traffic will be able to initiate connections to the internal private IP addresses. If you want to prevent this, you can create IP and ICMP access-lists on the outside VLAN ports to deny traffic destined for the inside IP addresses. There is a NAT performance penalty when you do this. When a VLAN is configured to be none, all NAT functions are disabled and the VLAN operates normally. Below is a set of example ACL rules to deny outside traffic. These examples assume the inside network is 192.168.1.0/24 and the outside VLAN is on port 1.
create access-list deny_ip ip destination 192.168.1.0/24 source any deny ports 1 create access-list deny_icmp icmp destination 192.168.1.0/24 source any type any code any deny ports 1
NAT Modes
There are 4 different modes used to determine how the outside IP addresses and layer 4 ports are assigned. Static mapping Dynamic mapping Port-mapping Auto-constraining
Static Mapping
When static mapping is used, each inside IP address uses a single outside IP address. The layer 4 ports are not changed, only the IP address is rewritten. Because this mode requires a 1:1 mapping of internal to external addresses, it does not make efficient use of the external address space. However, it is useful when you have a small number of hosts that need to have their IP addresses rewritten without conflicting with other hosts. Because this mode does not rely on layer 4 ports, ICMP traffic is translated and allowed to pass.
Dynamic Mapping
Dynamic mapping is similar to static mapping in that the layer 4 ports are not rewritten during translation. Dynamic mapping is different in that the number of inside hosts can be greater than the number of outside hosts. The outside IP addresses are allocated on a first-come, first-serve basis to the inside IP addresses. When the last session for a specific inside IP address closes, that outside IP address can be used by other hosts. Since this mode does not rely on layer 4 ports, ICMP traffic is translated and allowed to pass.
Port-mapping
Port-mapping gives you the most efficient use of the external address space. As each new connection is initiated from the inside, the NAT device picks the next available source layer 4 port on the first available outside IP address. When all ports on a given IP address are in use, the NAT device uses ports off of the next outside IP address. Some systems reserve certain port ranges for specific types of traffic, so it is possible to map specific source layer 4 port ranges on the inside to specific outside source ranges. However, this may cause a small performance penalty. In this case, you would need to make several rules using the same inside and outside IP addresses, one for each layer 4 port range. ICMP
153
traffic is not translated in this mode. You must add a dynamic NAT rule for the same IP address range to allow for ICMP traffic.
Auto-constraining
The auto-constraining algorithm for port-mapping limits the number of outside layer 4 ports a single inside host can use simultaneously. The limitation is based on the ratio of inside to outside IP addresses. The outside IP address and layer 4 port space is evenly distributed to all possible inside hosts. This guarantees that no single inside host can prevent other traffic from flowing through the NAT device. Because of the large number of simultaneous requests that can be made from a web browser, it is not recommended that this mode be used when a large number of inside hosts are being translated to a small number of outside IP addresses. ICMP traffic is not translated in this mode. You must add a dynamic NAT rule for the same IP address range to allow for ICMP traffic.
Configuring NAT
The behavior of NAT is determined by the rules you create to translate the IP addresses. You must attach each rule to a specific VLAN. All rules are processed in order. The options specified on the NAT rule determine the algorithm used to translate the inside IP addresses to the outside IP addresses. For outgoing (inside to outside) packets, the first rule to match is processed. All following rules are ignored. All return packets must arrive on the same outside VLAN on which the session went out. For most configurations, make sure that the outside IP addresses specified in the rule are part of the outside VLANs subnet range, so that the switch can proxy the address resolution protocol (ARP) for those addresses. To enable NAT functionality, use the following command:
enable nat
This is the simplest NAT rule. You specify the outside vlan name, and a subnet of inside IP addresses, which get translated to the outside IP address using the specified mode (static in this case). For the outside IP addresses, you can either specify an IP address and netmask or a starting and ending IP range to determine the IP addresses the switch will translate the inside IP addresses to. If the netmask for both the source and NAT addresses is /32, the switch will use static NAT translation. If the netmask for both the source and NAT addresses are not both /32, the switch will use dynamic NAT translation.
154
The addition of an L4 protocol name and the portmap keyword tells the switch to use portmap mode. Optionally, you may specify the range of L4 ports the switch chooses on the translated IP addresses, but there is a performance penalty for doing this. Remember that portmap mode will only translate TCP and/or UDP, so a dynamic NAT rule must be specified after the portmap rule in order to allow ICMP packets through without interfering with the portmapping.
This rule uses auto-constrain NAT. Remember that each inside IP address will be restricted in the number of simultaneous connections. Most installations should use portmap mode.
Auto-Constrain Example
configure nat add out_vlan_3 map source 192.168.3.0/24 to 216.52.8.64/32 both auto-constrain
155
The addition of the destination optional keyword after the source IP address and mask allows the NAT rule to be applied to only packets with a specific destination IP address.
Configuring Time-outs
When an inside host initiates a session, a session table entry is created. Depending on the type of traffic or the current TCP state, the table entries time out after the configured time-out expires.
This command displays the NAT rules for a specific VLAN. Rules are displayed in the order they are processed, starting with the first one. To display NAT traffic statistics, use the following command:
show nat stats
This command displays statistics for the NAT traffic, and includes: The number of rules The number of current connections The number of translated packets on the inside and outside VLANs Information on missed translations
156
Disabling NAT
This command displays the current NAT connection table, including source IP/layer 4 port mappings from inside to outside.
Disabling NAT
To disable NAT, use the following command:
disable nat
157
158
This chapter describes the following topics: Overview on page 159 SLB Components on page 160 SLB Traffic Types on page 163 Forwarding Modes on page 164 Load-Balancing Methods on page 169 Advanced SLB Application Example on page 170 Using Persistence on page 173 Using High Availability System Features on page 176 Health Checking on page 181 Flow Redirection on page 184
Overview
Server load balancing (SLB) transparently distributes client requests among several servers. The main use for SLB is for web hosting (using redundant servers to increase the performance and reliability of busy websites). You can use SLB to manage and balance traffic for client equipment such as web servers, cache servers, routers, and proxy servers. SLB is especially useful for e-commerce sites, Internet service providers, and managers of large intranets. Server load balancing (SLB), longest prefix matching (LPM), and destination-sensitive accounting (DSA) are mutually exclusive functions. None of these functions can be simultaneously enabled.
159
A basic SLB application is shown in Figure 17. Figure 17: Basic SLB application
Clients
Servers
EW_055
All content must be duplicated on all physical servers for server load balancing. To configure SLB, perform the following basic steps: 1 Create pools and configure the load balancing method for each pool. 2 Add nodes to the pools. 3 Create virtual servers and select the forwarding mode for each virtual server. 4 Assign an SLB traffic type to the server and client VLANs. 5 Enable IP forwarding on the server and client VLANs. 6 Enable SLB.
SLB Components
Three components comprise an SLB system: Nodes Pools Virtual servers All three components are required for every SLB configuration.
Nodes
A node is an individual service on a physical server, and consists of an IP address and a port number. All nodes must have identical content. Nodes cannot belong to the same VLAN as the virtual servers they access.
160
SLB Components
Pools
A pool is a group of nodes that are mapped to a corresponding virtual server. You can use pools to easily scale large networks with many nodes. Each pool contains its own load-balancing method. A pool must be associated with a virtual server to be used for load balancing. You must create pools before associating them with virtual servers, and must delete virtual servers before deleting their associated pools. You cannot delete pools that are still associated with a virtual server.
Virtual Servers
Virtual servers are the backbone of the SLB configuration. A virtual server is a virtual IP address that points to a group of servers. The switch then load balances those groups of servers (or other network equipment). Before you configure virtual servers, you need the following: The forwarding mode The name of the pool The virtual IP address The virtual port number Virtual servers cannot belong to the same VLAN as the nodes in the pool they reference. Do not configure a virtual server with the same IP address as a VLAN.
161
Network Advertisement
Three modes are available for controlling network connectivity to virtual servers. The switch will automatically select a method based on the virtual server s subnet. Proxy ARP If the virtual server is a member of an existing subnet to which the switch is directly attached, the switch will respond to ARP requests on behalf of the virtual server. This allows you to implement server load balancing on a layer 2 network. The VLAN containing the servers is in a different subnet than the client VLANs subnet. The virtual server will appear to be a member of the client subnet. Host-Route If the virtual server is not a member of an existing subnet to which the switch is directly attached, the switch will add a host-route entry to the routing table. In this situation, all clients require a routed path (to the virtual server) that points to the switchs IP address on the client VLAN. Subnet-Route If the virtual server is separated from the switch by a router, the switch propagates the subnet containing the virtual server. You must create a loopback VLAN with the virtual server as a member of the loopback VLANs subnet. When you enable the routing protocol to advertise the entire subnet to directly connected routers, a single entry is created in the routing table for each subnet advertised. For example, the following command enables RIP to advertise routes to all directly connected routers with a cost of 1:
enable rip export direct cost 1
When you enable the routing protocol to advertise specific virtual servers, an entry is created in the routing table for each virtual server you advertise. For example, the following command enables OSPF to advertise a specific virtual server with a cost of 1:
enable ospf export vip cost 1
This command exports the virtual servers to the entire network. Extreme Networks recommends this method to advertise virtual servers.
162
Figure 18 illustrates the relationships of these basic components. Figure 18: Basic SLB components
Pool
load balancing method
Virtual Server
forwarding mode
Virtual Server
forwarding mode
Pool
load balancing method
Node Node
Node
Node
Virtual Server
forwarding mode
Node Node
Virtual Server
forwarding mode
Pool
load balancing method
EW_069
163
ServerSpecifies that the VLAN contains nodes, and receives requests for virtual servers. BothSpecifies that the VLAN contains both clients and nodes. Clients in this VLAN can only access virtual servers whose nodes are outside this VLAN. NOTE You must enable IP forwarding on each VLAN involved in SLB. You can assign the same SLB traffic type to as many different VLANs as necessary, up to the number of VLANs supported by the switch.
Forwarding Modes
The forwarding mode is the method the switch uses to forward traffic to the virtual servers. The forwarding mode determines what happens to the packets as they travel through the switch. The switch supports the following forwarding modes: Transparent Translation Port Translation GoGo Table 23 summarizes the features supported by each forwarding mode. Table 23: Forwarding Mode Feature Summary
Transparent Performance Load sharing algorithms Persistence Health checking Translation Port Translation CPU-based in both directions Round-robin, Ratio, Priority, Least Connections IPSA + Mask, IP list Layer 3, 4, and 7 GoGo Hardware-based in both directions Round-robin (hash)
Hardware-based from CPU-based in both server-to-client directions Round-robin, Ratio, Priority, Least Connections IPSA + Mask, IP list Layer 3, 4, and 7 Round-robin, Ratio, Priority, Least Connections IPSA + Mask, IP list Layer 3, 4, and 7
Transparent Mode
In transparent mode, the switch does not modify IP addresses before forwarding traffic to the servers. You must configure all physical servers with the virtual IP address associated with the virtual server. This virtual IP address is the address seen by clients. You must configure the physical servers with this address as a loopback address. Configure the loopback address with the most specific subnet mask that your operating system supports. In transparent mode, you can directly attach servers or have a layer 2 switch between the SLB switch and the servers. You cannot have a router between the SLB switch and the servers. Use transparent mode when you want a balance between features and performance. Figure 19 shows transparent mode.
164
Forwarding Modes
Clients
Servers
192.168.200.1 192.168.200.2
SLB switch Two virtual servers configured VIP addresses: 192.168.201.2 port 80 192.168.201.2 port 443 representing MyWeb.com representing MySSL.com points to pool WebVip points to pool SSLVip
EW_052
In Figure 19, the switch is configured to respond to requests for the virtual server by forwarding them to the load-balanced servers. The servers are configured as follows: The interface for server 1 is 192.168.200.1. The interface for server 2 is 192.168.200.2. The loopback address on the servers is 192.168.201.1 (virtual server). The service is configured to use the appropriate address and port, as specified in the switch configuration. Use the following commands to configure the VLANs and the switch IP addresses and subnets:
create vlan srvr create vlan clnt create vlan vips configure srvr ipaddress 192.168.200.10 /24 configure clnt ipaddress 10.1.1.1 /24 configure vips ipaddress 192.168.201.1 /24 configure srvr add port 29-32 configure client add port 1-4 enable ipforwarding
Use the following commands to create a round-robin pool (MyWeb) and add nodes to the new pool.
create slb pool MyWeb lb-method round configure slb pool MyWeb add 192.168.200.1:80 configure slb pool MyWeb add 192.168.200.2:80
Use the following command to create a transparent mode virtual server for the website and assign MyWeb to it:
create slb vip WebVip pool MyWeb mode transparent 192.168.201.2:80
165
Use the following commands to create a round-robin pool, MySSL and add nodes to the new pool.
create slb pool MySSL lb-method round-robin configure slb pool MySSL add 192.168.200.1:443 configure slb pool MySSL add 192.168.200.2:443
Use the following command to create a transparent mode virtual server for the website and assign MySSL to it.
create slb vip SSLVip pool MySSL mode transparent 192.168.201.2:443
Use the following commands to enable SLB, configure the server VLAN to act as the server side, and configure the client VLAN to act as the client side:
enable slb configure vlan srvr slb-type server configure vlan clnt slb-type client
You must configure a loopback address for each IP address to which the server will respond.
Translation Mode
In translation mode, the switch translates the IP address to that of the server to be balanced. You do not need to configure a loopback address for translation mode. In translation mode, you can directly attach servers or have a layer 2 switch between the SLB switch and the servers. You cannot have a router between the SLB switch and the servers. Use translation mode when you cannot have a loopback address. Figure 20 shows translation mode. Figure 20: Translation Mode
Clients
Servers
192.168.200.1 192.168.200.2
SLB switch 2 virtual servers configured VIP addresses: 192.168.201.2 port 80 192.168.201.2 port 443 representing MyWeb.com representing MySSL.com points to pool WebVip points to pool SSLVip
EW_053
In Figure 20, the switch is configured to respond to requests for the virtual server by translating them and forwarding them to the load balanced servers. No additional server configuration is needed.
166
Forwarding Modes
Use the following commands to configure the VLANs and the switch IP addresses and subnets:
create vlan srvr create vlan clnt create vlan vips configure srvr ipaddress 192.168.200.10 /24 configure clnt ipaddress 10.1.1.1 /24 configure vips ipaddress 192.168.201.1 /24 configure srvr add port 29-32 configure client add port 1-4 enable ipforwarding
Use the following commands to create a round-robin pool, MyWeb, and add nodes to the new pool:
create slb pool MyWeb lb-method round configure slb pool MyWeb add 192.168.200.1:80 configure slb pool MyWeb add 192.168.200.2:80
Use the following command to create a translation mode virtual server for the website and assign MyWeb to it:
create slb vip WebVip pool MyWeb mode translation 192.168.201.2:80
Use the following commands to create a round-robin pool, MySSL, and add nodes to the new pool:
create slb pool MySSL lb-method round configure slb pool MySSL add 192.168.200.1:443 configure slb pool MySSL add 192.168.200.2:443
Use the following command to create a translation mode virtual server for the website and assign MySSL to it:
create slb vip SSLVip pool MySSL mode translation 192.168.201.2:443
Use the following commands to enable SLB, configure the server VLAN to act as the server side, and configure the client VLAN to act as the client side:
enable slb configure vlan srvr slb-type server configure vlan clnt slb-type client
167
GoGo Mode
GoGo mode is a line rate method of server load balancing that forwards traffic without changing packet content. You must directly attach servers to the SLB switch in GoGo mode. The optimal configuration is groups of 2, 4, or 8 servers. Because you must directly attach servers, you do not need to configure nodes, pools, or virtual servers. Instead, you configure all servers with the same MAC and IP addresses. Clients then see the group of servers as a single server, much like port-based load sharing. As in port-based load sharing, the first port in the GoGo mode group is designated the master logical port. Use this port to represent the entire GoGo mode group when configuring health checks or VLAN membership. In GoGo mode, the load balancing method is fixed, based on a hashing of the client IP address. GoGo mode persistence is based on source IP information: a given source address will map to one, and only one, physical server. Use GoGo mode when you require performance without any traffic management features. Figure 21 shows GoGo mode. Figure 21: GoGo mode
Clients
Server 4 192.168.200.2 MAC 00-00-00-CO-FF-EE Server 3 192.168.200.2 MAC 00-00-00-CO-FF-EE
EW_040
In Figure 21, the switch is configured to balance all traffic sent to the virtual server based on the client IP address. The servers are configured as follows: All servers have the same MAC address. All servers have the same IP address. All servers have the same content. To configure the switch as indicated in the example, use the following commands:
create vlan server create vlan client configure server ipaddress 192.168.200.2 /24 configure client ipaddress 1.1.1.1 /24 configure server add port 29-32
168
Load-Balancing Methods
configure client add port 1-4 enable slb gogo 29 grouping 29-32 enable ipforwarding
In this example, port 29 is designated the master port. GoGo mode requires you to place clients and servers into separate VLANs.
Load-Balancing Methods
Load-balancing methods are algorithms that determine which node receives a connection hosted by a particular virtual server. The forwarding mode determines how the switch forwards traffic; the load-balancing method determines where the switch forwards traffic. Individual load-balancing methods take into account dynamic factors such as current connection count. Because each application of SLB is unique, node performance depends on a number of different factors. We recommend that you experiment with different load-balancing methods and choose the one that offers the best performance in your particular environment. The switch supports the following load balancing methods: Round-robin Ratio Least connections Priority
Round-Robin
Round robin passes each new connection request to the next server in line. Because round robin is simple and predictable, it is the default load-balancing method. Use round-robin if the equipment that you are load balancing is roughly equal in processing speed and memory.
Ratio
Ratio distributes connections among servers according to ratio weights that you set. The number of connections that each server receives is proportionate to the ratio weight you defined for each server. Use ratio if the equipment that you are load balancing varies significantly in processing speed and memory. For example, if you have one new, high-speed server and two older servers, you can set the ratio so that the high-speed server receives twice as many connections as either of the two older servers. A ratio of 2 results in twice as much traffic as a ratio of 1. If all nodes use the same weight, connections are distributed equally among the nodes. The default ratio is 1.
169
Least Connections
Least connections method passes a new connection to the node having the least number of active sessions. The number of active sessions includes only those sessions occurring within the same virtual server. Use least connections when the equipment that you are load balancing has similar capabilities. Because least connections requires more processing, it works best with small pools (under 25 nodes) when you require intelligent distribution.
Priority
Priority is a variant of round-robin designed to provide redundant standby nodes within a pool. When you add a node to a pool, you can assign a priority level ranging from 1 - 65535, with a higher number indicating a higher priority. In priority, the switch uses round-robin to distribute traffic among the active nodes with the highest priority. If all nodes at that priority level become inactive or reach a session limit maximum, all new sessions are directed to the nodes at the next lowest priority. The switch monitors the status of the inactive nodes. As each node becomes active, the switch redistributes traffic according to the priorities. For example, in a pool with six nodes divided evenly into two priority levels (2 and 1), all sessions are evenly distributed to the priority 2 nodes. If one of the priority 2 nodes becomes inactive, all traffic is assigned to the remaining priority 2 nodes. If all of the priority 2 nodes become inactive, all sessions are directed to the priority 1 nodes. If one of the level 2 nodes becomes active, all new sessions are assigned to it. Use priority when you want a set of servers held in reserve, as a back-up pool.
170
Clients
"Site1" Round Robin 192.168.201.1 port 80 (MyWeb) Layer 4 health checking 192.168.201.1 port 443 (MySSL) Server2 Server1 192.168.200.3 192.168.200.4
Server pools
"Site3" Round Robin 192.168.201.4 port 80 (MyWeb3) Layer 3 health checking 192.168.201.4 port 443 (MySSL3) Layer 3 health checking
"Site2" Round Robin 192.168.201.3 port 80 (MyWeb2) Layer 7 health checking 192.168.201.3 port 443 (MySSL2)
Server1 192.168.200.7
Server3 192.168.200.9
Server2 192.168.200.8 Server1 Server2 192.168.200.6 192.168.200.5 Server4 192.168.200.10 Server5 192.168.200.11
EW_051
To create the VLAN from which outside connections will come, use the following commands:
create vlan outside configure vlan outside ipaddress 172.16.0.1 /16 configure vlan outside add ports 1-8
All virtual servers will use this subnet. There are no ports associated with this VLAN. Use the following commands to create the VLAN servers and enable IP forwarding:
create vlan servers configure vlan servers ipaddress 192.168.200.254 /24 configure vlan servers add ports 9-16 enable ipforwarding
171
Use the following series of commands to create a web site. The site is defined as having two servers: 192.168.200.1 and 192.168.200.2, each with two services (HTTP and SSL). Two virtual servers point at the appropriate pools. The load-balancing method is round-robin. Both virtual servers use the same IP address; the difference is the port number. Finally, port checking is enabled to ensure fault tolerance on each of the servers.
create slb pool site1web configure slb site1 add 192.168.200.1:80 configure slb site1 add 192.168.200.2:80 create slb pool site1ssl configure slb site1 add 192.168.200.1:443 configure slb site1 add 192.168.200.2:443 create slb vip myweb pool site1web mode transparent 192.168.201.1:80 create slb vip myssl pool site1ssl mode transparent 192.168.201.1:443 enable slb node 192.168.200.1:80 tcp-port-check enable slb node 192.168.200.2:80 tcp-port-check enable slb node 192.168.200.1:443 tcp-port-check enable slb node 192.168.200.2:443 tcp-port-check
Use the following series of commands to create a second web site. This site is similar to the first site, except that content checking is enabled on this site.
create slb pool site2web configure slb site2web add 192.168.200.5:80 configure slb site2web add 192.168.200.6:80 create slb pool site2ssl configure slb site2ssl add 192.168.200.5:443 configure slb site2ssl add 192.168.200.6:443 create slb vip myweb2 pool site2web mode transparent 192.168.201.3:80 create slb vip myssl2 pool site2ssl mode transparent 192.168.201.3:443 enable slb vip myweb2 service-check configure slb vip myweb2 service-check http url /testpage.htm match-string test successful
Use the following series of commands to create a third web site. This example has one pool with a wildcard port. The wildcard port allows any port sent to it by the virtual server. All five servers respond to requests on both port 80 and port 443.
create slb pool site3web configure slb site3web add configure slb site3web add configure slb site3web add configure slb site3web add configure slb site3web add create slb vip myweb3 pool create slb vip myssl3 pool 192.168.200.7:0 192.168.200.8:0 192.168.200.9:0 192.168.200.10:0 192.168.200.11:0 site3web mode transparent 192.168.201.4:80 site3web mode transparent 192.168.201.4:443
172
Using Persistence
Use the following series of commands to create an FTP site. The site has two servers: 192.168.200.3 and 192.168.200.4. The servers provide only FTP service. The two different virtual servers and port numbers refer to the control and data channels used by the FTP service. Two virtual servers point at the appropriate pools. The load-balancing method is round-robin. Layer 7 health checking is enabled for the ftpc virtual server.
create slb pool ftp1c configure slb ftp1c add 192.168.200.3:21 configure slb ftp1c add 192.168.200.4:21 create slb pool ftp1d configure slb ftp1d add 192.168.200.3:20 configure slb ftp1d add 192.168.200.4:20 create slb vip ftpc pool ftp1c mode transparent 192.168.201.2:21 create slb vip ftpd pool ftp1d mode transparent 192.168.201.2:20 enable slb vip ftpc service-check configure slb vip ftpc service-check ftp user test password testpass
Finally, enable SLB and configure the VLANs to be either client or server, using the following commands.
enable slb configure vlan outside slb-type client configure vlan servers slb-type server
Using Persistence
Persistence ensures that subsequent connections from the same client attach to the same server. To configure persistence, you select: persistence method persistence level persistence type Persistence is not affected by the load-balancing method unless you select GoGo mode, where the persistence is fixed, as described on page 168.
Persistence Methods
Persistence methods determine how the persistence table times-out entries. The persistence methods are: Per-session Per-packet
Per-Session Persistence
Per-session persistence creates a persistence entry when the first packet arrives from a client with the time-out value configured for the virtual server. The entry is removed after the time-out period. The entry is not refreshed. Per-session is the default persistence method. Use per-session persistence when you want the smallest impact on performance and you can accurately gauge your total connection time.
173
Per-Packet Persistence
Per-packet persistence creates a persistence entry when the first packet arrives and refreshes that entry each time a new packet arrives. Thus, the entry remains as long as new packets continue to arrive. Use per-packet persistence when you want to sacrifice a small amount of performance in return for a time-out period based on connection idle time instead of total connection time.
Persistence Levels
Persistence levels determine how the persistence entries affect multiple virtual servers. Use persistence levels if you have servers that provide multiple services to a single client (such as, HTTP and SSL). To use persistence levels, your virtual servers must contain the same physical servers. The persistence levels are as follows: Same-VIP-same-port Same-VIP-any-port Any-VIP
Same-VIP-Same-Port Persistence
Same-VIP-same-port matches a new client request to a persistence entry only if the destination is the same virtual server and same port as the original client request. Same-VIP-same-port is the default persistence method. Use same-VIP-same-port persistence to ensure that connections from a client are only persistent on the specific virtual server that is connecting to that client.
Same-VIP-Any-Port Persistence
Same-VIP-any-port persistence directs client requests to the same virtual server even if the port is different. Use same-VIP-any-port persistence to ensure that connections from a client are persistent on the virtual server for all layer 4 services offered on that particular virtual server. For example, if you use HTTP (port 80) to build a shopping cart, then need to use SSL (port 443) for the credit card transaction at the end, use same-VIP-any-port persistence to preserve the client session. If you have virtual servers with the same IP address but a different port, you must configure associated pools with identical nodes that can service requests on either port.
Any-VIP Persistence
Any-VIP persistence directs all connections from a client to the same virtual server regardless of the destination. Use any-VIP persistence to ensure that connections from a client always go to the same server no matter what layer 4 service they connect to. When you use any-VIP persistence, you must ensure that all servers have the same content for all services.
174
Using Persistence
Persistence Types
The switch supports the following types of persistence: Client persistence Proxy client persistence Sticky persistence
Client Persistence
Client persistence provides a persist mask feature. You can define a range of IP addresses that map to a persistent connection. Any client whose source IP address falls within the range is considered a match for the entry. Use client persistence to ensure that transactions, from your defined range of IP addresses, that span multiple TCP sessions are always connected to the same virtual servers. For example, if you assume that a single client uses multiple sessions to fill a shopping cart, you can force all traffic from the same range of IP addresses (which you assume to be the same client) to connect to the same virtual server.
Sticky Persistence
Sticky persistence is available only on wildcard virtual servers and is especially useful for cache servers. Sticky persistence tracks destination IP addresses. When a client attempts to connect to a destination IP address, the switch directs the client to the same cache server previously used for that destination IP address. This helps you reduce the amount of duplicated content on cache servers in your network. Use sticky persistence to provide persistence based on destination IP address. Sticky persistence is especially useful when you load balance caching proxy servers. A caching proxy server intercepts web requests and returns a cached web page (if that page is available). You can improve the efficiency of cache proxy servers by sending similar requests to the same server. Sticky persistence can cache a given web page on one proxy server instead of on every proxy server. This saves the other servers from duplicating the content.
NOTE For additional cache server applications, see Web Cache Redirection on page 185.
175
Clients
Switch 1 (unit 1) 1.10.0.2/16 VIP site1 1.10.1.1 (unit 1) VIP site2 1.10.1.2 (unit 2)
Switch 1 1.205.0.1/16
Single-attached host
testpool Associated VIPs 1.10.1.1 port 80 (site1) 1.10.1.2 port 80 (site2)
1.10.0.1/16
Server1 1.205.1.1/16
Switch 1 (unit 1) 1.10.0.3/16 VIP site1 1.10.1.1 (unit 1) VIP site2 1.10.1.2 (unit 2)
Switch 2 1.206.0.1/16
Server2 1.205.1.2/16
Single-attached host
EW_058
176
To connect the gateway to the VLAN inside, use the following commands:
configure inside ipaddress 1.10.0.2 /16 configure inside add port 31
To configure the servers to connect to the VLAN server on ports 1-4, and configure port 32 to connect to the other ESRP switch, use the following commands:
configure server ipaddress 1.205.0.1 /16 configure server add port 1-4, 32
To enable IP forwarding, create a server pool called testpool, and add four servers to it using TCP port 80, use the following commands:
enable ipforwarding create slb pool testpool configure slb pool testpool configure slb pool testpool configure slb pool testpool configure slb pool testpool
To create SLB virtual server addresses for the two websites (site1 and site2) and associate the server pool testpool with it, use the following commands:
create slb vip site1 pool testpool mode transparent 1.10.1.1:80 create slb vip site2 pool testpool mode transparent 1.10.1.2:80
To enable SLB and configure it for the appropriate VLANs (client connections enter from the VLAN inside), use the following commands:
enable slb configure inside slb client configure server slb server
To enable ESRP on the VLAN server and configure the ESRP direct-attached hosts mode to allow the proper failover of services, use the following commands:
enable esrp server configure esrp port-mode host ports 1-4, 32
the interconnection between the switches is also configured as a host port. To configure SLB to use ESRP, use the following command:
configure slb esrp server add unit 1
177
Note the following about the configurations for the switches running SLB and ESRP: You must configure all switch ports connected directly to the servers as ESRP host ports. You must configure the link between the two switches as an ESRP host port. The configuration uses transparent mode and HTTP services, but can be configured to support any of the currently supported load-balancing protocols. Both switches are configured as unit 1. The SLB and ESRP port configurations are identical on both switches.
Web-Server Configuration
The services must match those configured on the switch; for example, HTTP services configured at TCP port 7080 on the switch require the servers to allow connections at port 7080. You must ensure that the SLB configuration is valid before trying to transfer the configuration to an ESRP/SLB configuration. The two types of ESRP hosts that you can connect to the switches are single-attached hosts and dual-attached hosts. Single-attached hosts provide no server link redundancy, but allow hosts to be connected to the same VLAN as the web servers. Dual-attached hosts allow for redundant NICs in the servers, as well as connections to the switch. When configured as dual-attached hosts, the servers are supported fully by the ESRP redundant gateway services.
NOTE For information on specific NIC card configurations, please contact your NIC vendor.
Active-Active Operation
Active-active operation is a redundant configuration of two switches. If one switch fails, the second switch takes over the SLB function. By preparing a redundant switch for the possibility of failover, you provide reliability and availability. To create an active-active configuration, configure redundant switches with identical SLB configurations, except for the failover parameters. Active-active operation uses a gateway ping-check to determine if the active SLB switch has network connectivity. If the specified IP address is unreachable for a specified duration, the gateway ping-check triggers a failover to the redundant switch. NOTE When you configure the gateway ping check, specify the IP address of a device other than the redundant SLB switch.
178
The remote-ip specifies the IP address of the redundant SLB switch. The local-ip specifies the IP address of the switch you are configuring. You must assign virtual servers with the same virtual IP address to the same unit.
Clients
Switch 1 (unit 1) 1.10.0.2/16 VIP site1 1.10.1.1 (unit 1) VIP site2 1.10.1.2 (unit 2)
1.10.0.1/16
Server pools
testpool Associated VIPs 1.10.1.1 port 80 (site1) 1.10.1.2 port 80 (site2)
Switch 2 (unit 2) 1.10.0.3/16 VIP site1 1.10.1.1 (unit 1) VIP site2 1.10.1.2 (unit 2)
Switch 2 1.206.0.1/16
To configure this example on the first switch, use the following commands:
create vlan inside create vlan server configure vlan inside ipaddress 1.10.0.2 /16 configure vlan inside add port 31
179
configure vlan server ipaddress 1.205.0.1 /16 configure vlan server add port 29-30 enable ipforwarding create slb pool testpool configure slb pool testpool add 1.205.1.1:80 configure slb pool testpool add 1.205.1.2:80 create slb vip site1 pool testpool mode transparent 1.10.1.1:80 create slb vip site2 pool testpool mode transparent 1.10.1.2:80 enable slb configure vlan inside slb-type client configure vlan server slb-type server configure slb failover unit 1 remote 1.10.0.3 local 1.10.0.2:1028 enable slb failover enable slb failover ping configure slb vip site1 unit 1 configure slb vip site2 unit 2 configure slb fail ping-check 1.10.0.1 freq 1
To configure this example on the second switch, use the following commands:
create vlan inside create vlan server configure vlan inside configure vlan inside configure vlan server configure vlan server enable ipforwarding create slb pool testpool configure slb pool testpool add 1.206.1.1:80 configure slb pool testpool add 1.206.1.2:80 create slb vip site1 pool testpool mode transparent 1.10.1.1:80 create slb vip site2 pool testpool mode transparent 1.10.1.2:80 enable slb configure vlan inside slb-type client configure vlan server slb-type server configure slb failover unit 2 remote 1.10.0.2 local 1.10.0.3:1028 enable slb failover enable slb fail ping configure slb vip site1 unit 1 configure slb vip site2 unit 2 configure slb fail ping-check 1.10.0.1 freq 1
ipaddress 1.10.0.3 /16 add port 31 ipaddress 1.206.0.1 /16 add port 29-30
180
Health Checking
The differences between the configurations of these two switches are the IP addresses and the designation of the first switch as unit 1 of the active-active configuration. If you use this configuration with only one virtual server, you have an active switch and a standby switch, because only one switch is actively performing SLB. This configuration is called active-standby.
Health Checking
Health checking allows you to actively poll nodes to determine their health. The switch makes new connections only if the virtual server and node are both enabled and passing health checks. The switch considers a virtual server or node active unless a health check fails. If a health check fails, the switch considers the virtual server or node inactive. A virtual server or node is also considered inactive if it is disabled and has zero active connections. If it is inactive for this reason, the switch stops ping-checks and port-checks on the virtual server or node to conserve system resources. The switch resumes ping checks and port checks when you enable the virtual server or node. The switch does not establish new connections with an inactive node until that node passes all configured health checks. If a health check fails and you have enabled the ign-reset parameter on an associated virtual server, the switch closes all existing connections for the virtual server by sending a TCP reset to the client and node.
181
The switch supports three types of health checking: Ping-check Port-check Service-check The switch also supports 3DNS health checking.
Ping-Check
Ping-check operates at layer 3 and is the default health check. The switch sends an ICMP ping to the configured server or next hop. The default ping frequency is 10 seconds and the default time-out is 30 seconds (three pings). If the node does not respond within 30 seconds, it is considered down. If a server is configured not to respond to ICMP echo requests, the server will be marked down after the first ping check interval. Ping check is the only health check that will accept a wildcard as the IP port.
TCP-Port-Check
TCP-port-check operates at layer 4 and tests the physical node. The default frequency is 30 seconds and the default time-out is 90 seconds. If the node does not respond within 90 seconds, it is considered down. You can use TCP-port-checking to determine if a TCP service, such as httpd, is available. If a TCP-port-check fails, the IP/port combination is considered unavailable.
Service-Check
Service-check operates at layer 7 and is an application-dependent check defined on a virtual server. The switch performs a service-check on each node in the pool. The default frequency is 60 seconds and the default time-out is 180 seconds. Table 24 describes the service-check parameters. Table 24: Service-Check Parameters
Service HTTP FTP Telnet SMTP NNTP POP3 Attribute URL Match-string Userid Password Userid Password Dns-domain Newsgroup Userid Password Global Default Value / Any-content anonymous anonymous anonymous anonymous Same as the switch DNS domain. If no DNS domain is configured for the switch, the value is . ebusiness anonymous anonymous
If you do not specify the service-check parameters, the switch uses the global default values. You can configure the global default values. For HTTP, you can specify both the URL to be retrieved, and a match-string, such as Welcome. If the switch finds the match-string in the first 1000 bytes of the retrieved URL, the service-check passes.
182
Health Checking
A match-string specified as any-content matches any retrieved text. Extreme Networks recommends that you create a text file that contains a single word, such as ok. The FTP, Telnet, and POP3 service-checks establish a connection between the switch and the next hop. Service-check logs on and off using the specified userid and password. For SMTP, service-check identifies the switch by providing the DNS domain you configure. Extreme Networks recommends that you specify a DNS domain that is used only for identification. The NNTP service-check connects to the node, logs in, and attaches to the newsgroup specified. You configure service-checks for each virtual server, and nodes can be members of multiple virtual servers. Therefore, because each node can have multiple service-checks, some service-checks can fail while others pass. So to accept a new connection for a virtual server, a node must have passed the service-check configured for that virtual server. When showing detailed virtual server information, the status for individual nodes is shown with respect to that virtual server.
To see what 3DNS devices are currently communicating with the SLB enabled switch:
show slb 3dns members
The switch responds to directed queries from 3DNS. To direct 3DNS queries to the switch, add a Big/IP device to the 3DNS configuration. Encrypted communications with 3DNS are currently not supported.
Maintenance Mode
You can put a node or virtual server into maintenance mode by disabling the node or virtual server. In maintenance mode, existing connections remain active, but no new connections are permitted. The existing connections are either closed by the client and server or are aged out if idle for more than 600 seconds.
183
Flow Redirection
Flow redirection overrides routing decisions to transparently redirect client requests to a target device (or group of devices). Unlike SLB, you do not duplicate content on the target device(s). Flow redirection traffic must come from an i-series switch running ExtremeWare 6.1 (or later). The switch can only redirect traffic that crosses a VLAN boundary within the switch, because flow redirection operates at layer 3. If the clients and servers belong to the same subnet as the switch, use the proxy ARP feature with minimal configuration changes to clients or servers. Flow redirection automatically includes health checking. You can configure the type of health check, but you cannot disable flow redirection health checking. Flow redirection examines traffic and redirects it based on the following criteria, in order of priority: 1 Destination IP address and mask 2 Layer 4 port 3 Source IP address and mask Multiple flow redirection rules can overlap. In these cases, the most specific redirection rule that satisfies the criteria takes precedence. In general, the following rules apply: If a flow with a better matching mask on an IP address satisfies the content of a packet, that flow will be observed. If one flow redirection rule contains any as a layer 4 protocol and a second flow redirection rule contains explicit layer 4 port information, the second takes precedence if the packet contains matching layer 4 information. If one flow has a better match on source information and a second flow has better match on destination information then the rule with the match on the destination information is selected. For example, in the following 2 cases, the rule with the best match (using the above criteria) is selected. Table 25: Flow rule example A
Rule # A1 A2 Destination IP Address 192.0.0.0/8 192.168.0.0/16 Destination Port 80 ANY Source IP Address ANY ANY Priority Selection 1 2
In example A, rule A1 is the best match as it contains an explicit destination port, even though rule A2 has a more specific destination IP address mask.
184
Flow Redirection
In example B, rule B4 is the best match as it contains an explicit destination port and a better match on the source IP address mask than rule B1.
NOTE Extreme Networks recommends that you use flow redirection and SLB on separate switches; do not use flow redirection and SLB on the same switch. If you must use SLB and flow redirection on the same switch, ensure that no overlapping layer 4 IP ports exist in the configuration. You must prevent logical loops of redirected traffic. You can use flow redirection for the following: Web cache redirection Policy-based routing
NOTE Ensure that the FDB time-out on the switch is higher than the IPARP time-out.
185
Cache servers
1.10.1.1 1.10.1.2 1.10.1.3 1.10.1.4 1.10.1.5 1.10.1.6 1.10.1.7 1.10.1.8
Gateway to clients
1.12.0.1/16
Internet
EW_064
186
Flow Redirection
Policy-Based Routing
Policy based routing is an application of flow redirection that allows you to control routed traffic regardless of the routing protocol configured. For example, you can use policy-based routing to force SNMP traffic to follow a less efficient but more secure path. As with web cache redirection, policy-based routing examines traffic and redirects it based on the following criteria (in order of priority): 1 Destination IP address and mask 2 Layer 4 port 3 Source IP address and mask If the next-hop address is unavailable, the switch routes the traffic normally. You can define several rules; the precedence of rules is determined by the best match of the rule to the packet. If no rule is satisfied, no redirection occurs. If you define multiple next-hop addresses, traffic satisfying the rule is load-shared across the next hop addresses based on destination IP address. If next hop addresses do not respond to ICMP pings, the switch resumes normal routing. Policy-based routing has no impact on switch performance unless you use policy-based routing and SLB on the same switch.
187
188
This chapter describes the following topics: Status Monitoring on page 189 Slot Diagnostics on page 190 Port Statistics on page 192 Port Errors on page 193 Port Monitoring Display Keys on page 194 System Temperature on page 194 System Health Checking on page 195 Setting the System Recovery Level on page 200 Event Management System/Logging on page 200 Configuring and Monitoring Flow Statistics on page 212 RMON on page 221 Viewing statistics on a regular basis allows you to see how well your network is performing. If you keep simple daily records, you will see trends emerging and notice problems arising before they cause major network faults. In this way, statistics can help you get the best out of your network.
Status Monitoring
The status monitoring facility provides information about the switch. This information may be useful for your technical support representative if you have a problem. ExtremeWare includes many show commands that display information about different switch functions and facilities. NOTE For more information about show commands for a specific ExtremeWare feature, see the appropriate chapter in this guide.
189
Slot Diagnostics
The BlackDiamond switch provides a facility for running normal or extended diagnostics on an I/O module or a Management Switch Fabric Module (MSM) without affecting the operation of the rest of the system. If you select to run the diagnostic routine on an I/O module, that module is taken off-line while the diagnostic test is performed. Traffic to and from the ports on the module are temporarily unavailable. Once the diagnostic test is completed, the I/O module is reset and becomes operational again. You can run normal or extended diagnostics on the slave MSM. The normal diagnostic routing is a short series of tests that do not test all the internal Application-Specific Integrated Circuit (ASIC) functions. The extended diagnostic routine tests coverage of all MSM components including the internal ASIC functions. The slave MSM is taken off-line while the diagnostic test is performed. It is reset and operational once the test is completed. If you want the diagnostic routine to run on the master MSM every time the system boots, use the following command:
configure diagnostics on
If you want the diagnostic routine to run one time (rather than with each system boot), use the following command:
run diagnostics [normal | extended] [<slot> | msm-a | msm-b]
where the following is true: normalTakes the switch fabric and ports offline, and performs a simple ASIC and packet loopback test on all ports. The test is completed in 30 seconds. CPU and out-of-band management ports are not tested in this mode. As a result, console and Telnet access from the management port is available during this routine. extendedTakes the switch fabric and ports offline, and performs extensive ASIC, ASIC-memory, and packet loopback tests. Extended diagnostic tests take a maximum of 15 minutes. The CPU is not tested. Console access is available during extended diagnostics. <slot>Specifies the slot number of an I/O module. Once the diagnostics test is complete, the system attempts to bring the I/O module back online. This parameter is applicable to the BlackDiamond switch, only. msm-a | msm-bSpecifies the slot letter of an MSM64i. If the master MSM is specified, the diagnostic routine is performed when the system reboots. Both switch fabric and management ports are taken offline during diagnostics. This parameter is applicable to the BlackDiamond switch, only.
190
Slot Diagnostics
Use the normal option when you want a fast (30 60 seconds) hardware status check. Use the extended option when you want a more thorough test. The extended option requires significantly more time to complete, depending on the number of ports on the blade. You can also execute packet memory scanning for all packet memory associated with the specified I/O slot on a BlackDiamond 6804, 6808, or 6816 switches, using the following command:
run diagnostics packet-memory slot <slot number>
The packet memory diagnostic scans the specified blade to detect single bit-related memory defects and their associated buffer locations. If packet memory defects are detected, their locations are recorded in the blades EEPROM. Up to eight occurrences can be recorded. If a defect was found during the scan process, the card is reset, the defective buffer is mapped out from further use, and the I/O card is returned to the operational state. If more than eight defects are detected, or if the defects cannot be mapped out, the card is treated as a failed card and left offline. The card should then be returned through the RMA process with Extreme Networks Technical Support.
NOTE Only run extended or packet-memory diagnostics when the switch can be brought off-line. The tests conducted during these diagnostics are extensive and can affect traffic that must be processed by the system CPU. To view results of the normal or extended diagnostics test, use the following command:
show diagnostics
To view the results of a packet memory scan, use the following command:
show diagnostics packet-memory slot <slot number>
where the following is true: offlineSpecifies that a module is taken offline and kept offline if one of the following occurs: More than eight defects are detected. Three consecutive checksum error were detected by the health checker, but no new defects were found by the memory scanning and mapping process. After defects were detected and mapped out, the same checksum errors are again detected by the system health checker. onlineSpecifies that a faulty module is kept online, regardless of how many errors are detected. msm-aSpecifies the MSM module installed in slot A.
191
msm-bSpecifies the MSM module installed in slot B. slot numberSpecifies a module installed in a slot. This command overrides the system health check auto-recovery setting. If you have the system health check alarm level configured, the individual packet memory scanning configuration is ignored. See System Health Checking on page 195 for more information about the system health checker. To disable packet memory scanning and to return to the system health check configured behavior, use the following command:
unconfigure packet-mem-scan-recovery-mode slot [msm-a | msm-b | <slot number>]
To view the recovery mode configuration for slots that have packet memory scanning enabled, use the following command:
show packet-mem-scan-recovery-mode
Where the following information is displayed: Global settings for the system health check Auto-recovery settings for slots that have packet memory scanning enabled The following is sample output from this command:
Global sys-health-check online setting slot 3: AUTORECOVERY MODE is OFFLINE MSM-B: AUTORECOVERY MODE is ONLINE is ONLINE
# NOTE Global setting is always online for sys-health-check alarm-level configurations. It is only offline when "sys-health-check auto-recovery <#> offline" is configured.
Port Statistics
ExtremeWare provides a facility for viewing port statistic information. The summary information lists values for the current counter against each port on each operational module in the system, and it is refreshed approximately every 2 seconds. Values are displayed to nine digits of accuracy. To view port statistics, use the following command:
show ports <portlist> stats
The following port statistic information is collected by the switch: Link StatusThe current status of the link. Options are: Ready (the port is ready to accept a link). Active (the link is present at this port). Chassis (the link is connected to a Summit Virtual Chassis). Transmitted Packet Count (Tx Pkt Count)The number of packets that have been successfully transmitted by the port.
192
Port Errors
Transmitted Byte Count (Tx Byte Count)The total number of data bytes successfully transmitted by the port. Received Packet Count (Rx Pkt Count)The total number of good packets that have been received by the port. Received Byte Count (RX Byte Count)The total number of bytes that were received by the port, including bad or lost frames. This number includes bytes contained in the Frame Check Sequence (FCS), but excludes bytes in the preamble. Received Broadcast (RX Bcast)The total number of frames received by the port that are addressed to a broadcast address. Received Multicast (RX Mcast)The total number of frames received by the port that are addressed to a multicast address.
Port Errors
The switch keeps track of errors for each port. To view port transmit errors, use the following command:
show ports <portlist> txerrors
The following port transmit error information is collected by the system: Port Number Link StatusThe current status of the link. Options are: Ready (the port is ready to accept a link). Active (the link is present at this port). Transmit Collisions (TX Coll)The total number of collisions seen by the port, regardless of whether a device connected to the port participated in any of the collisions. Transmit Late Collisions (TX Late Coll)The total number of collisions that have occurred after the ports transmit window has expired. Transmit Deferred Frames (TX Deferred)The total number of frames that were transmitted by the port after the first transmission attempt was deferred by other network traffic. Transmit Errored Frames (TX Error)The total number of frames that were not completely transmitted by the port because of network errors (such as late collisions or excessive collisions). Transmit Parity Frames (TX Parity)The bit summation has a parity mismatch. To view port receive errors, use the following command:
show ports <portlist> rxerrors
The following port receive error information is collected by the switch: Receive Bad CRC Frames (RX CRC)The total number of frames received by the port that were of the correct length, but contained a bad FCS value. Receive Oversize Frames (RX Over)The total number of good frames received by the port greater than the supported maximum length of 1,522 bytes. For products that use the i chipset, ports with jumbo frames enabled do not increment this counter. Receive Undersize Frames (RX Under)The total number of frames received by the port that were less than 64 bytes long.
193
Receive Fragmented Frames (RX Frag)The total number of frames received by the port were of incorrect length and contained a bad FCS value. Receive Jabber Frames (RX Jab)The total number of frames received by the port that was of greater than the support maximum length and had a Cyclic Redundancy Check (CRC) error. Receive Alignment Errors (RX Align)The total number of frames received by the port that occurs if a frame has a CRC error and does not contain an integral number of octets. Receive Frames Lost (RX Lost)The total number of frames received by the port that were lost because of buffer overflow in the switch.
System Temperature
You can record the system temperature in celsius for the BlackDiamond and Alpine systems to the syslog. The temperature is recorded every hour. To record the temperature, use the following command:
enable temperature-logging
By default, the system temperature is not recorded to the syslog. After you enable the temperature logging feature, you can view the temperature of the system. To view the temperature, use the following command:
show log
The following is sample temperature output from the show log command:
06/12/2003 19:50:59.00 <Info:ELRP> Current temperature reading [197] is 49C. 06/12/2003 18:50:59.00 <Info:ELRP> Current temperature reading [196] is 48C.
194
If you already enabled temperature logging, and you want to view the current temperature of the system, do the following: 1 Disable the temperature logging feature using the following command:
disable temperature-logging
To configure the switch to respond to a failed health check based on an alarm-level, use the following command:
configure sys-health-check alarm-level [card-down | default | log | system-down | traps]
This command provides the following options: card-downPosts a CRIT message to the log, sends a trap, and turns off the module. logPosts a CRIT message to the log. system-downPosts a CRIT message to the log, sends a trap, and turns off the system. trapsPosts a CRIT message to the log and sends a trap. The default option is log. To configure the switch for auto-recovery, use the following command:
configure sys-health-check auto-recovery <number of tries>
195
The auto-recovery option is used to configure the number of times the system health checker attempts to automatically reset a faulty module and bring it online. If the module continues to fail more than the configured number of attempts, the system health checker sets the module to card-down. When auto-recovery is configured, the occurrence of three consecutive checksum errors will cause a packet memory (PM) defect detection program to be run against the I/O module. Checksum errors can include internal and external MAC port parity errors, EDP checksum errors, and CPU packet or diagnostic packet checksum errors. If defects are detected, the card is taken offline, the memory defect information is recorded in the card EEPROM, the defective buffer is mapped out of further use, and the card is returned to operational state. A maximum of 8 defects can be stored in the EEPROM. After the PM defect detection and mapping process has been run, a card is considered failed and is taken offline in the following circumstances: More than eight defects are detected. Three consecutive checksum errors were detected by the health checker, but no new PM defects were found by the PM defect detection process. After defects were detected and mapped out, the same checksum errors are again detected by the system health checker. The auto-recovery repetition value is ignored in these cases. In any of these cases, please contact Extreme Technical Support. To view the status of the system health checker, use the following command:
show diagnostics
To clear the questionable and remapped entries, use the following command:
clear fdb remap
196
To enable the transceiver test on a BlackDiamond switch, use the following command:
enable transceiver-test [all | slot {<slot number> | msm-a | msm-b}]
where the following is true: allSpecifies all of the slots in the chassis. backplaneSpecifies the backplane of the Alpine chassis. This is available on Alpine switches only. slot numberSpecifies the slot number of the module to scan. msm-aSpecifies the MSM installed in slot A. This is available on BlackDiamond switches only. msm-bSpecifies the MSM installed in slot B. This is available on BlackDiamond switches only. To determine if you have the transceiver test enabled and the failure action the switch takes, use the show switch command. The following is sample transceiver test output:
Transceiver Diag: Enabled. Failure action: log only
To disable the transceiver test on a BlackDiamond switch, use the following command:
disable transceiver-test [all | slot <slot number> | msm-a | msm-b]
197
Configuring the Test Period. To configure how often to run the transceiver test, use the following command:
configure transceiver-test period <period <1-60>>
where the: Default is 12 seconds Range is 1 - 60 seconds To return the transceiver test period to the factory default of 12 seconds, use the following command:
unconfigure transceiver-test period
Configuring the Test Threshold. To configure how many errors the switch accepts before an action is taken, use the following command:
configure transceiver-test threshold <1-8>
where the: Default is 3 errors Range is 1 - 8 errors To return the transceiver test threshold to the factory default of 3 errors, use the following command:
unconfigure transceiver-test threshold
Configuring the Test Window. To configure the number of 20-second windows within which the configured number of errors can occur, use the following command:
configure transceiver-test window <1-8>
where the: Default is 8 windows Range is 1 - 8 windows This configuration provides a sliding window. If you keep the window configuration at 8, the switch checks for errors within the last eight 20-second windows. To return the transceiver test window to the factory default of 8, use the following command:
unconfigure transceiver-test window
Configuring the Test Failure Action. If the switch detects too many failures within the specified window, the messages are either sent to the syslog or the configured system health check action is taken. To configure the action the switch takes when too many failures are detected, use the following command:
configure transceiver-test failure-action [log | sys-health-check]
198
where the following is true: logMessages are sent to the syslog. Only one instance of an error messages is logged at this level. This is the default. sys-health-checkThe configured system health check action is taken. To return the switch to the default mode of sending messages to the syslog, use the following command:
unconfigure transceiver-test failure-action
For more information about these and other transceiver test commands, see the Extreme Networks Command Reference Guide.
In addition to other switch diagnostics, you can view the following transceiver statistics: Slot number or backplane Cardtype (if no module is installed in the slot, the card type is unknown) Cardstate Test Pass Fail Time of the last failure The following is an example of the type of transceiver statistics output displayed:
Transceiver system health diag result Pass/Fail Counters Are in HEX Slot Cardtype Cardstate Test Pass Fail Time_last_fail ----------- ------------------- -------- -------------slot 1 Unknown slot 2 WM4T1 Operational MAC 7d456 0 slot 3 FM8V Operational MAC 7d456 0 slot 4 GM4X Operational MAC 7d456 0 BPLNE SMMI Operational UART 7d454 0 BPLNE SMMI Operational FLASH 7d454 0 BPLNE SMMI Operational SRAM 7d454 0 BPLNE SMMI Operational NVRAM 7d454 0 BPLNE SMMI Operational ENET 7d454 0 BPLNE Basbrd Operational QUAKE 7d454 0 BPLNE Basbrd Operational TWISTER 7d454 0
199
Where the following is true: noneConfigures the level to no recovery. allConfigures ExtremeWare to log an error into the syslog and automatically reboot the system after any task exception. criticalConfigures ExtremeWare to log an error into the syslog and automatically reboot the system after a critical task exception. The default setting is none.
200
console display current session (telnet or console display) memory buffer (can contain 200-20,000 messages) NVRAM (messages remain after reboot) syslog host The first four types of targets exist by default, but before enabling any syslog host, the hosts information needs to be added to the switch using the configure syslog command. Extreme Networks EPICenter can be a syslog target. By default, the memory buffer and NVRAM targets are already enabled and receive messages. To start sending messages to the targets, use the following command:
enable log target [console-display | memory-buffer | nvram | session | syslog [<host name/ip> {:<udp-port>} [local0 ... local7]]]
Once enabled, the target receives the messages it is configured for. See the section Target Configuration for information on viewing the current configuration of a target. The memory buffer can only contain the configured number of messages, so the oldest message is lost when a new message arrives, and the buffer is full. Use the following command to stop sending messages to the target:
disable log target [console-display | memory-buffer | nvram | session | syslog [<host name/ip> {:<udp-port>} [local0 ... local7]]]
NOTE Refer to your UNIX documentation for more information about the syslog host facility.
Target Configuration
To specify the messages to send to a enabled target, you will set a message severity level, a filter name, and a match expression. These items determine which messages are sent to the target. You can also configure the format of the messages in the targets. Each target has a default configuration that mimics the expected behavior of prior ExtremeWare releases. For example, the console display target is configured to get messages of severity info and greater, the NVRAM target gets messages of severity warning and greater, and the memory buffer target gets messages of severity debug-data and greater. All the targets are associated by default with a filter named DefaultFilter, that passes all events at or above the default severity threshold, like the behavior of earlier releases (the earlier releases had no filters). All the targets are also associated with a default match expression that matches any messages (the expression that matches any message is displayed as Match : (none) from the command line). And finally, each target has a format associated with it. To display the current log configuration of the targets, use the following command:
show log configuration target {console-display | memory-buffer | nvram | session | syslog <host name/ip> {: <udp-port>}[local0 ... local7]}
201
To configure a target, there are specific commands for filters, formats, and severity that are discussed in the following sections.
Severity
Messages are issued with one of the severity level specified by the standard BSD syslog values (RFC 3164), critical, error, warning, notice, and info, plus three severity levels for extended debugging, debug-summary, debug-verbose, and debug-data. Note that RFC 3164 syslog values emergency and alert are not needed since critical is the most severe event in the system. The three severity levels for extended debugging, debug-summary, debug-verbose, and debug-data, require that debug mode be enabled (which may cause a performance degradation). See the section Displaying Debug Information for more information about debugging. Table 28: Severity Levels Assigned by the Switch1
Level Critical Description A serious problem has been detected which is compromising the operation of the system and that the system can not function as expected unless the situation is remedied. The switch may need to be reset. A problem has been detected which is interfering with the normal operation of the system and that the system is not functioning as expected. An abnormal condition, not interfering with the normal operation of the system, has been detected which may indicate that the system or the network in general may not be functioning as expected. A normal but significant condition has been detected, which signals that the system is functioning as expected. A normal but potentially interesting condition has been detected, which signals that the system is functioning as expected and simply provides potentially detailed information or confirmation. A condition has been detected that may interest a developer determining the reason underlying some system behavior. A condition has been detected that may interest a developer analyzing some system behavior at a more verbose level than provided by the debug summary information. A condition has been detected that may interest a developer inspecting the data underlying some system behavior.
Error Warning
1. In ExtremeWare version 7.1.0, the levels alert and emergency were deprecated. The equivalent level is critical.
To configure the severity level of the messages sent to a target, there is more than one command that you can use. The most direct way to set the severity level of all the sent messages is to use the following command: configure log target [console-display | memory-buffer | nvram | session | syslog [<host name/ip> {: <udp-port>} [local0 ... local7]]] {severity <severity> {only}} When you specify a severity level, messages of that severity and greater will be sent to the target. If you want only messages of the specified severity to be sent to the target, use the keyword only. For example, specifying severity warning will send warning, error, and critical messages, but specifying severity warning only will just send warning messages. Another command that can be used to configure severity levels is the command used to associate a filter with a target:
202
configure log target [console-display | memory-buffer | nvram | session | syslog [<host name/ip> {: <udp-port>} [local0 ... local7]]] filter <filter name> {severity <severity> {only}} When you specify a severity level as you associate a filter with a target, you further restrict the messages reaching the target. The filter may only allow certain categories of messages to pass. Only the messages that pass the filter, and then pass the specified severity level will reach the target. Finally, you can specify the severity levels of messages that reach the target by associating a filter with a target. The filter can specify exactly which message it will pass. Constructing a filter is discussed in the section Filtering By Components and Conditions.
In the display above is listed the component, the subcomponents that make up that component, and the default severity threshold assigned to that component. A period (.) is used to separate component, subcomponent, and condition names in EMS. For example, you can refer to the InBPDU subcomponent of the STP component as STP.InBPDU. On the CLI, you can abbreviate or TAB complete any of these. A component or subcomponent will often have several conditions associated with it. To see the conditions associated with a component, use the following command:
show log events {<event condition> | [all | <event component>] {severity <severity> {only}}} {detail}
For example, to see the conditions associated with the STP.InBPDU subcomponent, use the following command:
show log events stp.inbpdu
203
STP
In the display above is listed the four conditions contained in the STP.InBPDU component, the severity of the condition, and the number of parameters in the event message. In this example, the severities of the events in the STP.InBPDU subcomponent range from error to debug-summary. When you use the detail keyword you will see the message text associated with the conditions. For example, if you want to see the message text and the parameters for the event condition STP.InBPDU.Trace, use the following command:
show log events stp.inbpdu.trace detail
The Comp heading shows the component name, the SubComp heading shows the subcomponent (if any), the Condition heading shows the event condition, the Severity heading shows the severity assigned to this condition, the Parameters heading shows the parameters for the condition, and the text string shows the message that the condition will generate. The parameters in the text string (for example, %0% and %1% above) will be replaced by the values of these parameters when the condition is encountered, and output as the event message. Filtering By Components and Conditions. You may want to send the messages that come from a specific component that makes up ExtremeWare, or send the message generated by a specific condition. For example, you might want to send only the messages that come from the STP component, or send the message that occurs when the IP.Forwarding.SlowPathDrop condition occurs. Or you may want to exclude messages from a particular component or event. To do this, you will construct a filter that passes only the items of interest, and associate that filter with a target. The first step is to create the filter using the create log filter command. You can create a filter from scratch, or copy another filter to use as a starting point. It may be easiest to copy an existing filter and modify it. Use the following command to create a filter:
create log filter <name> {copy <filter name>}
If you create a filter from scratch, it will initially block all events until you add events (either the events from a component or a specific event condition) to pass. You might create a filter from scratch if you wanted to pass a small set of events, and block most. If you want to exclude a small set of events, there is a default filter that passes events at or above the default severity threshold (unless the filter has been modified), named DefaultFilter, that you can copy to use as a starting point for your filter. Once you have created your filter, you can then configure filter items that include or exclude events from the filter. Included events are passed, excluded events are blocked. Use the following command to configure your filter:
configure log filter <filter name> [add | delete] {exclude} events [<event condition> | [all | <event component>] {severity <severity> {only}}]
204
For example, if you create the filter myFilter from scratch, then issue the following command:
configure log filter myFilter add events stp
all STP events will pass myFilter of at least the default threshold severity (for the STP component, the default severity threshold is error). You can further modify this filter by specifying additional conditions. For example, assume that myFilter is configured as before, and assume that you want to exclude any events from the STP subcomponent, STP.OutBPDU. Use the following command to add that condition:
configure log filter myFilter add exclude events stp.outbpdu
You can continue to modify this filter by adding more filter items. The filters process events by comparing the event with the most recently configured filter item first. If the event matches this filter item, the incident is either included or excluded, depending on whether the exclude keyword was used. Subsequent filter items on the list are compared if necessary. If the list of filter items has been exhausted with no match, the event is excluded, and is blocked by the filter. To examine the configuration of a filter, use the following command:
show log configuration filter {<filter name>}
The output produced by the command (for the earlier filter) is similar to the following:
Log Filter I/ E Comp - ------E STP I STP Name : myFilter SubComp ----------OutBPDU * Condition ----------------------* * Severity CEWNISVD -------CEWNI+++ ********
Include/Exclude: (I) Include, (E) Exclude Severity Values: (C) Critical, (E) Error, (W) Warning, (N) Notice, (I) Info (*) Pre-assigned severities in effect for each subcomponent Debug Severity : (S) Debug-Summary, (V) Debug-Verbose, (D) Debug-Data (+) Debug Severity requested, but log debug-mode not enabled If Match parameters present: Parameter Flags: (S) Source, (D) Destination (as applicable) (I) Ingress, (E) Egress, (B) BGP Parameter Types: Port - Physical Port list, Slot - Physical Slot # MAC - MAC address, IP - IP Address/netmask, Mask - Netmask VID - Virtual LAN ID (tag), VLAN - Virtual LAN name L4 - Layer-4 Port #, Num - Number, Str - String Nbr - Neighbor, Rtr - Routerid, EAPS - EAPS Domain Strict Match : (Y) every match parameter entered must be present in the event (N) match parameters need not be present in the event
The show log configuration filter command shows each filter item, in the order that it will be applied and whether it will be included or excluded. The above output shows the two filter items, one excluding events from the STP.OutBPDU component, the next including the remaining events from the STP component. The severity value is shown as *, indicating that the components default severity threshold controls which messages are passed. The Parameter(s) heading is empty for this filter, since no match was configured for this filter. Matches are discussed in the section, Matching Expressions. Each time a filter item is added to or deleted from a given filter, the events specified are compared against the current configuration of the filter to try to logically simplify the configuration. Existing items
205
will be replaced by logically simpler items if the new item enables rewriting the filter. If the new item is already included or excluded from the currently configured filter, the new item is not added to the filter.
Matching Expressions
You can specify that messages that reach the target match a specified match expression. The message text is compared with the match expression to determine whether to pass the message on. To require that messages match a match expression, is to use the following command: configure log target [console-display | memory-buffer | nvram | session | syslog [<host name/ip> {: <udp-port>} [local0 ... local7]]] match [any |<match-expression>] The messages reaching the target will match the match-expression, a simple regular expression. The formatted text string that makes up the message is compared with the match expression, and is passed to the target if it matches. This command does not affect the filter in place for the target, so the match expression is only compared with the messages that have already passed the targets filter. For more information on controlling the format of the messages, see the section, Formatting Event Messages. Simple Regular Expressions. A simple regular expression is a string of single characters including the dot character (.), which are optionally combined with quantifiers and constraints. A dot matches any single character while other characters match only themselves (case is significant). Quantifiers include the star character (*) that matches zero or more occurrences of the immediately preceding token. Constraints include the caret character (^) that matches at the beginning of a message, and the currency character ($) that matches at the end of a message. Bracket expressions are not supported. There are a number of sources available on the Internet and in various language references describing the operation of regular expressions. Table 29 shows some examples of regular expressions.
..ar
port.*vlan
myvlan$
Matching Parameters
Rather than using a text match, ExtremeWares EMS allows you to filter more efficiently based on the message parameter values. In addition to event components and conditions and severity levels, each filter item can also use parameter values to further limit which messages are passed or blocked. The process of creating, configuring, and using filters has already been described in the section, Filtering By Components and Conditions, so this section will discuss matching parameters with a filter item. To configure a parameter match filter item, use the following command:
206
configure log filter <filter name> [add | delete] {exclude} events [<event condition> | [all | <event component>] {severity <severity> {only}}] [match | strict-match] <type> <value> {and <type> <value> ...} Each event in ExtremeWare is defined with a message format and zero or more parameter types. The show log events detail command can be used to display event definitions (the event text and parameter types). Only those parameter types that are applicable given the events and severity specified are exposed on the CLI. The syntax for the parameter types (represented by <type> in the command syntax above) is:
[bgp [neighbor | routerid] <ip address> | eaps <eaps domain name> | {destination | source} [ipaddress <ip address> | L4-port <L4-port>| mac-address <mac-address>] | {egress | ingress} [slot <slot number> | ports <portlist>] | netmask <netmask> | number <number> | string <match expression> | vlan <vlan name> | vlan tag <vlan tag>]
The <value> depends on the parameter type specified. As an example, an event may contain a physical port number, a source MAC address, and a destination MAC address. To allow only those Bridging incidents, of severity notice and above, with a specific source MAC address, use the following command:
configure log filter myFilter add events bridge severity notice match source mac-address 00:01:30:23:C1:00
The string type is used to match a specific string value of an event parameter, such as a user name. A string can be specified as a simple regular expression. Use the and keyword to specify multiple parameter type/value pairs that must match those in the incident. For example, to allow only those events with specific source and destination MAC addresses, use the following command:
configure log filter myFilter add events bridge severity notice match source mac-address 00:01:30:23:C1:00 and destination mac-address 01:80:C2:00:00:02
Match Versus Strict-Match. The match and strict-match keywords control the filter behavior for incidents whose event definition does not contain all the parameters specified in a configure log filter events match command. This is best explained with an example. Suppose an event in the XYZ component, named XYZ.event5, contains a physical port number, a source MAC address, but no destination MAC address. If you configure a filter to match a source MAC address and a destination MAC address, XYZ.event5 will match the filter when the source MAC address matches regardless of the destination MAC address, since the event contains no destination MAC address. If you specify the strict-match keyword, then the filter will never match event XYZ.event5, since this event does not contain the destination MAC address. In other words, if the match keyword is specified, an incident will pass a filter so long as all parameter values in the incident match those in the match criteria, but all parameter types in the match criteria need not be present in the event definition.
207
If you set the current session format using the following command:
configure log target session format date mm-dd-yyy timestamp seconds event-name component
In order to provide some detailed information to technical support, you set the current session format using the following command:
configure log target session format date mmm-dd timestamp hundredths event-name condition source-line on process-name on
This setting may be saved to the FLASH configuration and will be restored on boot up (to the console-display session). To turn on log display for the current session:
208
This setting only affects the current session, and is lost when you log off the session. The messages that are displayed depend on the configuration and format of the target. See the section, Filtering Events Sent to Targets, for information on message filtering, and the section, Formatting Event Messages, for information on message formatting.
209
Two counters are displayed. One counter displays the number of times an event has occurred, and the other displays the number of times that notification for the event was made to the system for further processing. Both counters reflect totals accumulated since reboot or since the counters were cleared using the clear log counters or clear counters command. This command also displays an included count (the column titled In in the output). The reference count is the number of enabled targets receiving notifications of this event without regard to matching parameters. The keywords included, notified, and occurred only display events with non-zero counter values for the corresponding counter. Output of the command:
show log counters stp.inbpdu severity debug-summary
210
Once debug mode is enabled, any filters configured for your targets will still affect which messages are passed on or blocked.
NOTE Previous versions of ExtremeWare used the debug-trace command to enable debugging. Not all systems in ExtremeWare were converted to use EMS in the initial release. As a result, some debug information still requires you to use the corresponding debug-trace command. The show log component command displays the systems in your image that are part of EMS. Any systems in EMS will not have debug-trace commands, and vice-versa
Note that the existing command enable log display applies only to the serial port console. Since the ability to display log messages on other sessions was added, the target name session was chosen. For clarity, the target name console-display was chosen to refer to the serial port console, previously referred to as simply display.
is equivalent to:
configure log target console-display severity <severity>
211
configure syslog add <hostname/IP> {: <udp-port>} [local0 ... local7] configure log target syslog <hostname/IP> {: <udp-port>} [local0 ... local7] severity <severity>
NOTE Refer to your UNIX documentation for more information about the syslog host facility.
212
Flow records are grouped together into UDP datagrams for export to a flow-collector device. A NetFlow Version 1 export datagram can contain up to 25 flow records. Figure 26 shows the format of the export datagram; Table 31 describes the export datagram header. Figure 26: Format of NetFlow export datagram
octets
16 Header
48 Flow record 1
48 Flow record 2 . . .
48 Flow record 25
EW_086
213
The IP addresses (or host names) and UDP port numbers of the available flow collectors can be configured on a per-switch basis. The flow collection architecture example in Figure 27 illustrates how multiple BlackDiamond switches might export flow records to flow-collector devices that, in turn, feed records into a central collector-server. Other flow-collector architectures are also possible. For example, each switch port configured for flow switching might export statistics to a dedicated flow-collector device. Figure 27: NetFlow Collection Architecture Example
Accounting/ billing
Profiling
Centralized collector-server
Summarized data
Flow-collector device
UDP NetFlow NetFlow
Flow-collector device
UDP NetFlow NetFlow
Black Diamond
Black Diamond
Black Diamond
Black Diamond
PoS_024
The ExtremeWare NetFlow implementation also enables a single port to distribute statistics across multiple groups of flow-collector devices. This NetFlow distribution feature enables a scalable collection architecture that is able to accommodate high volumes of exported data. The NetFlow distribution feature is enabled by configuring export distribution groups that contain the addresses of multiple flow-collector devices. The feature uses a distribution algorithm that ensures all of the records for a
214
given flow are exported to the same collector. The algorithm also ensures that the flow records of the ingress direction of a TCP or UDP connection are exported to the same collector. (For Ethernet applications, only ingress traffic is monitored on Ethernet ports.) For example, multiple filters can be assigned to a set of ports for the same group. The flow records that match the filters are then sent to one of the flow collector devices in that group. You can also establish redundancy by configuring multiple flow collector devices per group so that data is still collected as long as there is one working flow collector device in that group. To implement flow-collector devices, you can choose from commercial software products and public-domain software packages.
215
Export Criteria
For Ethernet ports, flow records are exported on an age basis. If the age of the flow is greater than a configurable time, the record is exported. An Ethernet port configured for flow switching transmits a NetFlow Export Datagram when 25 flow records are ready for export, or when at least one flow has been awaiting export for one second. An Ethernet port configured for capturing flows transmits NetFlow export datagrams when the configured time-out expires and exports the data collected by the flow filters configured on that port. As the NetFlow on Ethernet links is modeled as port-based, individual ports maintain their configured time-outs and export the flows collected by the configured flow filters on the expiry of flow export time-out.
The flow statistics feature is disabled by default. To disable the flow statistics feature on a switch, use the following command:
disable flowstats
The flow statistics function is disabled by default. To disable the flow statistics function on the specified port, use the following command:
disable flowstats ports <portlist>
216
The group# parameter is an integer in the range from 1 through 32 that identifies the specific group for which the destination is being configured. You can use the add and delete keywords to add or delete flow-collector destinations. To export NetFlow datagrams to a group, you must configure at least one flow-collector destination. By default, no flow-collector destinations are configured. To configure a flow-collector destination, use either an IP address and UDP port number pair or a hostname and UDP port number pair to identify the flow-collector device to which NetFlow export datagrams are to be transmitted. You can configure up to eight flow-collector destinations for each group. When multiple flow-collectors are configured as members of the same group, the exported NetFlow datagrams are distributed across the available destinations.
By default, flow records are exported with the VLAN interface address that has a route to the configured flow-collector device. Depending on how it is configured, a flow-collector device can use the source IP address of received NetFlow datagrams to identify the switch that sent the information. The following command example specifies that the IP address 192.168.100.1 is to be used as the source IP address for exported NetFlow datagrams.
configure flowstats source ipaddress 192.168.100.1
The time-out value is the number of minutes to use in deciding when to export flow records. The default time-out is 5 minutes. The following command example specifies a 10-minute time-out for exported NetFlow datagrams on port 1 of the Ethernet module installed in slot 8 of the BlackDiamond switch.
configure flowstats timeout 10 ports 8:1
217
where:
filter# <group#> The filter# parameter is an integer in the range from 1 to 8 that identifies the filter being defined. Specifies the group number that identifies the set of flow collector devices to which records for flows matching the filter are to be exported. If Group is not specified, then group # 1 will be used as default export group. To reduce the volume of exported data, use this optional keyword to maintain a single set of statistics for all the flows that match the specified filter. Specifies a set of five parameters (four are value/mask pairs) that define the criteria by which a flow is evaluated to determine if it should be exported. The parameters are: [{dest-ip <ipaddress_value/mask ipaddress_filtermask>} {source-ip <ipaddress_value/mask ipaddress_filtermask>} {dest-port <port_value/port_filtermask>} {source-port <port_value/port_filtermask>} {protocol <tcp/udp/ip/protocol_value/protocol_filtermask>} | match-all-flows |match-no-flows] All five specifications must be included in the order specified. The range for port/port_mask is calculated using the following formula: (minport = port, maxport = 2^(32-port_mask)-1). Conceptually, the filters work by ANDing the contents of each of the five components of a forwarded flow with the associated masks from the first defined filter (filter #1). Statistics are maintained if the results of the AND operations match the configured filter values for all fields of the sequence. If there is no match, then the operation is repeated for filter #2, and so on. If there is no match for any of the filters, then statistics are not maintained for the flow. Filters for any or all of the sequence components can be configured with a single command. match-all-flows match-no-flows egress ingress Specifies that the filter should match any flow. Specifies that the filter should discard all flow. This option is not valid for Ethernet blades. Specifies that the filter should capture only egress traffic. This option is not valid for Ethernet blades. Specifies that the filter should capture only ingress traffic.
aggregation filterspec
The following command example configures a filter to collect aggregate statistics for all traffic flowing through ports 1-8 from the 192.170.0.0/16 subnet to the 192.171.132.0/24 subnet:
configure flowstats filter 2 aggregation export 1 ports 1-8 ingress dest-ip 192.171.132.0/24 source-ip 192.170.0.0/16 dest-port 0/0 source-port 0/0 protocol ip
Likewise, the following command example configures a filter to collect aggregate statistics for all ingress traffic flowing from the 192.171.0.0/16 subnet to the 192.170.0.0/16 subnet and export the flows to group 3 for ports 6:1, 7:9, and 8:42
configure flowstats filter 2 aggregation export 3 ports 6:1,7:9,8:42 ingress dest-ip 192.170.0.0/16 source-ip 192.171.0.0/16 dest-port 0/0 source-port 0/0 protocol ip
Finally, the following command configures filter 3 to collect statistics on any flows for ports 4-32 that did not match the filters defined in the two previous commands:
configure flowstats filter 3 aggregation export 1 ports 4-32 ingress match-all-flows
218
By default, all filters are enabled after they are configured. To disable a specified flow record filter for the specified Ethernet port, use the following command:
disable flowstats filter <filter#> ports <portlist> {egress | ingress}
where:
filter# The filter# parameter is an integer in the range from 1 to 8 that identifies the filter that is being enabled or disabled.
NOTE Ethernet blades can capture ingress traffic only. The following command example enables filter #2 on port 1 of the Ethernet module installed in slot 8 of the BlackDiamond switch.
enable flowstats filter 2 ports 8:1
The following command example disables filter #2 on port 1 of the Ethernet module installed in slot 8 of the BlackDiamond switch.
disable flowstats filter 2 ports 8:1
The ping-check function is disabled by default. The group identifier is option. Not specifying a group identifier selects all groups. When the ping-check function is enabled, each of the flow collector devices is pinged periodically to check its network connectivity. If a flow collector device is repetitively unresponsive, it is temporarily removed from the export distribution list for that group. The flow collector device will be returned to the export distribution list automatically when subsequent ping checks are consistently successful. The following command example enables the ping-check function for export group 2.
enable flowstats ping-check 2
To disable the flow statistics ping-check function for a specified group of collector devices, use the following command:
disable flowstats ping-check {<group#> | all}
The following command example disables the ping-check function for export group 2.
disable flowstats ping-check 2
219
NOTE This command does not affect the enabled or disabled status of flow statistics collection, nor does it affect the configured export destinations. The following command example resets the flow statistics configuration parameters for port 1 of the module installed in slot 8 of the BlackDiamond switch to their default values.
unconfigure flowstats ports 8:1
where:
detail group# portlist Use this optional keyword to display detailed NetFlow configuration information. Use this optional parameter with the group keyword to display status information for a specific export group. Use this optional parameter to specify one or more ports or slots and ports for which status information is to be displayed.
If you enter the show flowstats command with none of the optional keywords or parameters, the command displays a summary of status information for all ports. The summary status display for a port shows the values for all flow statistics configuration parameters for the port. The summary status display for an export group includes the following information: Values for all configuration parameters Status of each export destination device An example of show flowstats output is shown below:
# show flowstats Flowstats enabled Port Filter proto timeout group OverflowPkts flags -------------------------------------------------------------------------1:1 1 5 1 N/A EIA Dest/Src Info: match-all-flows Flags: E - Enable, D - Disable; I - Ingress, S - Egress; A - Aggregation
The detailed status display for an export group includes the summary information, plus the following management information:
220
RMON
Counts of the number of times each flow collector destination has been taken out of service due to health-check (ping check) failures The source IP address configuration information
RMON
Using the Remote Monitoring (RMON) capabilities of the switch allows network administrators to improve system efficiency and reduce the load on the network. The following sections explain more about the RMON concept and the RMON features supported by the switch.
NOTE You can only use the RMON features of the system if you have an RMON management application, and have enabled RMON on the switch.
About RMON
RMON is the common abbreviation for the Remote Monitoring Management Information Base (MIB) system defined by the Internet Engineering Task Force (IETF) documents RFC 1271 and RFC 1757, which allows you to monitor LANs remotely. A typical RMON setup consists of the following two components: RMON probeAn intelligent, remotely controlled device or software agent that continually collects statistics about a LAN segment or VLAN. The probe transfers the information to a management workstation on request, or when a predefined threshold is crossed. Management workstationCommunicates with the RMON probe and collects the statistics from it. The workstation does not have to be on the same network as the probe, and can manage the probe by in-band or out-of-band connections.
Statistics
The RMON Ethernet Statistics group provides traffic and error statistics showing packets, bytes, broadcasts, multicasts, and errors on a LAN segment or VLAN.
221
Information from the Statistics group is used to detect changes in traffic and error patterns in critical areas of the network.
History
The History group provides historical views of network performance by taking periodic samples of the counters supplied by the Statistics group. The group features user-defined sample intervals and bucket counters for complete customization of trend analysis. The group is useful for analysis of traffic patterns and trends on a LAN segment or VLAN, and to establish baseline information indicating normal operating parameters.
Alarms
The Alarms group provides a versatile, general mechanism for setting threshold and sampling intervals to generate events on any RMON variable. Both rising and falling thresholds are supported, and thresholds can be on the absolute value of a variable or its delta value. In addition, alarm thresholds can be autocalibrated or set manually. Alarms inform you of a network performance problem and can trigger automated action responses through the Events group.
Events
The Events group creates entries in an event log and/or sends SNMP traps to the management workstation. An event is triggered by an RMON alarm. The action taken can be configured to ignore it, to log the event, to send an SNMP trap to the receivers listed in the trap receiver table, or to both log and send a trap. The RMON traps are defined in RFC 1757 for rising and falling thresholds. Effective use of the Events group saves you time. Rather than having to watch real-time graphs for important occurrences, you can depend on the Event group for notification. Through the SNMP traps, events can trigger other actions, which provides a mechanism for an automated response to certain occurrences.
Configuring RMON
RMON requires one probe per LAN segment, and standalone RMON probes traditionally have been expensive. Therefore, Extremes approach has been to build an inexpensive RMON probe into the agent of each system. This allows RMON to be widely deployed around the network without costing more than traditional network management. The switch accurately maintains RMON statistics at the maximum line rate of all of its ports. For example, statistics can be related to individual ports. Also, because a probe must be able to see all traffic, a stand-alone probe must be attached to a nonsecure port. Implementing RMON in the switch means that all ports can have security features enabled. To enable or disable the collection of RMON statistics on the switch, use the following command:
[enable | disable] rmon
By default, RMON is disabled. However, even in the disabled state, the switch responds to RMON queries and sets for alarms and events. By enabling RMON, the switch begins the processes necessary for collecting switch statistics.
222
RMON
Event Actions
The actions that you can define for each alarm are shown in Table 32. Table 32: Event Actions
Action No action Notify only Notify and log Send trap to all trap receivers. Send trap; place entry in RMON log. High Threshold
To be notified of events using SNMP traps, you must configure one or more trap receivers, as described in Chapter 3.
223
224
11 Security
This chapter describes the following topics: Security Overview on page 225 Network Access Security on page 225 MAC-Based VLANs on page 226 IP Access Lists (ACLs) on page 226 MAC Address Security on page 233 Network Login on page 236 Switch Protection on page 245 Routing Access Profiles on page 245 Route Maps on page 255 Denial of Service Protection on page 260 Management Access Security on page 263 Authenticating Users Using RADIUS or TACACS+ on page 263 Secure Shell 2 (SSH2) on page 270
Security Overview
Extreme Networks products incorporate a number of features designed to enhance the security of your network. No one feature can insure security, but by using a number of features in concert, you can substantially improve the security of your network. The features described in this chapter are part of an overall approach to network security
225
Security
MAC-Based VLANs
MAC-Based VLANs allow physical ports to be mapped to a VLAN based on the source MAC address learned in the FDB. This feature allows you to designate a set of ports that have their VLAN membership dynamically determined by the MAC address of the end station that plugs into the physical port. You can configure the source MAC address-to-VLAN mapping either offline or dynamically on the switch. For example, you could use this application for a roaming user who wants to connect to a network from a conference room. In each room, the user plugs into one of the designated ports on the switch and is mapped to the appropriate VLAN. Connectivity is maintained to the network with all of the benefits of the configured VLAN in terms of QoS, routing, and protocol support. Detailed information about configuring and using MAC-based VLANs can be found in Chapter 5.
226
Precedence Numbers
The precedence number is optional, and determines the order in which each rule is examined by the switch. Access list entries that contain a precedence number are evaluated from highest to lowest. Precedence numbers range from 1 to 25,600, with the number 1 having the highest precedence. You can specify overlapping rules; however, if you are using precedence numbers, overlapping rules without precedence numbers are ignored. Therefore, the precedence numbers must be specified among all overlapping rules. If a new rule without a precedence number is entered, and this rule overlaps with already existing rules, the switch rejects the new rule and resolves the precedences among all remaining overlapping rules.
IP Access Rules
There are a number of different types of IP access rules and different limits apply to each type. This section describes the different types of IP access rules, what each rule is capable of supporting, and any limitations associated with each type of rule. The switch allows a maximum total of 5,120 rules to be stored in non-volatile configuration storage. This maximum is a sum of IP and ICMP access rule entries.
227
Security
limited by the number of Netflow record filters configured. For example, if 128 filters are created, the numbers of ACLs allowed decreases by 128.
Once the default behavior of the access list is established, you can create additional entries using precedence numbers. The following access-list example performs packet filtering in the following sequence, as determined by the precedence number: Deny UDP port 32 and TCP port 23 traffic to the 10.2.XX network. All other TCP port 23 traffic destined for other 10.X.X.X networks is permitted using QoS profile Qp4. All remaining traffic to 10.2.0.0 uses QoS profile Qp3. With no default rule specified, all remaining traffic is allowed using the default QoS profile.
create access-list deny102_32 udp dest 10.2.0.0/16 ip-port 32 source any ip-port any deny ports any precedence 10 create access-list deny102_23 tcp dest 10.2.0.0/16 ip-port 23 source any ip-port any deny ports any precedence 20 create access-list allow10_23 tcp dest 10.0.0.0/8 ip-port 23 source any ip-port any permit qosprofile qp4 ports any precedence 30 create access-list allow102 ip dest 10.2.0.0/16 source 0.0.0.0/0 permit qosprofile qp3 ports any precedence 40
NOTE For an example of using the permit-established keyword, see Using the Permit-Established Keyword on page 230.
228
Maximum Entries
A maximum of 255 entries with an assigned precedence can be used. In addition to the 255 entries, entries that do not use precedence can also be created, with the following restrictions: A source IP address must use wildcards or a completely specified mask. The layer 4 source and destination ports must use wildcards or be completely specified (no ranges). No physical source port can be specified. Access list rules that apply to all physical ports are implemented on all BlackDiamond I/O modules. On a BlackDiamond switch, the maximum number of access list entries is 255 entries per I/O module. One way to economize on the number of entries on a BlackDiamond switch is to provide a physical ingress port as a component of an access list rule. In this case, the rule is implemented only on the I/O modules that contain the specified ports. By restricting rules to specific I/O modules, you can extend the number of access list rules to 5120 (NVRAM limit). On BlackDiamond switches, there is a resource on each i series I/O module so that the total maximum number of ACL entries can be up to 4080 (255*16). Each ACL must specify an ingress physical port specific to a single I/O module to avoid using those resources on any other module. On Alpine switches, a maximum of 255 ACL entries are supported.
To initiate and refresh a running display of access list statistics, use the following command:
show access-list-monitor
229
Security
10.10.10.1 10.10.10.100
10.10.20.1 10.10.20.100
NET10 VLAN
NET20 VLAN
EW_033
The following sections describe the steps used to configure the example. Step 1 Deny IP Traffic. First, create an access-list that blocks all IP-related traffic. This includes any TCP- and UDP-based traffic. Although ICMP is used in conjunction with IP, it is technically not an IP data packet. Thus, ICMP data traffic, such as ping traffic, is not affected. The following command creates the access list:
create access-list denyall ip destination any source any deny ports any
230
Figure 29: Access list denies all TCP and UDP traffic
10.10.10.1 10.10.10.100
10.10.20.1 10.10.20.100
NET10 VLAN
NET20 VLAN
Step 2 Allow TCP traffic. The next set of access list commands permits TCP-based traffic to flow. Because each session is bi-directional, an access list must be defined for each direction of the traffic flow. UDP traffic is still blocked. The following commands create the access list:
create access-list tcp1 tcp destination 10.10.20.100/32 ip any source 10.10.10.100/32 ip any permit qp1 ports any precedence 20 create access-list tcp2 tcp destination 10.10.10.100/32 ip any source 10.10.20.100/32 ip any permit qp1 ports any precedence 21
Figure 30 illustrates the outcome of this access list. Figure 30: Access list allows TCP traffic
Step 3 - Permit-Established Access List. When a TCP session begins, there is a three-way handshake that includes a sequence of a SYN, SYN/ACK, and ACK packets. Figure 31 shows an illustration of the handshake that occurs when host A initiates a TCP session to host B. After this sequence, actual data can be passed.
231
Security
An access list that uses the permit-established keyword filters the SYN packet in one direction. Use the permit-established keyword to allow only host A to be able to establish a TCP session to host B and to prevent any TCP sessions from being initiated by host B, as illustrated in Figure 31. The syntax for this access list is as follows:
create access-list <name> tcp destination HostA ip-port 23 source HostB ip-port any permit-established ports any pre 8
NOTE This step may not be intuitive. Pay attention to the destination and source address, and the desired affect. The exact command line entry for this example is as follows:
create access-list telnet-allow tcp destination 10.10.10.100/32 ip-port 23 source any ip-port any permit-established ports any pre 8
NOTE This rule has a higher precedence than the rule tcp2. Figure 32 shows the final outcome of this access list. Figure 32: Permit-established access list filters out SYN packet to destination
232
The output for this access list is shown in Figure 33. Figure 33: ICMP packets are filtered out
10.10.10.1 10.10.10.100
10.10.20.1 10.10.20.100
NET10 VLAN
NET20 VLAN
ICMP
EW_038
NOTE You can either limit dynamic MAC FDB entries, or lock down the current MAC FDB entries, but not both. You can also prioritize or stop packet flows based on the source MAC address of the ingress VLAN or the destination MAC address of the egress VLAN.
233
Security
To limit the number of dynamic MAC addresses that can participate in the network, use the following command:
configure ports [<portlist> vlan <vlan name> | all] limit-learning <number>
This command specifies the number of dynamically-learned MAC entries allowed for these ports in this VLAN. The range is 0 to 500,000 addresses. When the learned limit is reached, all new source MAC addresses are blackholed at the ingress and egress points. This prevent these MAC addresses from learning and responding to Internet control message protocol (ICMP) and address resolution protocol (ARP) packets. Dynamically learned entries still get aged and can be cleared. If entries are cleared or aged out after the learning limit has been reached, new entries will then be able to be learned until the limit is reached again. Permanent static and permanent dynamic entries can still be added and deleted using the create fdbentry and delete fdbentry commands. These override any dynamically learned entries. For ports that have a learning limit in place, the following traffic will still flow to the port: Packets destined for permanent MAC addresses and other non-blackholed MAC addresses Broadcast traffic EDP traffic Traffic from the permanent MAC and any other non-blackholed MAC addresses will still flow from the virtual port. To remove the learning limit, use the following command:
configure ports [<portlist> vlan <vlan name> | all] unlimited-learning
This command displays the MAC security information for the specified VLAN.
show ports <portlist> info detail
This command displays detailed information, including MAC security information, for the specified port.
The information generated should help detect unauthorized devices that attempt to access the network. Enabling the trap also enables the syslog; there is no separate command for that. The command is a global command; there is no per port or per VLAN control. To disable the generation of MAC address limit SNMP traps and syslog messages, use the following command:
234
For more information about configuring SNMP and the MAC limit SNMP trap, see Using SNMP on page 61, in Chapter 3, Managing the Switch.
ESRP vlan S1
10.1.2.1
20.1.1.1
S2 S4
10.1.2.2
20.1.2.2 192.10.1.1
10.1.2.100
S3
10.1.2.1 30.1.1.1
30.1.1.2
192.10.1.100
EW_081
In Figure 34, S2 and S3 are ESRP-enabled switches, while S1 is an ESRP-aware (regular layer 2) switch. Configuring a MAC address limit on all S1 ports might prevent ESRP communication between S2 and S3. To resolve this, you should add a back-to-back link between S2 and S3. This link is not needed if MAC address limiting is configured only on S2 and S3, but not on S1.
This command causes all dynamic FDB entries associated with the specified VLAN and ports to be converted to locked static entries. It also sets the learning limit to zero, so that no new entries can be learned. All new source MAC addresses are blackholed. Locked entries do not get aged, but can be deleted like a regular permanent entry. For ports that have lock-down in effect, the following traffic will still flow to the port: Packets destined for the permanent MAC and other non-blackholed MAC addresses
235
Security
Broadcast traffic EDP traffic Traffic from the permanent MAC will still flow from the virtual port. To remove MAC address lock down, use the following command:
configure ports [<portlist> vlan <vlan name> | all] unlock-learning
When you remove the lock down using the unlock-learning option, the learning-limit is reset to unlimited, and all associated entries in the FDB are flushed.
Network Login
Network Login is a feature designed to control the admission of user packets into a network by giving addresses only to users that have been properly authenticated. Network Login is controlled by an administrator on a per port, per VLAN basis. When Network Login is enabled on a port in a VLAN, that port will not forward any packets until authentication takes place. Once Network Login has been enabled on a switch port, that port is placed in a non-forwarding state until authentication takes place. To authenticate, a user (supplicant) must open a web browser and provide the appropriate credentials. These credentials are either approved, in which case the port is placed in forwarding mode, or not approved, and the port remains blocked. Three failed login attempts will disable the port for some configured length of time. The user logout can either initiated by FDB aging or by submitting a logout request. There are two choices for types of authentication to use with Network Login, web-based and 802.1x, and there are two different modes of operation, Campus mode and ISP mode. The authentication types and modes of operation can be used in any combination. The following sections describe these choices.
236
Network Login
DHCP is needed for web-based network login because the underlying protocol used to carry authentication request-response is HTTP. The client needs an IP address to send and receive HTTP packets. However, before the client is authenticated, there is no connection to anywhere else except the authenticator itself. As a result, the authenticator must be furnished with a temporary DHCP server to distribute IP address. The DHCP allocation for Network Login has short time duration of 20 seconds. It is intended to perform web-based network login only. As soon as the client is authenticated, it is deprived of this address. Then it has to go to some other DHCP server in the network to obtain a permanent address, as is normally done. DHCP is not required for 802.1x, since 802.1x use only layer-2 frames (EAPOL). URL redirection (applicable to web-based mode only) is a mechanism to redirect any HTTP request to the base URL of the authenticator when the port is in unauthenticated mode. In other words when user is trying to login to the network using the browser, it will be first redirected to the Network Login page. Only after a successful login will the user be connected to the network.
237
Security
Simpler administration based on username and password Cons of web-based authentication: Login process involves juggling with IP addresses and has to be done a outside the scope of a regular computer login, therefore it is not tied to Windows login. One has to specifically bring up a login page and initiate a login. Supplicants cannot be re-authenticated transparently. Can not be re-authenticated from the authenticator side. Does not support more secure methods of authentication
Authentication Methods
The authentication methods supported are a matter between the supplicant and the authentication server. The most commonly used methods are MD5-Challenge, Transport Layer Security (TLS) which uses Public Key Infrastructure (PKI), and strong mutual authentication and Tunneled TLS (TTLS) which is a Funk/Certicom proposal. So far, TLS represents the most secure protocol among all those mentioned. TTLS is advertised to be as strong as TLS. Both TLS and TTLS are certificate-based, which requires setting up a PKI that can issue, renew, and revoke certificates. TTLS is preferred from the ease of deployment point of view as it requires only server certificates and client can use MD5 mode of username/password authentication. You will need to refer to the documentation for your particular Radius server, and 802.1x client, if using 802.1x authentication, for information on setting up a PKI configuration.
User Accounts
You can create two types of user accounts for authenticating Network Login users: netlogin-only enabled and netlogin-only disabled. A netlogin-only disabled user can log in using Network Login and can also access the switch using Telnet, SSH, or HTTP. A netlogin-only enabled user can only log in using Network Login and cannot access the switch using the same login. Add the following line to the RADIUS server dictionary file for netlogin-only disabled users:
Extreme:Extreme-Netlogin-Only = Disabled
Add the following line to the RADIUS server dictionary file for netlogin-only enabled users:
238
Network Login
Extreme:Extreme-Netlogin-Only = Enabled
Interoperability Requirements
For Network Login to operate, the user (supplicant) software and the authentication server must support common authentication methods. Not all combinations will provide the appropriate functionality.
Supplicant side
On the client side, currently, the only platform that natively supports 802.1x is Windows XP, which performs MD5 and TLS. Other 802.1x clients are available that support other operating systems and support mixes of authentication methods. A Windows XP 802.1x supplicant can be authenticated as a computer or as a user. Computer authentication requires a certificate installed in the computer certificate store, and user authentication requires a certificate installed in the individual users certificate store. By default, the XP machine performs computer authentication as soon as the computer is powered on, or at link-up when no user is logged into the machine. User authentication is performed at link-up when the user is logged in. The XP machine can be configured to perform computer authentication at link-up even if user is logged in. Again, any client with a web browser can interoperate using web-based authentication.
239
Security
The choice of web-based versus 802.1x authentication is again on a per-MAC basis. Among multiple clients on the same port, it is possible that some clients use web-based mode to authenticate, and some others use 802.1x. There are certain restrictions for multiple supplicant support: Web-based mode will not support Campus mode for multiple supplicant because once the first MAC gets authenticated, the port is moved to a different VLAN and therefore other unauthenticated clients (which are still in the original VLAN), cant have a layer 3 message transactions with the authentication server. Once the first MAC gets authenticated, the port is transitioned to the authenticated state and other unauthenticated MACs can listen to all data destined to first MAC. This could raise some security concerns as unauthenticated MACs can listen to all broadcast and multicast traffic directed to a Network Login-authenticated port.
240
Network Login
ISP Mode: Network Login clients connected to ports 1:10 - 1:14, VLAN corp, will be logged into the network in ISP mode. This is controlled by the fact that the VLAN in which they reside in unauthenticated mode and the RADIUS server Vendor Specific Attributes (VSA), Extreme-Netlogin-Vlan, are the same, corp. So there will be no port movement. Also if this VSA is missing from RADIUS server, it is assumed to be ISP Mode. Campus Mode: On the other hand, clients connected to ports 4:1 - 4:4, VLAN temp, will be logged into the network in Campus mode, since the port will move to the VLAN corp after getting authenticated. A port moves back and forth from one VLAN to the other as its authentication state changes. Both ISP and Campus mode are not tied to ports but to a user profile. In other words if the VSA
Extreme:Extreme-Netlogin-Vlan represents a VLAN different from the one in which user currently
resides, then VLAN movement will occur after login and after logout. In following example, it is assumed that campus users are connected to ports 4:1-4:4, while ISP users are logged in through ports 1:10-1:14.
NOTE In the following sample configuration, any lines marked (Default) represent default settings and do not need to be explicitly configured.
create vlan "temp" create vlan "corp" # Configuration information for VLAN temp. # No VLAN-ID is associated with VLAN temp. configure vlan "temp" protocol "ANY" (Default) configure vlan "temp" qosprofile "QP1" (Default) configure vlan temp qosprofile ingress IQP1 (Default) configure vlan "temp" ipaddress 198.162.32.10 255.255.255.0 configure vlan "temp" add port 4:1 untagged configure vlan "temp" add port 4:2 untagged configure vlan "temp" add port 4:3 untagged configure vlan "temp" add port 4:4 untagged # Configuration information for VLAN corp. # No VLAN-ID is associated with VLAN corp. configure vlan "corp" protocol "ANY" (Default) configure vlan "corp" qosprofile "QP1" (Default) configure vlan corp qosprofile ingress IQP1 (Default) configure vlan "corp" ipaddress 10.203.0.224 255.255.255.0 configure vlan "corp" add port 1:10 untagged configure vlan "corp" add port 1:11 untagged configure vlan "corp" add port 1:12 untagged configure vlan "corp" add port 1:13 untagged configure vlan "corp" add port 1:14 untagged # Network Login Configuration configure vlan temp dhcp-address-range 198.162.32.20 - 198.162.32.80 configure vlan temp dhcp-options default-gateway 198.162.32.1 configure vlan temp dhcp-options dns-server 10.0.1.1 configure vlan temp dhcp-options wins-server 10.0.1.85 enable netlogin port 1:10 vlan corp enable netlogin port 1:11 vlan corp
241
Security
enable netlogin port 1:12 vlan corp enable netlogin port 1:13 vlan corp enable netlogin port 1:14 vlan corp enable netlogin port 4:1 vlan temp enable netlogin port 4:2 vlan temp enable netlogin port 4:3 vlan temp enable netlogin port 4:4 vlan temp config netlogin base-url "network-access.net" (Default) config netlogin redirect-page http://www.extremenetworks.com (Default) enable netlogin logout-privilege (Default) disable netlogin Session-Refresh 3 (Default) # DNS Client Configuration configure dns-client add name-server 10.0.1.1 configure dns-client add name-server 10.0.1.85
NOTE The idea of explicit release/renew is required to bring the network login client machine in the same subnet as the connected VLAN. In Campus Mode using web-based authentication, this requirement is mandatory after every logout and before login again as the port moves back and forth between the
242
Network Login
temporary and permanent VLANs. On other hand in ISP Mode, release/renew of IP address is not required, as the network login client machine stays in the same subnet as the network login VLAN. In ISP mode, when the network login client connects for the first time, it has to make sure that the machine IP address is in the same subnet as the VLAN to which it is connected. 5 Bring up the browser and enter any URL as http://www.123.net or http://1.2.3.4 or switch IP address as http://<IP address>/login (where IP address could be either temporary or Permanent VLAN Interface for Campus Mode). URL redirection redirects any URL and IP address to the network login page This is significant where security matters most, as no knowledge of VLAN interfaces is required to be provided to network login users, as they can login using a URL or IP address. A page opens with a link for Network Login. 6 Click the Network Login link. A dialog box opens requesting a username and password. 7 Enter the username and password configured on the RADIUS server. After the user has successfully logged in, the user will be redirected to the URL configured on the RADIUS server. During the user login process, the following takes place: Authentication is done through the RADIUS server. After successful authentication, the connection information configured on the RADIUS server is returned to the switch: the permanent VLAN the URL to be redirected to (optional) the URL description (optional) The port is moved to the permanent VLAN. You can verify this using the show vlan command. For more information on the show vlan command, see Displaying VLAN Settings on page 108. After a successful login has been achieved, there are several ways that a port can return to a non-authenticated, non-forwarding state: The user successfully logs out using the logout web browser window. The link from the user to the switchs port is lost. There is no activity on the port for 20 minutes. An administrator changes the port state. NOTE Because network login is sensitive to state changes during the authentication process, Extreme Networks recommends that you do not log out until the login process is complete. The login process is complete when you receive a permanent address.
243
Security
DHCP is enabled on a per port, per VLAN basis. To enable or disable DHCP on a port in a VLAN, use one of the following commands:
enable dhcp ports <portlist> vlan <vlan name> disable dhcp ports <portlist> vlan <vlan name> configure vlan <vlan name> netlogin-lease-timer <seconds>
Where <url> is the DNS name of the switch. For example, configure netlogin base-url network-access.net makes the switch send DNS responses back to the netlogin clients when a DNS query is made for network-access.net. To configure the network login redirect page, use the following command:
configure netlogin redirect-page <url>
Where <url> defines the redirection information for the users once logged in. This redirection information is used only in case the redirection info is missing from RADIUS server. For example, configure netlogin base-url http://www.extremenetworks.com redirects all users to this URL after they get logged in. To enable or disable the network login session refresh, use the following command:
[enable | disable] netlogin session-refresh {<minutes>}
244
Switch Protection
Where <minutes> ranges from 1 - 255. The default setting is 3 minutes. Enable netlogin session-refresh makes the logout window refresh itself at every configured time interval. Session -refresh is disabled by default. When you configure the Network Login session refresh for the logout window on a BlackDiamond, ensure that the FDB aging timer is greater than the Network Login session refresh timer. To enable or disable network login logout privilege, use the following command:
[enable | disable] netlogin logout-privilege
This command turns the privilege for netlogin users to logout by popping up (or not popping up) the logout window. Logout-privilege is enabled by default. To enable or disable network login, use the following command:
[enable | disable] netlogin [web-based | dot1x]
By default netlogin is enabled. To show all network login parameters, use the following command:
show netlogin
Switch Protection
Switch protection features enhance the robustness of switch performance. In this category are the following features: Routing Access Profiles Route Maps Denial of Service Protection
245
Security
Autonomous system path expressions (as-paths) (BGP only) BGP communities (BGP only) VLAN 4 Apply the access profile.
246
configure access-profile <access_profile> add {<seq_number>} {permit | deny} [ipaddress <ipaddress> <mask> {exact} | ipx-node <net_id> <ipx_netid_mask> <ipx_nodeid> ipx-net <ipx_netid> <ipx_netid_mask> | ipx-sap <ipx_sap_type> <ipx_name>| as-path <path-expression> | bgp-community [internet | no-export | no-advertise | no-export-subconfed | <as_no:number> | number <community>]]
Sequence Numbering
You can specify the sequence number for each access profile entry. If you do not specify a sequence number, entries are sequenced in the order they are added. Each entry is assigned a value of 5 more than the sequence number of the last entry.
247
Security
This command configures the access profile to permit AS paths that contain only (begin and end with) AS number 65535.
configure access-profile AS1 add 10 permit as-path ^65535 14490$
This command configures the access profile to permit AS paths beginning with AS number 65535, ending with AS number 14490, and containing no other AS paths.
configure access-profile AS1 add 15 permit as-path ^1 2-8 [11 13 15]$
This command configures the access profile to permit AS paths beginning with AS number 1, followed by any AS number from 2 - 8, and ending with either AS number 11, 13, or 15.
configure access-profile AS1 add 20 deny as-path 111 [2-8]
This command configures the access profile to deny AS paths beginning with AS number 111 and ending with any AS number from 2 - 8.
configure access-profile AS1 add 25 permit as-path 111 .?
This command configures the access profile to permit AS paths beginning with AS number 111 and ending with any additional AS number, or beginning and ending with AS number 111.
248
Import FilterUse an access profile to determine which RIP routes are accepted as valid routes. This policy can be combined with the trusted neighbor policy to accept selected routes only from a set of trusted neighbors. To configure an import filter policy, use the following command:
configure rip vlan [<vlan name> | all] import-filter [<access_profile> | none]
Export FilterUse an access profile to determine which RIP routes are advertised into a particular VLAN, using the following command:
configure rip vlan [<vlan name> | all] export-filter [<access_profile> | none]
Examples
In the example shown in Figure 35, a switch is configured with two VLANs, Engsvrs and Backbone. The RIP protocol is used to communicate with other routers on the network. The administrator wants to allow all internal access to the VLANs on the switch, but no access to the router that connects to the Internet. The remote router that connects to the Internet has a local interface connected to the corporate backbone. The IP address of the local interface connected to the corporate backbone is 10.0.0.10/24.
249
Security
Internet
Internet
10.0.0.10 / 24
Backbone (RIP)
10.0.0.12 / 24
Engsvrs
10.1.1.1 / 24
Sales
10.2.1.1 / 24
Engsvrs
Sales
EW_001
Assuming the backbone VLAN interconnects all the routers in the company (and, therefore, the Internet router does not have the best routes for other local subnets), the commands to build the access policy for the switch would be:
create access-profile nointernet ipaddress configure access-profile nointernet mode deny configure access-profile nointernet add 10.0.0.10/32 configure rip vlan backbone trusted-gateway nointernet
In addition, if the administrator wants to restrict any user belonging to the VLAN Engsvrs from reaching the VLAN Sales (IP address 10.2.1.0/24), the additional access policy commands to build the access policy would be:
create access-profile nosales ipaddress configure access-profile nosales mode deny configure access-profile nosales add 10.2.1.0/24 configure rip vlan backbone import-filter nosales
This configuration results in the switch having no route back to the VLAN Sales.
250
Export FilterUse an access profile to determine which IPX/RIP and IPX/SAP routes are advertised into a particular VLAN, using the following command:
configure ipxrip vlan [<vlan name> | all] export-filter [<access_profile> | none] configure ipxsap vlan [<vlan name> | all] export-filter [<access_profile> | none]
External FilterFor switches configured to support multiple OSPF areas (an ABR function), an access profile can be applied to an OSPF area that filters a set of OSPF external routes from being advertised into that area. To configure an external filter policy, use the following command:
configure ospf area <area identifier> external-filter [<access_profile> | none]
NOTE If any of the external routes specified in the filter have already been advertised, those routes will remain until the associated LSAs in that area time-out. ASBR FilterFor switches configured to support RIP and static route re-distribution into OSPF, an access profile can be used to limit the routes that are advertised into OSPF for the switch as a whole. To configure an ASBR filter policy, use the following command:
configure ospf asbr-filter [<access_profile> | none]
Direct FilterFor switches configured to support direct route re-distribution into OSPF, an access profile can be used to limit the routes that are advertised into OSPF for the switch as a whole. To configure a direct filter policy, use the following command:
configure ospf direct-filter [<access_profile> | none]
251
Security
Example
Figure 36 illustrates an OSPF network that is similar to the network used previously in the RIP example. In this example, access to the Internet is accomplished by using the ASBR function on the switch labeled Internet. As a result, all routes to the Internet will be done through external routes. Suppose the network administrator wishes to only allow access to certain internet addresses falling within the range 192.1.1.0/24 to the internal backbone. Figure 36: OSPF access policy example
Internet
Internet
10.0.0.10 / 24
10.0.0.11 / 24
10.0.0.12 / 24
Engsvrs
10.1.1.1 / 24
Sales
10.2.1.1 / 24
252
Import FilterUse an access profile to determine which DVMRP routes are accepted as valid routes. To configure an import filter policy, use the following command:
configure dvmrp vlan [<vlan name> | all] import-filter [<access_profile> | none]
Export FilterUse an access profile to determine which DVMRP routes are advertised into a particular VLAN, using the following command:
configure dvmrp vlan [<vlan name> | all] export-filter [<access_profile> | none]
Example
In this example, the network used in the previous RIP example is configured to run DVMRP. The network administrator wants to disallow Internet access for multicast traffic to users on the VLAN Engsvrs. This is accomplished by preventing the learning of routes that originate from the switch labeled Internet by way of DVMRP on the switch labeled Engsvrs. To configure the switch labeled Engsvrs, use the following commands:
create access-profile nointernet ipaddress configure access-profile nointernet mode deny configure access-profile nointernet add 10.0.0.10/32 configure dvmrp vlan backbone trusted-gateway nointernet
In addition, suppose the administrator wants to preclude users on the VLAN Engsvrs from seeing any multicast streams that are generated by the VLAN Sales across the backbone. The additional configuration of the switch labeled Engsvrs is as follows:
create access-profile nosales ipaddress configure access-profile nosales mode deny configure access-profile nosales add 10.2.1.0/24 configure dvmrp vlan backbone import-filter nosales
Example
Using PIM, the unicast access profiles can be used to restrict multicast traffic. In this example, a network similar to the example used in the previous RIP example is also running PIM. The network administrator wants to disallow Internet access for multicast traffic to users on the VLAN Engsvrs. This is accomplished by preventing the learning of routes that originate from the switch labeled Internet by way of PIM on the switch labeled Engsvrs.
253
Security
The NLRI filter access policy can be applied to the ingress or egress updates, using the in and out keywords, respectively. Autonomous system path filterUse an access profile to determine which NLRI information must be exchanged with a neighbor based on the AS path information present in the path attributes of the NLRI. To configure an autonomous system path filter policy, use the following command:
configure bgp neighbor [<ipaddress> | all] as-path-filter [in | out] [<access_profile> | none]
The autonomous system path filter can be applied to the ingress or egress updates, using the in and out keywords, respectively.
NOTE Changes to profiles applied to OSPF typically require rebooting the switch, or disabling and re-enabling OSPF on the switch.
254
Route Maps
Route Maps
Route maps are used to modify or filter routes. They are also used to modify or filter routing information.
where the following is true: The sequence number uniquely identifies the entry, and determines the position of the entry in the route map. Route maps are evaluated sequentially. The permit keyword permits the route; the deny keyword denies the route and is applied only if the entry is successful. The match-one keyword is a logical or. The route map is successful as long as at least one of the matching statements is true.
255
Security
The match-all keyword is a logical and. The route map is successful when all match statements are true. This is the default setting.
where the following is true: The route-map is the name of the route map. The sequence number identifies the entry in the route map to which this statement is being added. The match, set, and goto keywords specify the operations to be performed. Within a entry, the statements are sequenced in the order of their operation. The match statements are first, followed by set, and then goto. The nlri-list, as-path, community, next-hop, med, origin, and weight keywords specify the type of values that must be applied using the specified operation against the corresponding attributes as described in Table 34 and Table 35. The accounting-index keyword specifies the bin number assigned to a specific route map as discussed in Table 36. Table 34: Match Operation Keywords
Keyword nlri-list <access_profile> as-path [<access_profile> | <as-no>] Description Matches the NLRI against the specified access profile. Matches the AS path in the path attributes against the specified access profile or AS number.
community [access-profile Matches the communities in the path attribute against the specified BGP <access-profile> | <as no>: <number> community access profile or the community number. | number <community> | no-advertise | no-export | no-export-subconfed] next-hop <ipaddress> Matches the next hop in the path attribute against the specified IP address.
256
community [[access-profile Adds the specified community to the existing community in the path <access-profile> | <as no>: <number> attribute. | number <community> | no-advertise | no-export | no-export-subconfed] | remove | [add | delete] [access-profile <access-profile> | <as no>: <number> | number <community> | no-advertise | no-export | no-export-subconfed]] next-hop <ipaddress> med [internal | <number> | remove | [add | delete] <number>] Sets the next hop in the path attribute to the specified IP address. Modifies the MED in the path attribute as specified: internalWhen used in the BGP neighbor output route map, the MED attribute is set to a value equal to the metric to reach the nexthop. <number>Sets the MED attribute to the specified value. removeRemoves the MED attribute, if present. [add | delete] <number>Adds or deletes the specified value to or from the MED that is received. The final result is bound by 0 and 2147483647.
local-preference <number> weight <number> origin [igp | egp | incomplete] tag <number> cost <number> cost-type <number> accounting index [ase-type-1 | ase-type-2]
Sets the local preference in the path attribute to the specified local preference number. Sets the weight associated with the NLRI to the specified number. Sets the origin in the path attributes to the specified origin. Sets the tag in the route to the specified number. Sets the cost of the route to the specified number Sets the type of the cost associated with the route. Sets the specified accounting index to the specified number.
257
Security
10.0.0.2
RTB AS 2222
EW_048
The following points apply to this example: RTA is a member of in AS 1111 and peers with a router in the Internet to receive the entire Internet routing table. RTB is a member of AS 2222, and has an EBGP connection with RTA through which it receives the Internet routing table. AS 1111 is acting as a transit AS for all traffic between AS 2222 and the Internet. If the administrator of AS 1111 wants to filter out route information about network 221.1.1.0/24 and its subnets from being passed on to AS 2222, the administrator can configure a route-map on the egress side of RTAs EBGP connection with RTB and filter out the routes.
258
If you wish to modify the routing information originated from AS 300 to include a MED value of 200, the sequence of commands would be:
create access-profile aslist type as-path configure aslist add as-path "^300" configure bgp-out add 15 permit configure bgp-out 15 add match as-path access-profile aslist configure bgp-out 15 add set med 200 configure bgp neighbor 10.0.0.2 soft-reset out
259
Security
The default values for the parameters are as follows: alert-threshold4000 packets per second notice-threshold4000 packets per second timeout15 seconds messageson (messages are sent to syslog) filter-precedence10 filter-type-alloweddestination If you wish to set all the parameters back to their default values, use the following command:
unconfigure cpu-dos-protect
260
NOTE If you set the filter-precedence to 0, the ACLs created by DoS protection will be overwritten by the default VLAN QoS profile.
Once enabled, denial of service protection creates an access list for packets when the receive packet on a port is greater than the alert level. For example, if cpu-dos-protect is enabled on a Summit7i switch and the threshold alert level is set to 3000 packets per second, an access list is created if one of the ports on the switch receives 3000 or more packets per second. The precedence is set at 10 for the duration of the timeout. For example, if you set the timeout to 15 seconds, the ACL is created for 15 seconds. The switch continues to create access lists for the duration of the timeout until the packet rate declines to less than the configured threshold alert level.
Next, configure the notice threshold. This will help determine the actual traffic received by the CPU by logging when the traffic exceeds the threshold. This can help understand the types of traffic encountered, and evaluate whether legitimate traffic may be accidentally blocked. Some examples of heavy legitimate traffic to the cpu include: route lossduring this period, the switch may receive lots of routing updates that cause heavy traffic processing loads on the CPU. configuration or image upload/download To configure the notice threshold, use the following command:
configure cpu-dos-protect notice-threshold <packets per second>
261
Security
Next, configure the alert threshold. If the alert threshold is reached, a simulated ACL is put in place. Although packets will not be dropped, this provides good information about the heavy traffic, which might be legitimate or might be an attack. The Ethernet address of the source and the type of traffic can be characterized by the type of ACL put in place. This is another way to judge if legitimate traffic would have been cut off. To configure the alert threshold, use the following command:
configure cpu-dos-protect alert-threshold <packets per second>
After normal traffic is characterized, steps should be taken to set: the appropriate notice level if some warning is desired the appropriate alert level at which an ACL is put in place trusted ports from which traffic wont be blocked In some cases, traffic from a switch port or group of ports will never cause an attack. These ports can be configured as trusted port and will never be considered for traffic that will generate an ACL. This can prevent innocent hosts from being blocked, or ensure that when an innocent host responds to an attack that the flood of response packets is not mistaken for the attack. To configure a trusted port, use the following command:
configure cpu-dos-protect trusted-ports add <port list>
The last step is to enable DoS Protection. At this point, only attack traffic should be blocked and legitimate traffic should pass through. To enable the creation of ACLs for DoS Protection, use the following command:
enable cpu-dos-protect
To block and clean up after this task: 1 Block the attack by creating an ACL to block port 1434 using the following command:
create access-list UDP dest any ip-port 1434 source any ip-port any
2 Remove affected SQL servers from the network You can simply disable the port connecting the server. 3 Clean up the existing IGMP snooping entries and IPMC cache using the following commands:
igmp snooping clear ipmc cache
4 Disable IGMP snooping on the affected switches. Disabling IGMP snooping affects routing protocols using multicast addresses and multicast traffic on that switch.
262
RADIUS Client
Remote Authentication Dial In User Service (RADIUS, RFC 2138) is a mechanism for authenticating and centrally administrating access to network nodes. The ExtremeWare RADIUS client implementation allows authentication for Telnet, Vista, or console access to the switch. NOTE You cannot configure RADIUS and TACACS+ at the same time. You can define a primary and secondary RADIUS server for the switch to contact. When a user attempts to login using Telnet, http, or the console, the request is relayed to the primary RADIUS server, and then to the secondary RADIUS server, if the primary does not respond. If the RADIUS client is enabled, but access to the RADIUS primary and secondary server fails, the switch uses its local database for authentication. The privileges assigned to the user (admin versus nonadmin) at the RADIUS server take precedence over the configuration in the local switch database. To configure the RADIUS servers, use the following command:
configure radius server [primary | secondary] <ipadress> <UDP_port> client-ip <ipaddress>
To configure the timeout if a server fails to respond, use the following command:
configure radius timeout <seconds>
263
Security
To configure the shared secret for RADIUS servers, use the following command:
configure radius [primary | secondary] shared-secret {encrypted} <string>
To configure the timeout if a server fails to respond, use the following command:
configure radius-accounting timeout <seconds>
RADIUS accounting also makes use of the shared secret password mechanism to validate communication between network access devices and RADIUS accounting servers. To specify shared secret passwords for RADIUS accounting servers, use the following command:
configure radius [primary | secondary] shared-secret {encrypted} <string>
After you configure RADIUS accounting server information, you must enable accounting before the switch begins transmitting the information. You must enable RADIUS authentication for accounting information to be generated. You can enable and disable accounting without affecting the current state of RADIUS authentication. To enable RADIUS accounting, use the following command:
enable radius-accounting
264
automatically negotiates the per-command authentication capability with the switch. For examples on per-command RADIUS configurations, see the next section.
Cistron RADIUS
Cistron RADIUS is a popular server, distributed under GPL. Cistron RADIUS can be found at: http://www.miquels.cistron.nl/radius/ When you configure the Cistron server for use with Extreme switches, you must pay close attention to the users file setup. The Cistron RADIUS dictionary associates the word Administrative-User with Service-Type value 6, and expects the Service-Type entry to appear alone on one line with a leading tab character. The following is a user file example for read-write access: adminuser Auth-Type = System Service-Type = Administrative-User, Filter-Id = unlim
265
Security
RSA Ace
For users of their SecureID product, RSA offers RADIUS capability as part of their ACE server software. With some versions of ACE, the RADIUS shared-secret is incorrectly sent to the switch resulting in an inability to authenticate. As a work around, do not configure a shared-secret for RADIUS accounting and authentication servers on the switch.
After modifying the vendor.ini file, the desired user accounts must be configured for the Max-Concurrent connections. Using the SBR Administrator application, enable the check box for Max-Concurrent connections and fill in the desired number of maximum sessions.
Extreme RADIUS
Extreme Networks provides its users, free of charge, a radius server based on Merit RADIUS. Extreme RADIUS provides per-command authentication capabilities in addition to the standard set of radius features. Source code for Extreme RADIUS can be obtained from the Extreme Networks Technical Assistance Center and has been tested on Red Hat Linux and Solaris. When Extreme RADIUS is up and running, the two most commonly changed files will be users and profiles. The users file contains entries specifying login names and the profiles used for per-command authentication after they have logged in. Sending a HUP signal to the RADIUS process is sufficient to get changes in the users file to take place. Extreme RADIUS uses the file named profiles to specify
266
command lists that are either permitted or denied to a user based on their login identity. Changes to the profiles file require the RADIUS server to be shutdown and restarted. Sending a HUP signal to the RADIUS process is not enough to force changes to the profiles file to take effect. When you create command profiles, you can use an asterisk to indicate any possible ending to any particular command. The asterisk cannot be used as the beginning of a command. Reserved words for commands are matched exactly to those in the profiles file. Due to the exact match, it is not enough to simply enter sh for show in the profiles file, the complete word must be used. Commands can still be entered in the switch in partial format. When you use per-command authentication, you must ensure that communication between the switch(es) and radius server(s) is not lost. If the RADIUS server crashes while users are logged in, they will have full administrative access to the switch until they log out. Using two RADIUS servers and enabling idle timeouts on all switches will greatly reduce the chance of a user gaining elevated access due to RADIUS server problems.
267
Security
samuel
Within the users configuration file, additional keywords are available for Profile-Name and Extreme-CLI-Authorization. To use per-command authentication, enable the CLI authorization function and indicate a profile name for that user. If authorization is enabled without specifying a valid profile, the user is unable to perform any commands. Next, define the desired profiles in an ASCII configuration file called profiles. This file contains named profiles of exact or partial strings of CLI commands. A named profile is linked with a user through the users file. A profile with the permit on keywords allows use of only the listed commands. A profile with the deny keyword allows use of all commands except the listed commands. CLI commands can be defined easily in a hierarchal manner by using an asterisk (*) to indicate any possible subsequent entry. The parser performs exact string matches on other text to validate commands. Commands are separated by a comma (,) or newline. Looking at the following example content in profiles for the profile named PROFILE1, which uses the deny keyword, the following attributes are associated with the user of this profile: Cannot use any command starting with enable. Cannot issue the disable ipforwarding command. Cannot issue a show switch command. Can perform all other commands. We know from the users file that this applies to the users albert and lulu. We also know that eric is able to log in, but is unable to perform any commands, because he has no valid profile assigned. In PROFILE2, a user associated with this profile can use any enable command, the clear counter command and the show management command, but can perform no other functions on the switch. We also know from the users file that gerald has these capabilities. The following lists the contents of the file users with support for per-command authentication:
user Password = "" Filter-Id = "unlim" Password = "", Service-Type = Administrative Filter-Id = "unlim" Password = "", Service-Type = Administrative, Profile-Name = "" Filter-Id = "unlim" Extreme:Extreme-CLI-Authorization = Enabled
admin
eric
268
albert Password = "", Service-Type = Administrative, Profile-Name = "Profile1" Filter-Id = "unlim" Extreme:Extreme-CLI-Authorization = Enabled lulu Password = "", Service-Type = Administrative, Profile-Name = "Profile1" Filter-Id = "unlim" Extreme:Extreme-CLI-Authorization = Enabled gerald Password = "", Service-Type = Administrative, Profile-Name "Profile2" Filter-Id = "unlim" Extreme:Extreme-CLI-Authorization = Enabled
Configuring TACACS+
Terminal Access Controller Access Control System Plus (TACACS+) is a mechanism for providing authentication, authorization, and accounting on a centralized server, similar in function to the RADIUS client. The ExtremeWare version of TACACS+ is used to authenticate prospective users who are attempting to administer the switch. TACACS+ is used to communicate between the switch and an authentication database. NOTE You cannot use RADIUS and TACACS+ at the same time. You can configure two TACACS+ servers, specifying the primary server address, secondary server address, and UDP port number to be used for TACACS+ sessions.
269
Security
You can specify a list of predefined clients that are allowed SSH2 access to the switch. To do this, you must create an access profile that contains a list of allowed IP addresses. You can also specify a TCP port number to be used for SSH2 communication. By default the TCP port number is 22. The supported ciphers are 3DES-CBC and Blowfish. The supported key exchange is DSA.
270
An authentication key must be generated before the switch can accept incoming SSH2 sessions. This can be done automatically by the switch, or you can enter a previously generated key. To have the key generated by the switch, use the following command:
configure ssh2 key
You are prompted to enter information to be used in generating the key. The key generation process takes approximately ten minutes. Once the key has been generated, you should save your configuration to preserve the key. To use a key that has been previously created, use the following command:
configure ssh2 key pregenerated
You are prompted to enter the pregenerated key. The key generation process generates the SSH2 private host key. The SSH2 public host key is derived from the private host key, and is automatically transmitted to the SSH2 client at the beginning of an SSH2 session. Before you initiate a session from an SSH2 client, ensure that the client is configured for any nondefault access list or TCP port information that you have configured on the switch. Once these tasks are accomplished, you may establish an SSH2-encrypted session with the switch. Clients must have a valid user name and password on the switch in order to log into the switch after the SSH2 session has been established. For additional information on the SSH protocol refer to [FIPS-186] Federal Information Processing Standards Publication (FIPSPUB) 186, Digital Signature Standard, 18 May 1994. This can be download from: ftp://ftp.cs.hut.fi/pub/ssh. General technical information is also available from: http://www.ssh.fi
271
Security
For example, to copy an image file saved as image1.xtr to switch with IP address 10.10.0.5 as the primary image using SCP2, you would enter the following command within your SSH2 session:
scp image1.xtr admin@10.20.0.5:primary.img
To copy the configuration from the switch and save it in file config1.save using SCP, you would enter the following command within your SSH2 session:
scp admin@10.10.0.5:configuration.cfg config1.save
The remote commands can be any commands acceptable by the remote system. You can specify the login user name as a separate argument, or as part of the user@host specification. If the login user name for the remote system is the same as your user name on the switch, you can omit the username parameter entirely. To initiate a file copy from a remote system to the switch using SCP2, use the following command:
scp2 {cipher [3des | blowfish]} {port <portnum>} {debug <debug_level>} <user>@[<hostname> | <ipaddress>]:<remote_file> [configuration {incremental} | image [primary | secondary] | bootrom]
To initiate a file copy to a remote system from the switch using SCP2, use the following command:
scp2 {cipher [3des | blowfish]} {port <portnum>} {debug <debug_level>} configuration <user>@[<hostname> | <ipaddress>]:<remote_file>
272
Part 2
This chapter describes the use of the Ethernet Automatic Protection Switching (EAPS) protocol, and includes information on the following topics: Overview of the EAPS Protocol on page 275 Fault Detection and Recovery on page 278 Multiple EAPS Domains Per Switch on page 280 Configuring EAPS on a Switch on page 282 Configuring EAPS Shared Ports on page 289 EAPS Shared Port Configuration Rules on page 293 EAPS Shared Port Configuration Examples on page 293
275
Transit node
Master node
EW_070
One port of the master node is designated the master nodes primary port (P) to the ring; another port is designated as the master nodes secondary port (S) to the ring. In normal operation, the master node blocks the secondary port for all non-control traffic belonging to this EAPS domain, thereby avoiding a loop in the ring, like STP. Layer 2 switching and learning mechanisms operate per existing standards on this ring.
NOTE Like the master node, each transit node is also configured with a primary port and a secondary port on the ring, but the primary/secondary port distinction is ignored as long as the node is configured as a transit node.
276
S4 S3 S5
S2 P S1
Direction of health-check message
S6 S
Secondary port is logically blocked Master node
EW_071
If the ring is complete, the master node logically blocks all data traffic in the transmit and receive directions on the secondary port to prevent a loop. If the master node detects a break in the ring, it unblocks its secondary port and allows data traffic to be transmitted and received through it.
EAPS Terms
Table 37 describes terms associated with EAPS. Table 37: EAPS Terms
Term EAPS domain Description A domain consists of a series of switches, or nodes, that comprise a single ring in a network. An EAPS domain consists of a master node, transit nodes, and on the master node, one primary port and one secondary port. EAPS operates by declaring an EAPS domain on a single ring. Extreme Discovery Protocol. A protocol used to gather information about neighbor Extreme switches. Extreme switches use EDP to exchange topology information. A switch, or node, that is designated the master in an EAPS domain ring. The master node blocks the secondary port for all non-control traffic belonging to this EAPS domain, thereby avoiding a loop in the ring. A switch, or node, that is not designated a master in an EAPS domain ring. A port on the master node that is designated the primary port to the ring. The transit node ignores the primary port distinction as long as the node is configured as a transit node. A port on the master node that is designated the secondary port to the ring. The transit node ignores the secondary port distinction as long as the node is configured as a transit node. A VLAN that sends and receives EAPS messages. You must configure one control VLAN for each EAPS domain.
secondary port
control VLAN
277
NOTE The control VLAN is not blocked. Messages sent on the control VLAN must be allowed into the switch for the master node to determine whether the ring is complete. To avoid loops in the network, the control VLAN must be NOT be configured with an IP address, and ONLY ring ports may be added to the VLAN. Figure 40: EAPS fault detection and protection switching
Break in ring
S4
S3
S3 sends "link down" message to master node
S5
S2 P S1 S
S6
Master node opens secondary port to allow traffic to pass Master node
EW_072
278
A master node detects a ring fault in one of three ways: Link-down message sent by a transit node Ring port down event sent by hardware layers Polling response
Polling
The master node transmits a health-check packet on the control VLAN at a user-configurable interval (see Figure 39). If the ring is complete, the master node will receive the health-check packet on its secondary port (the control VLAN is not blocked on the secondary port). When the master node receives the health-check packet, it resets its failtimer and continues normal operation. If the master node does not receive the health-check packet before the failtimer interval expires, and the failtime expiry action is set to open-secondary-port, it declares a failed state and performs the same steps described above: it unblocks its secondary port for access by the protected VLANs, flushes its forwarding database (FDB), and sends a flush FDB message to its associated transit nodes.
Restoration Operations
The master node continues sending health-check packets out its primary port even when the master node is operating in the failed state. As long as there is a break in the ring, the fail-period timer of the master node will continue to expire and the master node will remain in the failed state. When the broken link is restored, the master will receive its health-check packet back on its secondary port, and will once again declare the ring to be complete. It will logically block the protected VLANs on its secondary port, flush its FDB, and send a flush FDB message to its associated transit nodes.
279
During the time between when the transit node detects that the link is operable again and when the master node detects that the ring is complete, the secondary port on the master node is still open and data could start traversing the transit node port that just came up. To prevent the possibility of a such a temporary loop, when the transit node detects that its failed link is up again, it will perform these steps: 1 For the port that just came up, put all the protected VLANs traversing that port into a temporary blocked state. 2 Remember which port has been temporarily blocked. 3 Set the state to Preforwarding. When the master node receives its health-check packet back on its secondary port, and detects that the ring is once again complete, it sends a message to all its associated transit nodes to flush their forwarding databases. When the transit nodes receive the message to flush their forwarding databases, they perform these steps: 1 Flush their forwarding databases on the protected VLANs. 2 If the port state is set to Preforwarding, unblock all the previously blocked protected VLANs for the port.
S4 S3 Ring 1 S2 S5 S S1
Master node
S6 S7 Ring 2 S P S9
EW_073
S 8 Master node
280
To take advantage of the Spatial Reuse technology and broaden the use of the rings bandwidth, EAPS supports multiple EAPS domains running on the ring at the same time. So, a single ring might have two EAPS domains running on it. Each EAPS domain would have a different EAPS master node. Each EAPS domain will protect its own set of protected VLANS.
S4 S3 EAPS1
link ID=1
S5
Controller
S6 S7 EAPS2
Common link
S2
P S1
Master node
Partner
S S9
Master node
S8
S 10
EW_095
The switches on either end of the common link must be configured as controller and a partner. For information about configuring common links, see Configuring EAPS Shared Ports on page 289.
NOTE If the shared port is not configured and the common link goes down a superloop between the multiple EAPS domains will occur.
NOTE In order to take advantage of the Spatial Reuse technology in a shared-port environment in this software release, you can use the existing solution of configuring EAPS plus STP.
281
The name parameter is a character string of up to 32 characters that identifies the EAPS domain to be created. EAPS domain names and VLAN names must be unique: Do not use the same name string to identify both an EAPS domain and a VLAN. The following command example creates an EAPS domain named eaps_1:
create eaps eaps_1
One node on the ring must be configured as the master node for the specified domain; all other nodes on the ring are configured as transit nodes for the same domain. The following command example identifies this switch as the master node for the EAPS domain named eaps_1.
configure eaps eaps_1 mode master
The following command example identifies this switch as a transit node for the EAPS domain named eaps_1.
configure eaps eaps_1 mode transit
282
To configure the action taken if there is a break in the ring, use the following command:
configure eaps <name> failtime expiry-action [ open-secondary-port | send-alert]
NOTE These commands apply only to the master node. If you configure the polling timers for a transit node, they will be ignored. If you later reconfigure that transit node as the master node, the polling timer values will be used as the current values. Use the hellotime keyword and its associated seconds parameter to specify the amount of time the master node waits between transmissions of health-check packets on the control VLAN. seconds must be greater than 0 when you are configuring a master node. The default value is one second.
NOTE Increasing the hellotime value keeps the processor from sending and processing too many health-check packets. Increasing the hellotime value should not affect the network convergence time, because transit nodes are already sending link down notifications. Use the failtime keyword and seconds parameters to specify the amount of time the master node waits before the failtimer expires. The seconds parameter must be greater than the configured value for hellotime. The default value is three seconds. You can configure the action taken when the failtimer expires by using the configure failtimer expiry-action command. Use the send-alert parameter to send an alert when the failtimer expires. Instead of going into a failed state, the master node remains in a Complete or Init state, maintains the secondary port blocking, and writes a critical error message to syslog warning the user that there is a fault in the ring. An SNMP trap is also sent. To use the failtimer expiry action of earlier releases, use the open-secondary-port parameter.
NOTE Increasing the failtime value provides more protection by waiting longer to receive a health-check packet when the network is congested. The following command examples configure the hellotime value for the EAPS domain eaps_1 to 2 seconds, the failtime value to 15 seconds, and the failtime expiry-action to open the secondary port if the failtimer expires:
configure eaps eaps_1 hellotime 2 configure eaps eaps_1 failtime 15 configure eaps eaps_1 failtimer expiry-action open-secondary-port
283
The following command example adds port 1 of the module installed in slot 8 of the BlackDiamond switch to the EAPS domain eaps_1 as the primary port.
configure eaps eaps_1 primary port 8:1
NOTE The control VLAN must NOT be configured with an IP address. In addition, only ring ports may be added to this control VLAN. No other ports can be members of this VLAN. Failure to observe these restrictions can result in a loop in the network.
NOTE When you configure the VLAN that will act as the control VLAN, that VLAN must be assigned a QoS profile of Qp8, and the ring ports of the control VLAN must be tagged. By assigning the control VLAN a QoS profile of Qp8 (with the QoS profile HighHi priority setting), you ensure that EAPS control VLAN traffic is serviced before any other traffic and that control VLAN messages reach their intended destinations. For example, if the control VLAN is not assigned the highest priority and a broadcast storm occurs in the network, the control VLAN messages might be dropped at intermediate points. Assigning the control VLAN the highest priority prevents dropped control VLAN messages. Because the QoS profile HighHi priority setting by itself should ensure that the control VLAN traffic gets through a congested port first, you should not need to set the QoS profile minimum bandwidth
284
(minbw) or maximum bandwidth (maxbw) settings. However, if you plan to use QoS (profile priority and bandwidth settings) for other traffic, you might need to set a minbw value on Qp8 for control VLAN traffic. Whether you need to do this depends entirely on your configuration. The following command example adds the control VLAN keys to the EAPS domain eaps_1.
configure eaps eaps_1 add control vlan keys
NOTE As long as the ring is complete, the master node blocks the protected VLANs on its secondary port. The following command example adds the protected VLAN orchid to the EAPS domain eaps_1.
configure eaps eaps_1 add protect vlan orchid
NOTE The configuration of the Superbridge, SubBridge, and IP range control VLANs cannot be modified.
To disable the EAPS function for the entire switch, use the following command:
disable eaps
285
The following command example unconfigures this nodes EAPS primary ring port on the domain eaps_1:
unconfigure eaps eaps_1 primary port
Mo -T T T
EAPS shared-port count: 1 Link Shared-port Mode Id Up State ----------- ---------- ---- -- --------1:1 Controller 2 Y Ready EAPS Domain list: "eaps2" "eaps3" "eaps4" Domain Vlan count count ------ ----3 1 RB RB Nbr State Id --- ------- ----Yes None None
To display more detailed EAPS status information, use the following command:
show eaps {<name>} [detail]
If you enter the show eaps command without an argument or keyword, the command displays a summary of status information for all configured EAPS domains. You can use the detail keyword to display more detailed status information.
NOTE The output displayed by this command depends on whether the node is a transit node or a master node. The display for a transit node contains information fields that are not shown for a master node. Also, some state values are different on a transit node than on a master node.
286
The following example of the show eaps {<name>} detail command displays detailed EAPS information for a transit node. Table 38 describes the fields and values in the display.
* Summit5iTx:39 # show eaps detail EAPS Enabled: Yes Number of EAPS instances: 1 EAPSD-Bridge links: 2 Name: eaps1 (instance=0) State: Links Up [Running: Yes] Enabled: Yes Mode: Transit Primary port: 13 Port status: Up Tag status: Tagged Secondary port: 14 Port status: Up Tag status: Tagged Hello Timer interval: 1 sec Fail Timer interval: 3 sec Preforwarding Timer interval: 3 sec Last update: From Master Id 00:01:30:B9:4B:E0, at Tue May 6 12:49:25 2003 Eaps Domain has following Controller Vlan: Vlan Name VID QosProfile rhsc 0020 QP8 EAPS Domain has following Protected Vlan(s): Vlan Name VID traffic 1001 Number of Protected Vlans: 1
The following example of the show eaps {<name>} detail command displays detailed EAPS information for a single EAPS domain named eaps2 on the master node. Table 38 describes significant fields and values in the display.
* Baker15:4 # show eaps2 detail Name: eaps2 (instance=0) State: Complete [Running: Yes] Enabled: Yes Mode: Master Primary port: 14 Port status: Up Tag status: Tagged Secondary port: 13 Port status: Blocked Tag status: Tagged Hello Timer interval: 1 sec Fail Timer interval: 3 sec Failtimer expiry action: Send alert Last update: From Master Id 00:01:30:B9:4B:E0, at Tue May 6 12:49:25 2003 Eaps Domain has following Controller Vlan: Vlan Name VID QosProfile rhsc 0020 QP8 EAPS Domain has following Protected Vlan(s): Vlan Name VID blue 1003 traffic 1001 Number of Protected Vlans: 2
Displays only when Fast Convergence is on. Number of EAPS domains created. The maximum number of EAPS domains per switch is 64.
287
[Running: ] Enabled:
The configured EAPS mode for this switch: transit (T) or master (M). The port numbers assigned as the EAPS primary and secondary ports. On the master node, the port distinction indicates which port is blocked to avoid a loop. UnknownThis EAPS domain is not running, so the port status has not yet been determined. UpThe port is up and is forwarding data. DownThe port is down. BlockedThe port is up, but data is blocked from being forwarded.
Port status:
288
The configured value of the timer in seconds, specifying the time that the master node waits between transmissions of health-check packets. The configured value of the timer in seconds, specifying the time that the master node waits before the failtimer expires. Displays the action taken when the failtimer expires: Send-alertSends a critical message to the syslog when the failtimer expires. Open-secondary-portOpens the secondary port when the failtimer expires.
Displays only for master nodes. Preforwarding Timer interval:1 Last update:1 The configured value of the timer. This value is set internally by the EAPS software. Displayed only for transit nodes; indicates the last time the transit node received a hello packet from the master node (identified by its MAC address). Lists the assigned name and ID of the control VLAN. Lists the assigned names and VLAN IDs of all the protected VLANs configured on this EAPS domain. The count of protected VLANs configured on this EAPS domain. Vlans:2
EAPS Domain has Controller Vlans: EAPS Domain has Protected Number of Protected Vlans:
1. These fields apply only to transit nodes; they are not displayed for a master node. 2. This list is displayed when you use the detail keyword in the show eaps command.
289
Steady State
In steady state when the common link is up, both the controller and partner are said to be in the ready state. After EAPS has converged and the EAPS master node has blocked its own secondary ports, the controller puts all its ports into forwarding, and goes back to ready state. Figure 43: Multiple EAPS Domain Steady State
S3
P2
EAPS1
P3
S9
P4
S1
Controller
P1
S6
EAPS2
EAPS3
S4
Common link
S7 S8
S10
P5
S2
Partner
P6
P8
Master P7
S5
Master
S11
Master
EW_102a
Figure 43 shows a multiple EAPS domain steady state, where: EAPS1 is the EAPS domain for ring S1, S3, S4, S5, and S2 EAPS2 is the EAPS domain for ring S1, S6, S7, S8, and S2 EAPS3 is the EAPS domain for ring S1, S9, S10, S11, and S2 P1, P2, P3, and P4 are the ports on switch S1 P5, P6, P7, and P8 are the ports on switch S2 S5, S8, and S11 are the master nodes of their respective EAPS domains S3, S4, S6, S7, S9, and S10 are the transit nodes of their respective EAPS domains S1 and S2 are running EAPSv2 S1 is the controller S2 is the partner P1 is the EAPS shared port on switch S1 P5 is the EAPS shared port on switch S2
290
S3
P2 Active-Open
P3 EAPS3
S9
S1
Controller P4
S6 S7 S10
S4
EAPS1
P1
x
S2
Partner
EAPS2
S8
Master
S5
Master
S11
Master
EW_102b
When the common link is restored, the controller goes into Preforwarding state. After it gets notification from the master nodes that they have converged and blocked their secondary ports, the controller opens all ports.
NOTE A switch can have a maximum of two shared ports. To delete a shared port on the switch, use the following command:
delete eaps shared-port <port>
291
To configure the mode of the shared port, use the following command:
configure eaps shared-port <port> mode <controller | partner>
CAUTION The master secondary port cannot be a shared port. If the master primary port is a shared port, you must configure the partner before you configure the controller.
If you enter the show eaps shared-port command without an argument or keyword, the command displays a summary of status information for all configured EAPS shared ports. You can use the detail keyword to display more detailed status information about the segments and VLANs associated with each shared port.
292
Basic Configuration
This example, shown in Figure 45, is the most basic configuration; two EAPS domains with a single common link between them. Figure 45: EAPS shared port basic configuration
S4 S3 EAPS1
link ID=1
S5
Controller
S6 S7 EAPS2
Common link
S2
P S1
Master node
Partner
S S9
Master node
S8
S 10
EW_095
293
S4
P1:2 P1:3
S7 S5 S9 EAPS2
Controller EAPS3
S
S 12
S3 EAPS1
Controller
P1:1
Common link
link ID=1
S 11
P Master node
S2
P
S6
Partner
S 10
Partner
S
S1
Master node
S8
Master node
EAPS4
S 13
EW_096
S5
P
EAPS1
link ID=2
S6 S7 S 10 EAPS4
S Master node
S 4 Controller
Common link
Partner Controller
EAPS2 S3
P
Common link
link ID=1
EAPS3 S2
Master node
S9
P S
Partner
S
S1
S8
S 11
EW_097
294
S7 S4 S3 EAPS1
Master node P
S8 EAPS5
link ID=3
S5
Partner Controller
S9
Controller Partner
EAPS4 EAPS3
S 14
Common link
Common link
link ID=1
Master node
S2
Partner
S
S 13
P S
EAPS2
P
Controller
S1
S6
S 10
S
S 15
P Master node
EW_098
S 12
Master
S 11
S4 EAPS3
S S
S3 S2
Partner
S
S5
Partner Master
Controller
link ID=40
S6
Controller
EAPS4
link ID=30
EAPS5 EAPS1
link ID=50
S Master node
Master node
S1
P
S7
Controller Partner Controller
link ID=20 P
S 12
Partner
S8
S 11
S
EAPS2
P
S9
Master node
S 10
EW_099
295
Advanced Configuration
Figure 50 shows an extension of the Basic Core and Right Angle configuration. Figure 50: Advanced configuration
S3
Master node S
S4
Partner Master
S5
Controller
Controller
link ID=1
S2 EAPS5 S1
Common link
link ID=2
EAPS2
link ID=4
EAPS3
Common link
S6
EAPS1
Partner Master Controller Partner
Partner Controller
S 14
S
S 13
S 12
EAPS6 S9
S
S7 S8
EAPS4 S 11
S
S 10
EW_101
296
This chapter covers the following topics: Overview of the Spanning Tree Protocol on page 297 Spanning Tree Domains on page 298 STP Configurations on page 300 Per-VLAN Spanning Tree on page 306 Rapid Spanning Tree Protocol on page 306 STP Rules and Restrictions on page 317 Configuring STP on the Switch on page 317 Displaying STP Settings on page 321 Using the Spanning Tree Protocol (STP) functionality of the switch makes your network more fault tolerant. The following sections explain more about STP and the STP features supported by ExtremeWare. NOTE STP is a part of the 802.1d bridge specification defined by the IEEE Computer Society. To explain STP in terms used by the 802.1d specification, the switch will be referred to as a bridge.
297
STPD Modes
An STPD has two modes of operation 802.1d mode Use this mode for backward compatibility with previous STP versions and for compatibility with third-party switches using IEEE standard 802.1d. When configured in this mode, all rapid configuration mechanisms are disabled. 802.1w mode Use this mode for compatibility with Rapid Spanning Tree (RSTP). When configured in this mode, all rapid configuration mechanisms are enabled. This mode is available for point-to-point links only. RSTP is enabled or disabled on a per STPD basis only. You do not enable RSTP on a per port basis. For more information about RSTP and RSTP features, see Rapid Spanning Tree Protocol on page 306. By default, the: STPD operates in 802.1d mode Default device configuration contains a single STPD called s0 Default VLAN is a member of STPD s0 To configure the mode of operation of an STPD, use the following command:
configure stpd <spanning tree name> mode [dot1d | dot1w]
298
Port Modes
An STP port has three modes of operation: 802.1d mode This mode is used for backward compatibility with previous STP versions and for compatibility with third-party switches using IEEE standard 802.1d. BPDUs are sent untagged in 1D mode. Because of this, on any given physical interface there can be only one STPD running in 1D mode. Extreme Multiple Instance Spanning Tree Protocol (EMISTP) mode EMISTP mode is an extension of STP that allows a physical port to belong to multiple STPDs by assigning the port to multiple VLANs. EMISTP adds significant flexibility to STP network design. BPDUs are sent with an 802.1Q tag having an STPD instance Identifier (StpdID) in the VLANid field. PVST+ mode This mode implements PVST+ in compatibility with third-party switches running this version of STP. The STPDs running in this mode have a one-to-one relationship with VLANs, and send and process packets in PVST+ format. These port modes are for STP ports, not for physical ports. When a physical port belongs to multiple STPDs, it is associated with multiple STP ports. It is possible for the physical port to run in different modes for different domains to which it belongs.
STPD Identifier
An StpdID is used to identify each STP domain. You assign the StpdID when configuring the domain, and that VLAN cannot belong to another STPD. An StpdID must be identical to the VLANid of one of the member VLANs in that STP domain.
NOTE If an STPD contains at least one port not in 1D mode, the STPD must be configured with an StpdID.
If you have a known topology and have switches outside of your network within your STPD, use this feature to keep the root bridge within your network.
299
learning phases. Rapid root failover occurs only when the link goes down, and not when there is any other root port failure, such as missing BPDUs. The default setting is disabled. To enable rapid root failover, use the following command:
enable stpd <spanning tree name> rapid-root-failover
STP Configurations
When you assign VLANs to an STPD, pay careful attention to the STP configuration and its effect on the forwarding of VLAN traffic. This section describes three types of STP configurations: Basic STP Multiple STPDs on a single port (EMISTP) A VLAN that spans multiple STPDs
300
STP Configurations
Switch B
Switch Z Switch M
STPD 1
STPD 2
EW_011
When the switches in this configuration start up, STP configures each STPD such that there are no active loops in the topology. STP could configure the topology in a number of ways to make it loop-free. In Figure 51, the connection between switch A and switch B is put into blocking state, and the connection between switch Y and switch Z is put into blocking state. After STP converges, all the VLANs can communicate, and all bridging loops are prevented. The VLAN Marketing, which has been assigned to both STPD1 and STPD2, communicates using all five switches. The topology has no loops, because STP has already blocked the port connection between switch A and switch B, and between switch Y and switch Z. Within a single STPD, you must be extra careful when configuring your VLANs. Figure 52 illustrates a network that has been incorrectly set up using a single STPD so that the STP configuration disables the ability of the switches to forward VLAN traffic.
301
Switch 1 Switch 2
Switch 3
EW_012
The tagged trunk connections for three switches form a triangular loop that is not permitted in an STP topology. All VLANs in each switch are members of the same STPD. STP can block traffic between switch 1 and switch 3 by disabling the trunk ports for that connection on each switch. Switch 2 has no ports assigned to VLAN marketing. Therefore, if the trunk for VLAN marketing on switches 1 and 3 is blocked, the traffic for VLAN marketing will not be able to traverse the switches.
NOTE If an STPD contains multiple VLANs, all VLANs must be configured on all ports in that domain, except for ports that connect to hosts (edge ports).
302
STP Configurations
S1
S2
S1
S2
B
EW_082
The two switches are connected by a pair of parallel links. Both switches run two VLANs, A and B. To achieve load-balancing between the two links using the traditional approach, you would have to associate A and B with two different STPDs, called S1 and S2, respectively, and make the left link carry VLAN A traffic while the right link carry VLAN B traffic (or vice versa). If the right link fails, S2 is broken and VLAN B traffic is disrupted. To optimize the solution, you can use the Extreme Multiple Instance Spanning (EMISTP) mode, which allows a port to belong to multiple STPDs. EMISTP adds significant flexibility to STP network design. Referring to Figure 53, using EMISTP, you can configure all four ports to belong to both VLANs. Assuming that S1 and S2 still correspond to VLANs A and B, respectively, you can fine-tune STP parameters to make the left link active in S1 and blocking in S2, while the right link is active in S2 and blocking in S1. Once again, if the right link fails, the left link is elected active by the STP algorithm for S2, without affecting normal switching of data traffic. Using EMISTP, an STPD becomes more of an abstract concept. It does not necessarily correspond to a physical domain. It is better regarded as a vehicle to carry VLANs that have STP instances. Because VLANs can overlap, so do STPDs. However, even if the different STPDs share the entire topology or part of the redundant topology, the STPDs react to topology change events in an independent fashion.
303
The complexity of the STP algorithm increases, and performance drops, with the size and complexity of the network. The 802.1d standard specifies a maximum network diameter of 7 hops. By segregating a big VLAN into multiple STPDs, you reduce complexity and enhance performance. Local to each site, there may be other smaller VLANs that share the same redundant looped area with the large VLAN. Some STPDs must be created to protect those VLAN. The ability to partition VLANs allows the large VLAN to be piggybacked in those STPDs in a site-specific fashion. Figure 54 has five domains. VLANs green, blue, brown, and yellow are local to each domain. VLAN red spans all of the four domains. Using a VLAN that spans multiple STPDS, you do not have to create a separate domain for VLAN red. Instead, VLAN red is piggybacked onto those domains local to other VLANs. Figure 54: VLAN Spanning Multiple STPDs
EW_083
In addition, the configuration in Figure 54 has these features: Each site can be administered by a different organization or department within the enterprise. Having a site-specific STP implementation makes the administration more flexible and convenient. Between the sites the connection usually traverse distribution switches in ways that are known beforehand to be safe with STP. In other words, the looped areas are already well-defined.
304
STP Configurations
S1 S1
S2 S2
Correct
Wrong
EW_084
The VLAN partition feature is deployed under the premise that the overall inter-domain topology for that VLAN is loop-free. Consider the case in Figure 56, VLAN red (the only VLAN in the figure) spans domains 1, 2, and 3. Inside each domain, STP produces a loop-free topology. However, VLAN red is still looped, because the three domains form a ring among themselves. Figure 56: Looped VLAN topology
Domain 2 Domain 1
Domain 3
EW_085
A necessary (but not sufficient) condition for a loop-free inter-domain topology is that every two domains only meet at a single crossing point.
NOTE Newly created EMISTP VLANs are not associated with STPD s0 by default.
305
NOTE In this document, PVST and PVST+ are used interchangeably. PVST+ is an enhanced version of PVST that is interoperable with 802.1Q STP. The following discussions are in regard to PVST+, if not specifically mentioned.
Native VLAN
In PVST+, the native VLAN must be peered with default VLAN on Extreme devices, as both are the only VLAN allowed to send and receive untagged packets on the physical port. Third-party PVST+ devices send VLAN 1 packets in a special manner. ExtremeWare does not support PVST+ for VLAN 1. Therefore, when the switch receives a packet for VLAN 1, the packet is dropped. When a PVST+ instance is disabled, the fact that PVST+ uses a different packet format raises an issue. If the STPD also contains ports not in PVST+ mode, the flooded packet has an incompatible format with those ports. The packet is not recognized by the devices connected to those ports. Therefore, ExtremeWare has the following limitation: If an STPD contains both PVST+ and non-PVST+ ports, the STPD must not be disabled. Otherwise, the BPDUs are flooded in the format of the incoming STP port.
306
RSTP Terms
Table 39 describes the terms associated with RSTP. Table 39: RSTP Terms
Term root port Description Provides the shortest path to the root bridge. All bridges except the root bridge, contain one root port. For more information about the root port, see Port Roles on page 307. Provides the shortest path connection to the root bridge for the attached LAN segment. There is only one designated port on each LAN segment. For more information about the designated port, see Port Roles on page 307. Supplies an alternate path to the root bridge and the root port. For more information about the alternate port, see Port Roles on page 307. Supports the designated port on the same attached LAN segment. Backup ports only exist when the bridge is connected as a self-loop or to a shared-media segment. For more information about the backup port, see Port Roles on page 307. Ports that connect to non-STP devices such as routers, endstations, and other hosts. Edge ports are not part of the RSTP configuration. The bridge with the best bridge identifier selected to be the root bridge. There is only one root bridge in the network. The root bridge is the only bridge in the network that does not have a root port.
designated port
RSTP Concepts
This section describes important RSTP concepts.
Port Roles
RSTP uses information from BPDUs to assign port roles for each LAN segment. Port roles are not user-configurable. Port role assignments are determined based on the following criteria: A unique bridge identifier (MAC address) associated with each bridge The path cost associated with each bridge port A port identifier associated with each bridge port
307
RSTP assigns one of four port roles to bridge ports in the network, as described in Table 40.
Designated
Alternate Backup
When RSTP stabilizes, all: Root ports and designated ports are in the forwarding state Alternate ports and backup ports are in the blocking state RSTP makes the distinction between the alternate and backup port roles to describe the rapid transition of the alternate port to the forwarding state if the root port fails. Ports that connect to non-STP devices are edge ports. Edge ports do not participate in RSTP, and their role is not confirmed. Edge ports immediately enter the forwarding state.
Link Types
You can configure the link type of a port in an STPD. RSTP tries to rapidly move designated point-to-point links into the forwarding state when a network topology change or failure occurs. For rapid convergence to occur, the port must be configured as a point-to-point link. Table 41 describes the link types.
308
Configuring Link Types. By default, all ports are broadcast links. To configure the ports in an STPD, use the following command:
configure stpd <spanning tree name> port link-type [auto | edge | broadcast | point-to-point] <portlist>
autoConfigures the ports as auto links. If the link is in full duplex mode, or if link aggregation is enabled on the port, an auto link behaves like a point-to-point link. edgeConfigures the ports as edge ports. point-to-pointConfigures the ports for an RSTP environment. To display detailed information about the ports in an STPD, use the following command:
show stpd <spanning tree domain> ports <portlist>
RSTP Timers
For RSTP to rapidly recover network connectivity, RSTP requires timer expiration. RSTP derives many of the timer values from the existing configured STP timers to meet its rapid recovery requirements rather than relying on additional timer configurations. Table 42 describes the user configurable timers, and Table 43 describes the timers that are derived from other timers and not user configurable. Table 42: User configurable timers
Timer Hello Description The root bridge uses the hello timer to send out configuration BPDUs through all of its forwarding ports at a pre-determined, regular time interval. The default value is 2 seconds. The range is 1 to 10 seconds. A port moving from the blocking state to the forwarding state uses the forward delay timer to transition through the listening and learning states. In RSTP, this timer complements the rapid configuration behavior. If none of the rapid rules are in effect, the port uses legacy STP rules to move to the forwarding state. The default is 15 seconds. The range is 4 to 30 seconds.
Forward delay
Topology Change
Message age
A port uses the message age timer to time out receiving BPDUs. When a port receives a superior or equal BPDU, the timer restarts. When the timer expires, the port becomes a designated port and a configuration update occurs. If the bridge operates in 1w mode and receives an inferior BPDU, the timer expires early. The default value is the same as the STPD bridge max age parameter.
309
Recent root
The Protocol migration timer is neither user-configurable nor derived; it has a set value of 3 seconds. The timer starts when a port transitions from STP (802.1d) mode to RSTP (802.1w) mode and vice versa. This timer must expire before further mode transitions can occur.
RSTP Operation
In an RSTP environment, there are two bridges on a point-to-point link LAN segment. A switch that considers itself the unique, designated bridge for the attached LAN segment sends a propose message to the other bridge to request a confirmation of its role. The other bridge on that LAN segment replies with an agree message if they agree with the proposal. The receiving bridge immediately moves its designated port into the forwarding state. Before a bridge replies with an agree message, it reverts all of its designated ports into the blocking state. This introduces a temporary partition into the network. The bridge then sends another propose message on all of its designated ports for further confirmation. Since all of the connections are blocked, the bridge immediately sends an agree message to unblock the proposing port without having to wait for further confirmations to come back or without the worry of temporary loops. Beginning with the root bridge, each bridge in the network engages in the exchange of propose and agree messages until they reach the edge ports. Edge ports connect to non-STP devices and do not participate in RSTP. Their role does not need to be confirmed. If an edge port receives a BPDU, it enters an inconsistency state. An inconsistency state puts the edge port into the blocking state and starts the message age timer. Every time the edge port receives a BPDU, the message age timer restarts. The edge port remains in the blocking state until no further BPDUs are received and the message age timer expires. RSTP attempts to transition root ports and designated ports to the forwarding state and alternate ports and backup ports to the blocking state as rapidly as possible. A port transitions to the forwarding state if any of the following is true. The port: Has been in either a root or designated port role long enough that the spanning tree information supporting this role assignment has reached all of the bridges in the network. NOTE RSTP is backward compatible with STP, so if a port does not move to the forwarding state with any of the RSTP rapid transition rules, a forward delay timer starts and STP behavior takes over. Is now a root port and no other ports have a recent role assignment that contradicts with its root port role.
310
Is a designated port and attaches to another bridge by a point-to-point link and receives an agree message from the other bridge port. Is an edge port. An edge port is a port connected to a non-STP device and is in the forwarding state. The preceding sections provide more information about RSTP behavior.
S5
Master
S11
Master
EW_102a
If the backup port receives the BPDU first, STP processes this packet and temporarily elects this port as the new root port while the designated ports role remains unchanged. If the new root port is immediately put into the forwarding state, there is a loop between these two ports. To prevent this type of loop from occurring, the recent backup timer starts. The root port transition rule does not allow a new root port to be in the forwarding state until the recent backup timer expires. Another situation may arise if you have more than one bridge, and you lower the port cost for the alternate port which makes it the new root port. The previous root port is now an alternate port. Depending on your STP implementation, STP may set the new root port to the forwarding state before setting the alternate port to the blocking state. This may cause a loop.
311
To prevent this type of loop from occurring, the recent root timer starts when the port leaves the root port role. The timer stops if the port enters the blocking state. RSTP requires that the recent root timer stops on the previous root port before the new root port can enter the forwarding state.
Rapid Reconvergence
This section describes the RSTP rapid behavior following a topology change. In this example, the bridge priorities are assigned based on the order of their alphabetical letters; bridge A has a higher priority than bridge F.
312
Suppose we have a network, as shown in Figure 58, with six bridges (bridge A through bridge F) where the following is true: Bridge A is the root bridge Bridge D contains an alternate port in the blocking state All other ports in the network are in the forwarding state Figure 58: Initial network configuration
A
A,0
B
A,1
C
A,2
F
A,1
Designated port Root port
E
A,2
Blocked port
D
A,3
EW_103a
The preceding steps describe how the network reconverges. 1 If the link between bridge A and bridge F goes down, bridge F detects the root port is down. At this point, bridge F: Immediately deletes that port from the STP Performs a configuration update After the configuration update, bridge F: Considers itself the new root bridge Sends a BPDU message on its designated port to bridge E Figure 59: Down link detected
A
A,0
Down link
B
A,1
C
A,2
BPDU
F
F,0
Designated port Root port
E
A,2
D
A,3
EW_103b
313
2 Bridge E believes that bridge A is the root bridge. When bridge E receives the BPDU on its root port from bridge F, bridge E: Determines that it received an inferior BPDU. Immediately begins the max age timer on its root port Performs a configuration update After the configuration update, bridge E: Regards itself as the new root bridge Sends BPDU messages on both of its root ports to bridges F and D, respectively Figure 60: New root bridge selected
A
A,0
B
A,1
Designated port
C
A,2
F
F,0
E
E,0
BPDU
D
A,3
Root port
EW_103c
3 When bridge F receives the superior BPDU and configuration update from bridge E, bridge F: Decides that the receiving port is the root port Determines that bridge E is the root bridge. Figure 61: Communicating new root bridge status to neighbors
A
A,0
B
A,1
Designated port
C
A,2
F
E,1
E
E,0
D
A,3
Root port
EW_103d
314
4 Bridge D believes that bridge A is the root bridge. When bridge D receives the BPDU from bridge E on its alternate port, bridge D: Immediately begins the max age timer on its alternate port Performs a configuration update After the configuration update, bridge D: Moves the alternate port to a designated port Sends a propose message to bridge E to solicit confirmation of its designated role and to rapidly move the port into the designated state Figure 62: Sending a propose message to confirm a port role
A
A,0
B
A,1
Designated port
C
A,2
F
E,1
E
E,0
Propose BPDU
D
A,3
Root port
EW_103e
5 Upon receiving the proposal, bridge E: Performs a configuration update Changes its receiving port to a root port The existing designated port enters the blocking state Bridge E then sends: A propose message to bridge F An agree message from its root port to bridge D. Figure 63: Communicating port status to neighbors
A
A,0
Designated port
B
A,1
Root port
C
A,2
F
E,1
E
A,4
Agree BPDU
D
A,3
EW_103f
315
6 To complete the topology change, the following occurs: Bridge D moves the port that received the agree message into the forwarding state Bridge F confirms that its receiving port (the port that received the propose message) is the root port, and immediately replies with an agree message to bridge E to unblock the proposing port Figure 64: Completing the topology change
A
A,0
B
A,1
Root port Designated port
C
A,2
F
A,5
E
A,4
D
A,3
EW_103g
Figure 65 displays the new topology. Figure 65: Final network configuration
A
A,0
B
A,1
Root port Designated port
C
A,2
F
A,5
E
A,4
D
A,3
EW_103h
316
NOTE STPD, VLAN, and QoS profile names must all be unique. For example, a name used to identify a VLAN cannot be used when you create an STPD or a QoS profile. 2 Add one or more VLANs to the STPD using the following command:
configure stpd <spanning tree name> add vlan <vlan name>
3 Enable STP for one or more STP domains using the following command:
enable stpd {<spanning tree name>}
After you have created the STPD, you can optionally configure STP parameters for the STPD.
NOTE You should not configure any STP parameters unless you have considerable knowledge and experience with STP. The default STP parameters are adequate for most networks. The following parameters can be configured on each STPD: Hello time Forward delay Max age
317
Bridge priority StpdID The following parameters can be configured on each port: Path cost Port priority Port mode NOTE The device supports the RFC 1493 Bridge MIB. Parameters of only the s0 default STPD are accessible through this MIB.
NOTE If an STPD contains at least one port not in dot1D mode, the STPD must be configured with an StpdID.
318
EW_083
The following commands configure the switch located between S1 and S2:
create vlan red configure red tag 100 configure red add ports 1-4 tagged create vlan green configure green tag 200 configure green add ports 1-2 tagged create vlan yellow configure yellow tag 300 configure yellow add ports 3-4 tagged create stpd s1 configure stpd s1 add green configure stpd s1 tag 200 configure stpd s1 add red ports 1-2 emistp create stpd s2 configure stpd s2 add yellow configure stpd s2 tag 300 configure stpd s2 add red ports 3-4 emistp
319
Add the VLANs to the STPD Configure the port link types Enable STP Figure 67: RSTP example
Switch B
Switch Z Switch M
STPD 1
STPD 2
EW_011
In this example, the commands configure switch A in STPD1 for rapid reconvergence. Use the same commands to configure each switch and STPD in the network.
create stpd stpd1 configure stpd stpd1 mode dot1w create vlan sales create vlan personnel create vlan marketing configure vlan sales add ports 1,2 tagged configure vlan personnel add ports 1,2 tagged configure vlan marketing add ports 1,2 tagged configure stpd stpd1 add vlan sales configure stpd stpd1 add vlan personnel configure stpd stpd1 add vlan marketing configure stpd stpd1 ports link-type point-to-point 1,2 enable stpd stpd1
320
This command displays the following information: STPD name STPD state STPD mode of operation Rapid Root Failover Tag Ports Active VLANs Bridge Priority Bridge ID Designated root STPD configuration information To display the STP state of a port, use the following command:
show stpd <spanning tree name> ports {detail}
This command displays the following information: STPD port configuration STPD port mode of operation STPD path cost STPD priority STPD state (root bridge, and so on) Port role (root bridge, edge port, etc.) STPD port state (forwarding, blocking, and so on) Configured port link type Operational port link type If you have a VLAN that spans multiple STPDs, use the show vlan <vlan name> stpd command to display the STP configuration of the ports assigned to that specific VLAN. The command displays the following: STPD port configuration STPD port mode of operation STPD path cost STPD priority STPD state (root bridge, and so on) Port role (root bridge, edge port, etc.)
321
STPD port state (forwarding, blocking, and so on) Configured port link type Operational port link type
322
This chapter covers the following topics: Overview of ESRP on page 323 ESRP Concepts on page 325 Determining the ESRP Master on page 326 Advanced ESRP Features on page 329 Displaying ESRP Information on page 338 Using ELRP with ESRP on page 339 ESRP Examples on page 342 ESRP Cautions on page 345
Overview of ESRP
ESRP is a feature of ExtremeWare that allows multiple switches to provide redundant routing services to users. From the workstations perspective, there is only one default router (that has one IP address and one MAC address), so ARP cache entries in client workstations do not need to be refreshed or aged-out. In addition to providing layer 3 routing redundancy for IP and IPX, ESRP also provides for layer 2 redundancy. These layered redundancy features can be used in combination or independently. You do not have to configure the switch for routing to make valuable use of ESRP. The layer 2 redundancy features of ESRP offer fast failure recovery and provide for dual-homed system design. In some instances, depending on network system design, ESRP can provide better resiliency than using Spanning Tree Protocol (STP) or Virtual Router Redundancy Protocol (VRRP). We recommended that all switches participating in ESRP run the same version of ExtremeWare. Not all ESRP features are available in all ExtremeWare software releases.
323
ESRP Terms
Table 44 describes terms associated with ESRP. Table 44: ESRP Terms
Term ESRP-aware Description An Extreme switch that is capable of listening to EDP which is the protocol that ESRP uses to transmit information. For more information see ESRP Concepts on page 325. An Extreme switch with the ESRP feature enabled. ESRP-enabled switches include the ESRP master and slave switches. Extreme Discovery Protocol. A protocol used by ESRP to communicate information about neighbor Extreme switches. The master and the slave utilize EDP to send hello packets that contain timers, port count, and other state information pertinent to ESRP. The master switch is the device with the highest priority based on the election algorithm. The master is responsible for responding to clients for layer 3 routing and layer 2 switching for the VLAN. For more information about the master switch, see Determining the ESRP Master on page 326. An ESRP switch that is ready to be master but is going through possible loop detection prior to transitioning to master. For more information about the behavior of the pre-master switch, see Pre-Master Switch Behavior on page 327. A switch participating in ESRP that is not elected or configured the master. The slave switch does not respond to ARP requests, but it does exchange EDP packets with other switches on the same VLAN. The slave switch is available to assume the responsibilities of the master switch if the master becomes unavailable or criteria for ESRP changes. For more information about the behavior of the slave switch, see Slave Switch Behavior on page 327. A user-defined criteria to determine how the master and the slave interact with each other. The election algorithm also determines which device becomes the master or the slave and how ESRP makes those decisions. For more information about the election algorithms, see ESRP Election Algorithms on page 328. A user-defined field to set the priority values for ESRP. The range of the priority value is 0 to 255; a higher number has higher priority. The default priority setting is 0. A priority setting of 255 loses the election and the switch remains in slave mode. To learn more about configuring priority values for ESRP, see Electing the Master Switch on page 327. ESRP uses tracking mechanisms to determine a master. Should the ESRP master lose the ability to track a selected mechanism, the ESRP slave assumes master. For more information about the tracking methods used by ESRP, see ESRP Tracking on page 329. Domains are a method of increasing scalability for ESRP by creating a domain master VLAN that controls ESRP election and failover criteria for member-VLANs. The VLAN that ESRP is enabled on and controls the member-VLANs. The VLAN that is controlled by the ESRP domain master-VLAN. ESRP cannot be enabled on this VLAN. A VLAN that has ESRP enabled. You enable ESRP on a per-VLAN basis. Each time you enable ESRP on a VLAN is an ESRP instance.
ESRP-enabled EDP
master switch
pre-master state
slave switch
election algorithm
priority
tracking
324
ESRP Concepts
ESRP Concepts
ESRP is configured on a per-VLAN basis on each switch. A maximum of four switches can participate in providing redundant layer 3 or layer 2 services to a single VLAN. The switches exchange keep-alive packets for each VLAN independently. Only one switch (the master) can actively provide layer 3 routing and/or layer 2 switching for each VLAN. This switch handles the forwarding, ARP requests, and routing for this particular VLAN. Other participating switches for the VLAN are in slave mode waiting for an ESRP state change. For a VLAN with ESRP enabled, each participating switch uses the same MAC address and must be configured with the same IP address or IPX NetID. It is possible for one switch to be master for one or more VLANs while being in slave for others, thus allowing the load to be split across participating switches.
NOTE If you configure OSPF and ESRP, you must manually configure an OSPF router identifier (ID). Be sure that you configure a unique OSPF router ID on each switch running ESRP. For more information on configuring OSPF, see Chapter 17. To have two or more switches participate in ESRP, the following must be true: For each VLAN to be made redundant, the switches must have the ability to exchange packets on the same layer 2 broadcast domain for that VLAN. Multiple paths of exchange can be used, and typically exist in most network system designs that take advantage of ESRP. For a VLAN to be recognized as participating in ESRP, the assigned IP address or the IPX NETid for the separate switches must be identical. Other aspects of the VLAN, including its name, are ignored. ESRP must be enabled on the desired VLANs for each switch. NOTE ESRP cannot be enabled on the VLAN default. Extreme Discovery Protocol (EDP) must be enabled on the ports that are members of the ESRP VLANs (The default setting is enabled.). To verify EDP status, use the following command:
show ports <portlist> info {detail}
NOTE If you configure a domain master-VLAN for ESRP, the domain master-VLAN must contain all ports belonging to the domain member-VLANs in order to operate properly as an ESRP VLAN.
ESRP-Aware Switches
Extreme switches that are not running ESRP, but are connected on a network that has other Extreme switches running ESRP are ESRP-aware. When ESRP-aware switches are attached to ESRP-enabled switches, the ESRP-aware switches reliably perform fail-over and fail-back scenarios in the prescribed recovery times. No configuration of this feature is necessary.
325
NOTE If you disable EDP on the switch, the switch is no longer ESRP-aware. If Extreme switches running ESRP are connected to layer 2 switches that are not manufactured by Extreme Networks (or Extreme switches that are not running ExtremeWare 4.0 or later), the fail-over times seen for traffic local to the segment may appear longer, depending on the application involved and the FDB timer used by the other vendor s layer 2 switch. As such, ESRP can be used with layer 2 switches from other vendors, but the recovery times vary. The VLANs associated with the ports connecting an ESRP-aware switch to an ESRP-enabled switch must be configured using an 802.1Q tag on the connecting port, or, if only a single VLAN is involved, as untagged using the protocol filter any. ESRP will not function correctly if the ESRP-aware switch interconnection port is configured for a protocol-sensitive VLAN using untagged traffic. You can also use port restart in this scenario. For more information about port restart, see ESRP Port Restart on page 333. To display ESRP-aware information, use the following command:
show esrp-aware vlan <vlan name>
The display includes the group number, MAC address for the master of the group, and age of the information.
326
Tracking informationVarious types of tracking are used to determine if the switch performing the master ESRP function has connectivity to the outside world. ExtremeWare supports the following types of tracking: VLANTracks any active port connectivity to one or more designated VLANs IP route table entryTracks specific learned routes from the IP route table PingTracks ICMP ping connectivity to specified devices DiagnosticsTracks the diagnostics of the switch Environment (health checks)Tracks the environment of the switch If any of the configured tracking mechanisms fail, the master ESRP switch relinquishes status as master, and remains in slave mode for as long as the tracking mechanism continues to fail. ESRP priorityThis is a user-defined field. The range of the priority value is 0 to 255; a higher number has higher priority. The default priority setting is 0. A priority setting of 255 makes an ESRP switch remain in slave mode and is the recommended setting for system maintenance. A switch with a priority setting of 255 will never become the master. System MAC addressThe switch with the higher MAC address has higher priority.
327
slave mode loses its connection with the master, a new election (using the same precedence order indicated previously) occurs. The new election typically takes place in three times the defined timer cycle (6 seconds by default). Before the switch transitions to the master state, the switch enters a temporary pre-master state. While in the pre-master state the VLAN does not send ESRP PDUs until the pre-master state timeout expires. When the timeout expires, the slave VLAN operates normally. Traffic is unaffected by the pre-master state because the master continues to operate normally. The pre-master state avoids the possibility of having simultaneous masters. You can configure the pre-master state timeout using the following command:
configure vlan <vlan name> esrp esrp-premaster-timeout <premaster-timer (0-512, 0 restores dflt)>
CAUTION Configure the pre-master state timeout only with guidance from Extreme Networks personnel. Misconfiguration can severely degrade the performance of ESRP and your switch.
Failover Time
Failover time is largely determined by the following factors: The ESRP timer setting. The routing protocol being used for inter-router connectivity if layer 3 redundancy is used. OSPF fail-over time is faster than RIP fail-over time. The failover time associated with the ESRP protocol is dependent on the timer setting and the nature of the failure. The default timer setting is 2 seconds; the range is 1 to 255 seconds. In most cases, a non-hardware failover is 2 seconds and a hardware failover is 6 seconds. If routing is configured, the failover of the particular routing protocol (such as RIP V1, RIP V2, or OSPF) is added to the failover time associated with ESRP. If you use OSPF, make your OSPF configuration passive. A passive configuration acts as a stub area and helps increase the time it takes for recalculating the network. A passive configuration also maintains a stable OSPF core.
328
priority-mac-onlyESRP priority, MAC address CAUTION All switches in the ESRP network must use the same election algorithm, otherwise loss of connectivity, broadcast storms, or other unpredictable behavior may occur.
NOTE Only the ports-track-priority-mac election algorithm is compatible with ExtremeWare releases prior to version 6.0.
ESRP Tracking
Tracking information is used to track various forms of connectivity from the ESRP switch to the outside world. This section describes the following ESRP tracking options: ESRP Environment and Diagnostic Tracking on page 329 ESRP VLAN Tracking on page 330 ESRP Route Table Tracking on page 330 ESRP Ping Tracking on page 331 OSPF Tracking on page 331 BGP Tracking on page 331 RIP Tracking on page 332
329
To configure the failover priority for ESRP VLAN, follow these steps: 1 Assign a priority to each ESRP VLAN, using the following command:
configure vlan <vlan name> esrp priority
The range of the priority value is 0 to 254; a higher number has a higher priority. The default priority setting is 0. NOTE If you set the priority to 255, the ESRP VLAN will remain in slave mode even if the master ESRP VLAN fails. You will typically configure both ESRP VLANs with the same priority. 2 Assign the priority flag precedence over the active ports count, using the following command:
configure vlan <vlan name> esrp esrp-election priority-ports-track-mac
Because the priority of both ESRP VLANs are set to the same value, ESRP will use the active ports count to determine the master ESRP VLAN. 3 Set the failover priority, using the following command:
configure vlan <vlan name> add [track-diagnostic | track-environment | track-rip | track-bgp | track-ospf] failover <priority>
Where: track-bgp tracks for any available BGP route. track-diagnostic tracks for any diagnostics failure. track-environment tracks for any environmental failure. track-ospf tracks for any available OSPF route. track-rip tracks for any available RIP route. The range of the priority value is 0 to 254; a higher number has a higher priority. The default priority setting is 0. Typically you will set the failover priority lower than the configured priority. Then, if one of the ESRP VLANs experiences a hardware or diagnostics failure, it will become the standby VLAN.
330
To participate in ESRP route table tracking, all ESRP switches must run ExtremeWare version 6.0 or later. To add or delete a tracked route, use the following command:
configure vlan <vlan name> [add | delete] track-iproute <ip address/mask_length>
OSPF Tracking
You can configure ESRP to track any available OSPF routes as a criteria for failover. ESRP tracks the presence or non-presence of the OSPF routes in the route table. If no OSPF routes are detected, the ESRP VLAN priority steps to the failover-priority value specified. To configure OSPF tracking, use the following command:
configure vlan <vlan name> add track-ospf failover <priority>
BGP Tracking
You can configure ESRP to track any available BGP routes as a criteria for failover. ESRP tracks the presence or non-presence of the BGP routes in the route table. If no BGP routes are detected, the ESRP VLAN priority steps to the failover-priority value specified. To configure BGP tracking, use the following command:
configure vlan <vlan name> add track-bgp failover <priority>
331
RIP Tracking
You can configure ESRP to track any available RIP routes as a criteria for failover. ESRP tracks the presence or non-presence of the RIP routes in the route table. If no RIP routes are detected, the ESRP VLAN priority steps to the failover-priority value specified. To configure RIP tracking, use the following command:
configure vlan <vlan name> add track-rip failover <priority>
L2 switch
10.10.10.121
Using the tracking mechanism, if VLAN1 fails, the ESRP master realizes that there is no path to the upstream router via the Master switch and implements a failover to the slave. To configure route table tracking, use the following command:
configure vlan esrp1 add track-iproute 10.10.10.0/24
332
The route specified in this command must exist in the IP routing table. When the route is no longer available, the switch implements a failover to the slave. To configure ping tracking, use the following command:
configure vlan esrp1 add track-ping 10.10.10.121 2 2
The specified IP address is tracked. If the fail rate is exceeded the switch implements a failover to the slave. To configure RIP tracking, use the following command:
configure vlan esrp1 add track-rip failover 20
The switch tracks RIP routes in its IP routing table. If no RIP routes are available, the switch implements a failover to failover priority 20. To configure OSPF tracking, use the following command:
configure vlan esrp1 add track-ospf failover 20
The switch tracks OSPF routes in its IP routing table. If no OSPF routes are available, the switch implements a failover to failover priority 20. To configure BGP tracking, use the following command:
configure vlan esrp1 add track-bgp failover 20
The switch tracks BGP routes in its IP routing table. If no BGP routes are available, the switch implements a failover to failover priority 20.
If a switch becomes a slave, ESRP takes down (disconnects) the physical links of member ports that have port restart enabled. The disconnection of these ports causes downstream devices to remove the ports from their FDB tables. This feature allows you to use ESRP in networks that include equipment from other vendors. After 3 seconds the ports re-establish connection with the ESRP switch. To remove a port from the restart configuration, delete the port from the VLAN and re-add it.
NOTE The port restart feature is also available for VRRP. For more information on VRRP, see Chapter 15.
333
NOTE All ports must be tagged for the super-VLAN. The following example combines ESRP and VLAN aggregation for the super-VLAN vsuper and two sub-VLANs, v1sub and v2sub, that have ports 1 and 2 as members, respectively. 1 Create the VLANs and set up the super to sub-VLAN relationship.
create vlan v1sub create vlan v2sub create vlan vsuper configure vsuper ipaddress 10.1.2.3/24 enable ipforwarding enable ospf configure ospf add vsuper area 0.0.0.0 configure v1sub add port 1 configure v2sub add port 2 configure vsuper add subvlan v1sub configure vsuper add subvlan v2sub
Use the following commands to verify the configuration: show vlan {detail} Displays super- and sub-VLAN relationships, IP addresses, and port membership. show esrp {detail}Verifies ESRP is enabled and operational.
334
Figure 69. The ESRP HA option is also useful as a means to allow for high availability security where an unblocked layer 2 environment is necessary. Figure 69: ESRP host attach
OSPF/BGP-4
EW_045
ESRP VLANs that share ESRP HA ports must be members of different ESRP groups. Each port can have a maximum of four VLANs. Other applications allow lower cost redundant routing configurations, because hosts can be directly attached to the switch involved with ESRP. The ESRP HA feature is used only on switches and I/O modules that have the i series chipset. It also requires at least one link between the master and the slave ESRP switch for carrying traffic and to exchange ESRP hello packets.
NOTE Do not use the ESRP HA feature with the following protocols: STP, EAPS, or VRRP. A broadcast storm may occur.
ESRP Domains
ESRP domains is an optional ESRP configuration that allows you to configure multiple VLANs under the control of a single instance of the ESRP protocol. By grouping multiple VLANs under one ESRP domain, the ESRP protocol can scale to provide protection to large numbers of VLANs. All VLANs
335
within an ESRP domain simultaneously share the same active and standby router and failover, providing one port of each member VLAN belongs to the domain master, as shown in Figure 70. Figure 70: ESRP domains
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
EW_065
When a port in a member VLAN belongs to the domain master, the member VLAN ports are considered when determining the ESRP master. You can configure a maximum of 64 ESRP domains in a network.
ESRP Groups
ExtremeWare supports running multiple instances of ESRP within the same VLAN or broadcast domain. This functionality is called an ESRP group. Though other uses exist, the most typical application for multiple ESRP groups is when two or more sets of ESRP switches are providing fast-failover protection within a subnet. A maximum of four distinct ESRP groups can be supported on a single ESRP switch. You can configure a maximum of 32 ESRP groups in a network. For example, two ESRP switches provide L2/L3 connectivity and redundancy for the subnet, while another two ESRP switches provide L2 connectivity and redundancy for a portion of the same subnet. Figure 71 shows ESRP groups.
336
ESRP
Group1 Master
ESRP
Group1 Standby
ESRP
Group2 Master (L2 only)
EW_056
NOTE A switch cannot perform both master and slave functions on the same VLAN for separate instances of ESRP. An additional user for ESRP groups is ESRP Host Attach (HA), described on page 334.
Selective Forwarding
An ESRP-aware switch floods ESRP PDUs to all ports in an ESRP-aware VLAN and the CPU. This flooding increases the amount of network traffic because all ports, regardless if they are connected to switches running the same ESRP group or not, receive ESRP PDUs. To reduce the amount of traffic, you can select the ports that receive ESRP PDUs by configuring selective forwarding on an ESRP-aware VLAN. By configuring selective forwarding, you create a portlist for the ESRP groups associated with an ESRP-aware VLAN, and that portlist is used for forwarding ESRP PDUs on the relevant ports only. You configure this feature on a per-VLAN basis, and selective forwarding is disabled by default.
NOTE Extreme Networks recommends keeping the default settings unless you have considerable knowledge and experience with ESRP. To configure selective forwarding, use the following command:
configure vlan <vlan name> esrp group <group number> add esrp-aware-ports [all | <portlist>]
337
where the following is true: vlan nameSpecifies an ESRP-aware VLAN name. group numberSpecifies the ESRP group to which this ESRP-aware VLAN belongs. The ESRP group number must be the same as the ESRP-aware VLAN number. allSpecifies all of the ports to be configured. All of the ports must be connected to switches running ESRP, and the ports must connect to the ESRP master and slave switches. portlistSpecifies the ports to be configured. The selected ports must be connected to switches running ESRP, and the ports must connect to the ESRP master and slave switches. May be in the form 1, 2, 3-5, 2:*, 2:5, 2:6-2:8. When an ESRP-aware switch receives an ESRP PDU, the software will lookup the group to which the PDU belongs and will forward the ESRP PDU to the group's portlist and the CPU. You cannot enable selective forwarding on an ESRP-enabled VLAN. If you try to enable selective forwarding on an ESRP-enabled VLAN, you see the following message:
ERROR: vlan meg is esrp enabled. Cannot enable selective forwarding on esrp vlans
where the following is true: group numberSpecifies the ESRP group to which this ESRP-aware VLAN belongs. The ESRP group number must be the same number as the ESRP-aware VLAN. allSpecifies all of the ports to be disabled. portlistSpecifies the selected ports to be disabled.
If you enter the show esrp command without a keyword, the command displays summary ESRP status information for the VLANs on the switch. Use the detail keyword to display more detailed status information. To view tracking information about a particular VLAN, including the VLANs tracked by it and a list of the VLANs tracking it, use the following command:
show vlan
338
To view ESRP configuration information for a specific VLAN, use the following command:
show esrp vlan <vlan name>
To view ESRP counter information for a specific VLAN, use the following command:
show esrp vlan <vlan name> {counters}
To view ESRP-aware information for a specific VLAN, including: Group number MAC address for the master of the group Age of the information use the following command:
show esrp-aware vlan <vlan name>
For more information about any of the commands used to enable, disable, or configure ESRP, refer to the ExtremeWare Software Command Reference Guide.
ELRP Terms
Table 45 describes terms associated with ELRP. Table 45: ELRP Terms
Term Loop detection Description The process ELRP uses to detect a loop in the network. The switch sending the ELRP PDU waits to receive its original PDU back. If the switch receives the PDU, there is a loop in the network.
339
Configuring ELRP
This section describes the commands used to configure ELRP for use with ESRP. By default, ELRP is disabled.
340
To enable the use of ELRP by ESRP in the pre-master state on a per-VLAN basis, and to configure how often and how many ELRP PDUs are sent in the pre-master state, use the following command:
configure vlan <vlan name> esrp elrp-premaster-poll enable {count <number> | interval <seconds>}
where the following is true: vlan nameSpecifies an ESRP-enabled VLAN name. numberSpecifies the number of times the switch sends ELRP PDUs. The default is 3, and the range is 1 to 32. secondsSpecifies how often, in seconds, the ELRP PDUs are sent. The default is 1 seconds, and the range is 1 to 32 seconds. To disable the use of ELRP by ESRP in the pre-master state, use the following command:
configure vlan <vlan name> esrp elrp-premaster-poll disable
where the following is true: vlan nameSpecifies and ESRP-enabled VLAN name. secondsSpecifies how often, in seconds, successive ELRP packets are sent. The default is 1 second, and the range is 1 to 32 seconds. To disable the use of ELRP by ESRP in the master state, use the following command:
configure vlan <vlan name> esrp elrp-master-poll disable
Configuring Ports
You can configure one or more ports of a VLAN where ELRP packet transmission is requested by ESRP. This allows the ports in your network that might experience loops, such as ports that connect to the master, slave, or ESRP-aware switches, to receive ELRP packets. You do not need to send ELRP packets to host ports. By default, all ports of the VLAN where ESRP is enabled also has ELRP transmission enabled on the ports. If you change your network configuration, and a port no longer connects to a master, slave, or ESRP-aware switch, you can disable ELRP transmission on that port. To disable ELRP transmission, use the following command:
configure vlan <vlan name> delete elrp-poll ports {<portlist> | all}
341
If you enter the show elrp command without a keyword, the command displays the total number of: Clients registered with ELRP ELRP packets transmitted ELRP packets received Use the vlan name parameter to display information specific to a VLAN, and the detail keyword to display more detailed status information for VLANs in the master and pre-master states. For more detailed information about the output associated with the show elrp command, see the ExtremeWare Command Reference Guide.
ESRP Examples
This section provides examples of ESRP configurations.
342
ESRP Examples
OSPF or RIP
EW_021
The BlackDiamond switch, acting as master for VLAN Sales, performs both layer 2 switching and layer 3 routing services for VLAN Sales. The BlackDiamond switch in slave mode for VLAN Sales performs neither, thus preventing bridging loops in the VLAN. The BlackDiamond switch in slave mode does, however, exchange EDP packets with the master BlackDiamond switch. There are four paths between the BlackDiamond switches on VLAN Sales. All the paths are used to send EDP packets, allowing for four redundant paths for communication. The Summit switches, being ESRP-aware, allow traffic within the VLAN to fail-over quickly, as they will sense when a master/slave transition occurs and flush FDB entries associated with the uplinks to the ESRP-enabled BlackDiamond switches. The following commands are used to configure both BlackDiamond switches. The assumption is that the inter-router backbone is running OSPF, with other routed VLANs already properly configured. Similar commands would be used to configure a switch on a network running RIP. The primary requirement is that the IP address for the VLAN(s) running ESRP must be identical. In this scenario, the master is determined by the programmed MAC address of the switch, because the number of active links for the VLAN and the priority are identical to both switches. The commands used to configure the BlackDiamond switches are as follows:
create vlan sales configure sales add port 1:1-1:4 configure sales ipaddr 10.1.2.3/24 enable ipforwarding
343
enable esrp sales enable edp ports all configure ospf add vlan sales enable ospf
Sales
Sales
Sales + Engineering
Engineering
Sales - untagged link Engineering - untagged link Sales + Engineering - tagged link
EW_022
This example builds on the previous example, but eliminates the requirement of layer 3 redundancy. It has the following features: An additional VLAN, Engineering, is added that uses layer 2 redundancy. The VLAN Sales uses three active links to each BlackDiamond switch. The VLAN Engineering has two active links to each BlackDiamond switch. The third Summit switch carries traffic for both VLANs. The link between the third Summit switch and the first BlackDiamond switch uses 802.1Q tagging to carry traffic from both VLANs traffic on one link. The BlackDiamond switch counts the link active for each VLAN. The second BlackDiamond switch has a separate physical port for each VLAN connected to the third Summit switch. In this example, the BlackDiamond switches are configured for ESRP such that the VLAN Sales normally uses the first BlackDiamond switch and the VLAN Engineering normally uses the second BlackDiamond switch. This is accomplished by manipulating the ESRP priority setting for each VLAN for the particular BlackDiamond switch.
344
ESRP Cautions
ESRP Cautions
This section describes important details to be aware of when configuring ESRP.
345
346
This chapter covers the following topics: Overview on page 347 Determining the VRRP Master on page 348 Additional VRRP Highlights on page 351 VRRP Operation on page 352 VRRP Configuration Parameters on page 354 VRRP Examples on page 356 This chapter assumes that you are already familiar with the Virtual Router Redundancy Protocol (VRRP). If not, refer to the following publications for additional information: RFC 2338Virtual Router Redundancy Protocol (VRRP) RFC 2787Definitions of Managed Objects for the Virtual Router Redundancy Protocol
Overview
Like ESRP, VRRP is a protocol that allows multiple switches to provide redundant routing services to users. VRRP is used to eliminate the single point of failure associated with manually configuring a default gateway address on each host in a network. Without using VRRP, if the configured default gateway fails, you must reconfigure each host on the network to use a different router as the default gateway. VRRP provides a redundant path for the hosts. If the default gateway fails, the backup router assumes forwarding responsibilities. NOTE IGMP snooping must be enabled for VRRP to operate correctly.
347
VRRP Terms
Table 46 describes terms associated with VRRP. Table 46: VRRP Terms
Term virtual router Description A VRRP router is a group of one or more physical devices that acts as the default gateway for hosts on the network. The virtual router is identified by a virtual router identifier (VRID) and an IP address. Any router that is running VRRP. A VRRP router can participate in one or more virtual routers. A VRRP router can be a backup router for one more master routers. A single VRRP router that has the IP address of the virtual router configured as its real interface address. The IP address owner responds to TCP/IP packets addressed to the virtual router IP address. The IP address owner is optional in a VRRP configuration. The physical device (router) in the virtual router that is responsible for forwarding packets sent to the virtual router, and responding to ARP requests. The master router sends out periodic advertisements that let backup routers on the network know that it is alive. If the IP address owner is identified, it always becomes the master. Any VRRP router in the virtual router that is not elected as the master. The backup router is available to assume forwarding responsibility if the master becomes unavailable. Virtual router identifier. Each virtual router is given a unique VRID. All of the VRRP routers that participate in the virtual router are assigned the same VRID. RFC 2338 assigns a static MAC address for the first 5 octets of the virtual router. These octets are set to 00-00-5E-00-01. When you configure the VRID, the last octet of the MAC address is dynamically assigned the VRID number.
master router
backup router
VRRP Tracking
Tracking information is used to track various forms of connectivity from the VRRP router to the outside world. This section describes the following VRRP tracking options: VRRP VLAN tracking VRRP route table tracking VRRP ping tracking
348
349
10.10.10.121
To configure VLAN tracking, as shown in Figure 74, use the following command:
Configure vlan vrrp1 add track-vlan vlan1
Using the tracking mechanism, if VLAN1 fails, the VRRP master realizes that there is no path to upstream router via the Master switch and implements a failover to the backup. To configure route table tracking, as shown in Figure 74, use the following command:
configure vlan vrrp1 add track-iproute 10.10.10.0/24
The route specified in this command must exist in the IP routing table. When the route is no longer available, the switch implements a failover to the backup. To configure ping tracking, as shown in Figure 74, use the following command:
configure vlan vrrp1 add track-ping 10.10.10.121 2 2
The specified IP address is tracked. If the fail rate is exceeded the switch implements a failover to the backup.
350
351
VRRP and Spanning Tree can be simultaneously enabled on the same switch. VRRP and ESRP cannot be simultaneously enabled on the same switch.
If a VLAN becomes a backup, VRRP disconnects member ports that have port restart enabled. The disconnection of these ports causes downstream devices to remove the ports from their FDB tables. This feature allows you to use VRRP in networks that include equipment from other vendors. After 3 seconds the ports re-establish connection with the VRRP switch. To remove a port from the restart configuration, delete the port from the VLAN and re-add it.
NOTE The port restart feature is also available for ESRP. For more information on ESRP, see Chapter 14.
VRRP Operation
This section describes two VRRP network configuration: A simple VRRP network A fully-redundant VRRP network
352
VRRP Operation
Switch A
Switch A = Master VRID = 1 IP address = 192.168.1.3 MAC address = 00-00-5E-00-01-01 Priority = 255
Switch B
Switch B = Backup VRID = 1 IP address = 192.168.1.3 MAC address = 00-00-5E-00-01-01 Priority = 100
192.168.1.3
192.168.1.5
In Figure 75, a virtual router is configured on Switch A and Switch B using these parameters: VRID is 1. MAC address is 00-00-5E-00-01-01. IP address is 192.168.1.3. Switch A is configured with a priority of 255. This priority indicates that it is the master router. Switch B is configured with a priority of 100. This indicates that it is a backup router. The master router is responsible for forwarding packets sent to the virtual router. When the VRRP network becomes active, the master router broadcasts an ARP request that contains the virtual router MAC address (in this case, 00-00-5E-00-01-01) for each IP address associated with the virtual router. Hosts on the network use the virtual router MAC address when they send traffic to the default gateway. The virtual router IP address is configured to be the real interface address of the IP address owner. The IP address owner is usually the master router. The virtual router IP address is also configured on each backup router. However, in the case of the backup router, this IP address is not associated with a physical interface. Each physical interface on each backup router must have a unique IP address. The virtual router IP address is also used as the default gateway address for each host on the network. If the master router fails, the backup router assumes forwarding responsibility for traffic addressed to the virtual router MAC address. However, because the IP address associated with the master router is not physically located on the backup router, the backup router cannot reply to TCP/IP messages (such as pings) sent to the virtual router.
353
Switch A
Master for 192.168.1.3 Master VRID = 1 Backup VRID = 2 MAC address = 00-00-5E-00-01-01
Switch B
Master for 192.168.1.5 Master VRID = 2 Backup VRID = 1 MAC address = 00-00-5E-00-01-02
Default Route
Backup Route
EW_068
In Figure 76, switch A is configured as follows: IP address 192.168.1.3 Master router for VRID 1 Backup router for VRID 2 MAC address 00-00-5E-00-01-01 Switch B is configured as follows: IP address 192.168.1.5 Master router for VRID 2 Backup router for VRID 1 MAC address 00-00-5E-00-01-02 Both virtual routers are simultaneously operational. The traffic load from the four hosts is split between them. Host 1 and host 2 are configured to use VRID 1 on switch A as their default gateway. Host 3 and host 4 are configured to use VRID 2 on switch B as their default gateway. In the event that either switch fails, the backup router configured is standing by to resume normal operation.
354
preempt_mode
NOTE The router that owns the virtual router IP address always preempts, independent of the setting of this parameter.
355
VRRP Examples
This section provides the configuration syntax for the two VRRP networks discussed in this chapter.
Switch A
Switch A = Master VRID = 1 IP address = 192.168.1.3 MAC address = 00-00-5E-00-01-01 Priority = 255
Switch B
Switch B = Backup VRID = 1 IP address = 192.168.1.3 MAC address = 00-00-5E-00-01-01 Priority = 100
192.168.1.3
192.168.1.5
356
VRRP Examples
Switch A
Master for 192.168.1.3 Master VRID = 1 Backup VRID = 2 MAC address = 00-00-5E-00-01-01
Switch B
Master for 192.168.1.5 Master VRID = 2 Backup VRID = 1 MAC address = 00-00-5E-00-01-02
Default Route
Backup Route
EW_068
357
358
16 IP Unicast Routing
This chapter describes the following topics: Overview of IP Unicast Routing on page 359 Proxy ARP on page 363 Relative Route Priorities on page 364 Configuring IP Unicast Routing on page 365 Routing Configuration Example on page 365 IP Multinetting on page 367 Configuring DHCP/BOOTP Relay on page 370 UDP-Forwarding on page 370 VLAN Aggregation on page 372 This chapter assumes that you are already familiar with IP unicast routing. If not, refer to the following publications for additional information: RFC 1256ICMP Router Discovery Messages RFC 1812Requirements for IP Version 4 Routers NOTE For more information on interior gateway protocols, see Chapter 17. For information on exterior gateway protocols, see Chapter 18.
359
IP Unicast Routing
Router Interfaces
The routing software and hardware routes IP traffic between router interfaces. A router interface is simply a VLAN that has an IP address assigned to it. As you create VLANs with IP addresses belonging to different IP subnets, you can also choose to route between the VLANs. Both the VLAN switching and IP routing function occur within the switch.
NOTE Each IP address and mask assigned to a VLAN must represent a unique IP subnet. You cannot configure the same IP address and subnet on different VLANs. In Figure 77, a BlackDiamond switch is depicted with two VLANs defined; Finance and Personnel. All ports on slots 1 and 3 are assigned to Finance; all ports on slots 2 and 4 are assigned to Personnel. Finance belongs to the IP network 192.207.35.0; the router interface for Finance is assigned the IP address 192.206.35.1. Personnel belongs to the IP network 192.207.36.0; its router interface is assigned IP address 192.207.36.1. Traffic within each VLAN is switched using the Ethernet MAC addresses. Traffic between the two VLANs is routed using the IP addresses. Figure 77: Routing between VLANs
192.207.35.11
192.207.35.13 192.207.36.14
BD_010
192.207.36.12
360
Dynamic Routes
Dynamic routes are typically learned by way of RIP or OSPF. Routers that use RIP or OSPF exchange information in their routing tables in the form of advertisements. Using dynamic routes, the routing table contains only networks that are reachable. Dynamic routes are aged out of the table when an update for the network is not received for a period of time, as determined by the routing protocol.
Static Routes
Static routes are manually entered into the routing table. Static routes are used to reach networks not advertised by routers. Static routes can also be used for security reasons, to control which routes you want advertised by the router. You can decide if you want all static routes to be advertised, using one of the following commands:
[enable | disable] rip export static [enable | disable] ospf export static
The default setting is disabled. Static routes are never aged out of the routing table. A static route must be associated with a valid IP subnet. An IP subnet is associated with a single VLAN by its IP address and subnet mask. If the VLAN is subsequently deleted, the static route entries using that subnet must be deleted manually.
Multiple Routes
When there are multiple, conflicting choices of a route to a particular destination, the router picks the route with the longest matching network mask. If these are still equal, the router picks the route using the following criteria (in the order specified): Directly attached network interfaces ICMP redirects Static routes
361
IP Unicast Routing
Directly attached network interfaces that are not active. NOTE If you define multiple default routes, the route that has the lowest metric is used. If multiple default routes have the same lowest metric, the system picks one of the routes. You can also configure blackhole routestraffic to these destinations is silently dropped.
IP Route Sharing
IP route sharing allows multiple equal-cost routes to be used concurrently. IP route sharing can be used with static routes or with OSPF routes. In OSPF, this capability is referred to as equal cost multipath (ECMP) routing. To use IP route sharing, use the following command:
enable iproute sharing
Next, configure static routes and/or OSPF as you would normally. ExtremeWare supports unlimited route sharing across static routes and up to 12 ECMP routes for OSPF. Route sharing is useful only in instances where you are constrained for bandwidth. This is typically not the case using Extreme switches. Using route sharing makes router troubleshooting more difficult because of the complexity in predicting the path over which the traffic will travel.
Route Maps
Route maps for IP routing can be configured based on the route origin. When routes are added to the IP routing table from various source, the route map configured for the origin of the route is applied to the route. After matching on specified characteristics, the characteristics for the route can be modified using the route maps. The characteristics that can be matched and modified are dependent on the origin of the route. Route maps for IP routing can be dynamically changed. In the case of direct and static route origins, the changes are reflected immediately. In the case of routes that are sourced from other origin, the changes are reflected within 30 seconds. To configure route maps for IP routing, use the following command:
configure iproute route-map [bgp | direct | e-bgp | i-bgp | ospf | ospf-extern1 | ospf-extern2 | ospf-inter | ospf-intra | rip | static] [<route map> | none]
To view the route maps for IP routing, use the following command:
show iproute route-map
The entries are added to the IP forwarding table as standard entries and you can view them using the show ipfdb command.
362
Proxy ARP
You can also configure the VLAN router interface to either forward and process all subnet-directed broadcast packets, or to simply forward these packets after they have been added to the IP forwarding database. The latter option allows you to improve CPU forwarding performance by having upper layers, such as UDP and TCP, ignore broadcast packet processing (for example, if the packets have IP-options configured). To enable or disable broadcast packet processing, use the following command:
[enable | disable] ipforwarding ignore-broadcast vlan <vlan_name>
Using these commands together, you can achieve a 30-50% reduction in system processing cycles in forwarding subnet-directed broadcast traffic on a BlackDiamond switch, and a 100% reduction on the Alpine and Summit switches.
NOTE Although forwarding performance is improved in the BlackDiamond switch, the CPU continues to observe the subnet-directed broadcast packets and does not ignore such packets when traversing modules in a BlackDiamond switch. Only I/O modules containing the i series chipset support this command on the BlackDiamond switch.
Proxy ARP
Proxy Address Resolution Protocol (ARP) was first invented so that ARP-capable devices could respond to ARP Request packets on behalf of ARP-incapable devices. Proxy ARP can also be used to achieve router redundancy and simplify IP client configuration. The switch supports proxy ARP for this type of network configuration. The section describes some example of how to use proxy ARP with the switch.
ARP-Incapable Devices
To configure the switch to respond to ARP Requests on behalf of devices that are incapable of doing so, you must configure the IP address and MAC address of the ARP-incapable device using the use the following command:
configure iparp add proxy <ipaddress> {<mask>} <mac_address> {always}
Once configured, the system responds to ARP Requests on behalf of the device as long as the following conditions are satisfied: The valid IP ARP Request is received on a router interface. The target IP address matches the IP address configured in the proxy ARP table. The proxy ARP table entry indicates that the system should always answer this ARP Request, regardless of the ingress VLAN (the always parameter must be applied). Once all the proxy ARP conditions are met, the switch formulates an ARP Response using the configured MAC address in the packet.
363
IP Unicast Routing
364
Ensure that each VLAN has a unique IP address. 3 Configure a default route using the following command:
configure iproute add default <gateway> {<metric>}
Default routes are used when the router has no other dynamic or static route to the requested destination. 4 Turn on IP routing for one or all VLANs using the following command:
enable ipforwarding {vlan <name>}
enable ospf
365
IP Unicast Routing
MyCompany Port-based VLAN. All ports on slots 1 through 4 have been assigned. Figure 78: Unicast routing configuration example
192.207.35.1
192.207.36.1
IP NetBIOS IP NetBIOS
IP NetBIOS IP NetBIOS
The stations connected to the system generate a combination of IP traffic and NetBIOS traffic. The IP traffic is filtered by the protocol-sensitive VLANs. All other traffic is directed to the VLAN MyCompany. In this configuration, all IP traffic from stations connected to slots 1 and 3 have access to the router by way of the VLAN Finance. Ports on slots 2 and 4 reach the router by way of the VLAN Personnel. All other traffic (NetBIOS) is part of the VLAN MyCompany.
366
IP Multinetting
IP Multinetting
IP multinetting is used in many legacy IP networks when there is need to overlap multiple subnets onto the same physical segment. Though it can be a critical element in a transition strategy, due to the additional constraints introduced in troubleshooting and bandwidth, it is recommended that multinetting be used as a transitional tactic, and not as a long-term network design strategy. On the switch, each subnet is represented by a different VLAN, and each of those VLANs has its own IP address. All of the VLANs share the same physical port(s). The switch routes IP traffic from one subnet to another, all within the same physical port(s). The following rules and comments apply when you are configuring IP multinetting: Multiple VLANs share the same physical ports; each of the VLANs is configured with an IP address. A maximum of four subnets (or VLANs) on multinetted ports is recommended. All VLANs used in the multinetting application must share the same port assignment. One VLAN is configured to use an IP protocol filter. This is considered the primary VLAN interface for the multinetted group. The secondary multinetted VLANs can be exported using the export direct command. The FDB aging timer is automatically set to 3,000 seconds (50 minutes). If you are using a UDP or DHCP relay function, only the primary VLAN that is configured with the IP protocol filter is capable of servicing these requests. The VLAN default should not be used for multinetting.
367
IP Unicast Routing
IP Multinetting Operation
To use IP multinetting, follow these steps: 1 Select a slot (modular switches only) and port on which IP multinetting is to run. For example, slot 1, port 2 on a modular switch, or port 2 on a stand-alone switch. 2 Remove the port from the default VLAN using the following command:
configure default delete port 1:2 (modular switch)
or
configure default delete port 2 (stand-alone switch)
6 Assign one of the subnets to the IP protocol using the following command:
configure net21 protocol ip
7 Assign the other subnets to the dummy protocol using the following command:
configure net22 protocol mnet
11 If you are using RIP, disable RIP on the dummy VLANs using the following command:
configure rip delete net22
368
IP Multinetting
IP Multinetting Examples
The following example configures a modular switch to have one multinetted segment (slot 5, port 5) that contains three subnets (192.67.34.0, 192.67.35.0, and 192.67.37.0).
configure default delete port 5:5 create protocol mnet create vlan net34 create vlan net35 create vlan net37 configure net34 ipaddress 192.67.34.1 configure net35 ipaddress 192.67.35.1 configure net37 ipaddress 192.67.37.1 configure net34 protocol ip configure net35 protocol mnet configure net37 protocol mnet configure net34 add port 5:5 configure net35 add port 5:5 configure net37 add port 5:5 enable ipforwarding enable multinetting
The following example configures a modular switch to have one multinetted segment (slot 5: port 5) that contains three subnets (192.67.34.0, 192.67.35.0, and 192.67.37.0). It also configures a second multinetted segment consisting of two subnets (192.67.36.0 and 192.99.45.0). The second multinetted segment spans three ports (slot1:port 8, slot2:port 9, and slot3:port 10). RIP is enabled on both multinetted segments.
configure default delete port 5:5 create protocol mnet create vlan net34 create vlan net35 create vlan net37 configure net34 ipaddress 192.67.34.1 configure net35 ipaddress 192.67.35.1 configure net37 ipaddress 192.67.37.1 configure net34 protocol ip configure net35 protocol mnet configure net37 protocol mnet configure net34 add port 5:5 configure net35 add port 5:5 configure net37 add port 5:5 configure default delete port 1:8, 2:9, 3:10 create vlan net36 create vlan net45 configure net36 ipaddress 192.67.36.1 configure net45 ipaddress 192.99.45.1 configure net36 protocol ip configure net45 protocol mnet configure net36 add port 1:8, 2:9, 3:10 configure net45 add port 1:8, 2:9, 3:10 configure rip add vlan net34 configure rip add vlan net36 enable rip enable ipforwarding enable multinetting
369
IP Unicast Routing
3 Configure the addresses to which DHCP or BOOTP requests should be directed, using the following command:
configure bootprelay add <ipaddress>
This command displays the configuration of the BOOTP relay service, and the addresses that are currently configured.
UDP-Forwarding
UDP-forwarding is a flexible and generalized routing utility for handling the directed forwarding of broadcast UDP packets. UDP-forwarding allows applications, such as multiple DHCP relay services from differing sets of VLANs, to be directed to different DHCP servers. The following rules apply to UDP broadcast packets handled by this feature: If the UDP profile includes BOOTP or DHCP, it is handled according to guidelines in RFC 1542. If the UDP profile includes other types of traffic, these packets have the IP destination address modified as configured, and changes are made to the IP and UDP checksums and decrements to the TTL field, as appropriate. If the UDP-forwarding is used for BOOTP or DHCP forwarding purposes, do not configure or use the existing bootprelay function. However, if the previous bootprelay functions are adequate, you may continue to use them.
370
UDP-Forwarding
Configuring UDP-Forwarding
To configure UDP-forwarding, the first thing you must do is create a UDP-forward destination profile. The profile describes the types of UDP packets (by port number) that are used, and where they are to be forwarded. You must give the profile a unique name, in the same manner as a VLAN, protocol filter, or Spanning Tree Domain. Next, configure a VLAN to make use of the UDP-forwarding profile. As a result, all incoming traffic from the VLAN that matches the UDP profile is handled as specified in the UDP-forwarding profile. A maximum of ten UDP-forwarding profiles can be defined. Each named profile may contain a maximum of eight rules defining the UDP port, and destination IP address or VLAN. A VLAN can make use of a single UDP-forwarding profile. UDP packets directed toward a VLAN use an all-ones broadcast on that VLAN.
UDP-Forwarding Example
In this example, the VLAN Marketing and the VLAN Operations are pointed toward a specific backbone DHCP server (with IP address 10.1.1.1) and a backup server (with IP address 10.1.1.2). Additionally, the VLAN LabUser is configured to use any responding DHCP server on a separate VLAN called LabSvrs. The commands for this configuration are as follows:
create udp-profile backbonedhcp create udp-profile labdhcp configure backbonedhcp add 67 ipaddress 10.1.1.1 configure backbonedhcp add 67 ipaddress 10.1.1.2 configure labdhcp add 67 vlan labsvrs configure marketing udp-profile backbonedhcp configure operations udp-profile backbonedhcp configure labuser udp-profile labdhcp
371
IP Unicast Routing
VLAN Aggregation
VLAN aggregation is an ExtremeWare feature aimed primarily at service providers. The purpose of VLAN aggregation is to increase the efficiency of IP address space usage. It does this by allowing clients within the same IP subnet to use different broadcast domains while still using the same default router. Using VLAN aggregation, a super-VLAN is defined with the desired IP address, but without any member ports (unless it is running ESRP). The sub-VLANs use the IP address of the super-VLAN as the default router address. Groups of clients are then assigned to sub-VLANs that have no IP address, but are members of the super-VLAN. In addition, clients can be informally allocated any valid IP addresses within the subnet. Optionally, you can prevent communication between sub-VLANs for isolation purposes. As a result, sub-VLANs can be quite small, but allow for growth without re-defining subnet boundaries. Without using VLAN aggregation, each VLAN has a default router address, and you need to use large subnet masks. The result of this is more unused IP address space. Multiple secondary IP addresses can be assigned to the super-VLAN. These IP addresses are only used to respond to ICMP ping packets to verify connectivity. Figure 79 illustrates VLAN aggregation.
372
VLAN Aggregation
In Figure 79, all stations are configured to use the address 10.3.2.1 for the default router.
373
IP Unicast Routing
There is no error checking to prevent the configuration of overlapping subVLAN address ranges between multiple subVLANs. Doing so can result in unexpected behavior of ARP within the superVLAN and associated subVLANs.
374
VLAN Aggregation
NOTE The isolation option works for normal, dynamic, ARP-based client communication.
375
IP Unicast Routing
376
This chapter describes the following topics: Overview on page 378 Overview of RIP on page 379 Overview of OSPF on page 380 Route Re-Distribution on page 385 RIP Configuration Example on page 388 Configuring OSPF on page 390 OSPF Configuration Example on page 391 Displaying OSPF Settings on page 393 Overview of IS-IS on page 394 Implementing IS-IS Routing on page 395 This chapter assumes that you are already familiar with IP unicast routing. If not, refer to the following publications for additional information: RFC 1058Routing Information Protocol (RIP) RFC 1195Use of OSI IS-IS for Routing in TCP/IP and Dual Environments ISO 10589OSI IS-IS Intra-Domain Routing Protocol (also available as RFC 1142) RFC 1723RIP Version 2 RFC 2178OSPF Version 2 Interconnections: Bridges and Routers by Radia Perlman ISBN 0-201-56332-0 Published by Addison-Wesley Publishing Company
377
Overview
The switch supports the use of three interior gateway protocols (IGPs); the Routing Information Protocol (RIP), the Open Shortest Path First (OSPF) protocol, and the Integrated Intermediate System-to-Intermediate System (IS-IS) dynamic routing protocol for IP unicast routing. RIP is a distance-vector protocol, based on the Bellman-Ford (or distance-vector) algorithm. The distance-vector algorithm has been in use for many years, and is widely deployed and understood. OSPF is a link-state protocol, based on the Dijkstra link-state algorithm. OSPF is a newer Interior Gateway Protocol (IGP), and solves a number of problems associated with using RIP on todays complex networks. The IS-IS routing protocol is very similar to OSPF. OSPF was derived from the IS-IS protocol. IS-IS also is a link-state protocol, based on the Dijkstra link-state algorithm. As originally implemented, IS-IS can support both IP and ISO routing in mixed environments. ExtremeWare Integrated IS-IS supports IP-only routing. NOTE RIP, OSPF, and IS-IS can be enabled on a single VLAN.
378
Overview of RIP
The details of RIP, OSPF, and IS-IS are explained later in this chapter.
Overview of RIP
RIP is an Interior Gateway Protocol (IGP) first used in computer routing in the Advanced Research Projects Agency Network (ARPAnet) as early as 1969. It is primarily intended for use in homogeneous networks of moderate size. To determine the best path to a distant network, a router using RIP always selects the path that has the least number of hops. Each router that data must traverse is considered to be one hop.
Routing Table
The routing table in a router using RIP contains an entry for every known destination network. Each routing table entry contains the following information: IP address of the destination network Metric (hop count) to the destination network IP address of the next router Timer that tracks the amount of time since the entry was last updated The router exchanges an update message with each neighbor every 30 seconds (default value), or if there is a change to the overall routed topology (also called triggered updates). If a router does not receive an update message from its neighbor within the route timeout period (180 seconds by default), the router assumes the connection between it and its neighbor is no longer available.
Split Horizon
Split horizon is a scheme for avoiding problems caused by including routes in updates sent to the router from which the route was learned. Split horizon omits routes learned from a neighbor in updates sent to that neighbor.
Poison Reverse
Like split horizon, poison reverse is a scheme for eliminating the possibility of loops in the routed topology. In this case, a router advertises a route over the same interface that supplied the route, but the route uses a hop count of 16, defining it as unreachable.
Triggered Updates
Triggered updates occur whenever a router changes the metric for a route, and it is required to send an update message immediately, even if it is not yet time for a regular update message to be sent. This will generally result in faster convergence, but may also result in more RIP-related traffic.
379
Overview of OSPF
OSPF is a link-state protocol that distributes routing information between routers belonging to a single IP domain, also known as an autonomous system (AS). In a link-state routing protocol, each router maintains a database describing the topology of the autonomous system. Each participating router has an identical database maintained from the perspective of that router. From the link-state database (LSDB), each router constructs a tree of shortest paths, using itself as the root. The shortest path tree provides the route to each destination in the autonomous system. When several equal-cost routes to a destination exist, traffic can be distributed among them. The cost of a route is described by a single metric.
Link-State Database
Upon initialization, each router transmits a link-state advertisement (LSA) on each of its interfaces. LSAs are collected by each router and entered into the LSDB of each router. Once all LSAs are received, the router uses the LSDB to calculate the best routes for use in the IP routing table. OSPF uses flooding to distribute LSAs between routers. Any change in routing information is sent to all of the routers in the network. All routers within an area have the exact same LSDB. Table 49 describes LSA type numbers. Table 49: LSA Type Numbers
Type Number 1 2 3 4 Description Router LSA Network LSA Summary LSA AS summary LSA
380
Overview of OSPF
Database Overflow
The OSPF database overflow feature allows you to limit the size of the LSDB and to maintain a consistent LSDB across all the routers in the domain, which ensures that all routers have a consistent view of the network. Consistency is achieved by: Limiting the number of external LSAs in the database of each router. Ensuring that all routers have identical LSAs. To configure OSPF database overflow, use the following command:
configure ospf ase-limit <number> {timeout <seconds>}
where: <number>Specifies the number of external LSAs that the system supports before it goes into overflow state. A limit value of zero disables the functionality. When the LSDB size limit is reached, OSPF database overflow flushes LSAs from the LSDB. OSPF database overflow flushes the same LSAs from all the routers, which maintains consistency. timeoutSpecifies the timeout, in seconds, after which the system ceases to be in overflow state. A timeout value of zero leaves the system in overflow state until OSPF is disabled and re-enabled.
Opaque LSAs
Opaque LSAs are a generic OSPF mechanism used to carry auxiliary information in the OSPF database. Opaque LSAs are most commonly used to support OSPF traffic engineering. Normally, support for opaque LSAs is auto-negotiated between OSPF neighbors. In the event that you experience interoperability problems, you can disable opaque LSAs across the entire system using the following command:
disable ospf capability opaque-lsa
To re-enable opaque LSAs across the entire system, use the following command:
enable ospf capability opaque-lsa
If your network uses opaque LSAs, we recommend that all routers on your OSPF network support opaque LSAs. Routers that do not support opaque LSAs do not store or flood them. At minimum a well-interconnected subsection of your OSPF network needs to support opaque LSAs to maintain reliability of their transmission.
381
On an OSPF broadcast network, the designated router (DR) must support opaque LSAs or none of the other routers on that broadcast network will reliably receive them. You can use the OSPF priority feature to give preference to an opaque-capable router, so that it becomes the elected DR. For transmission to continue reliably across the network, the backup designated router (BDR) must also support opaque LSAs.
NOTE Opaque LSAs are supported in ExtremeWare version 6.2 and above.
Areas
OSPF allows parts of a network to be grouped together into areas. The topology within an area is hidden from the rest of the autonomous system. Hiding this information enables a significant reduction in LSA traffic, and reduces the computations needed to maintain the LSDB. Routing within the area is determined only by the topology of the area. The three types of routers defined by OSPF are as follows: Internal Router (IR)An internal router has all of its interfaces within the same area. Area Border Router (ABR)An ABR has interfaces in multiple areas. It is responsible for exchanging summary advertisements with other ABRs. You can create a maximum of 7 non-zero areas. Autonomous System Border Router (ASBR)An ASBR acts as a gateway between OSPF and other routing protocols, or other autonomous systems.
If this is the first instance of the OSPF area being used, you must create the area first using the following command:
create ospf area <area identifier>
382
Overview of OSPF
Stub Areas
OSPF allows certain areas to be configured as stub areas. A stub area is connected to only one other area. The area that connects to a stub area can be the backbone area. External route information is not distributed into stub areas. Stub areas are used to reduce memory consumption and computation requirements on OSPF routers. Use the following command to configure an OSPF area as a stub area:
configure ospf area <area identifier> stub [summary | nosummary] stub-default-cost <cost>
Not-So-Stubby-Areas (NSSA)
NSSAs are similar to the existing OSPF stub area configuration option, but have the following two additional capabilities: External routes originating from an ASBR connected to the NSSA can be advertised within the NSSA. External routes originating from the NSSA can be propagated to other areas, including the backbone area. The CLI command to control the NSSA function is similar to the command used for configuring a stub area, as follows:
configure ospf area <area identifier> nssa [summary | nosummary] stub-default-cost <cost> {translate}
The translate option determines whether type 7 LSAs are translated into type 5 LSAs. When configuring an OSPF area as an NSSA, the translate should only be used on NSSA border routers, where translation is to be enforced. If translate is not used on any NSSA border router in a NSSA, one of the ABRs for that NSSA is elected to perform translation (as indicated in the NSSA specification). The option should not be used on NSSA internal routers. Doing so inhibits correct operation of the election algorithm.
Normal Area
A normal area is an area that is not: Area 0. Stub area. NSSA. Virtual links can be configured through normal areas. External routes can be distributed into normal areas.
Virtual Links
In the situation when a new area is introduced that does not have a direct physical attachment to the backbone, a virtual link is used. A virtual link provides a logical path between the ABR of the disconnected area and the ABR of the normal area that connects to the backbone. A virtual link must be established between two ABRs that have a common area, with one ABR connected to the backbone. Figure 80 illustrates a virtual link.
383
NOTE Virtual links can not be configured through a stub or NSSA area. Figure 80: Virtual link using Area 1 as a transit area
Virtual link
ABR
ABR
Area 2
Area 1
Area 0
EW_016
Virtual links are also used to repair a discontiguous backbone area. For example, in Figure 81, if the connection between ABR1 and the backbone fails, the connection using ABR2 provides redundancy so that the discontiguous area can continue to communicate with the backbone using the virtual link. Figure 81: Virtual link providing redundancy
Virtual link
Area 2 ABR 2
ABR 1
Area 1
Area 0
Area 3
EW_017
384
Route Re-Distribution
Point-to-Point Support
You can manually configure the OSPF link type for a VLAN. Table 50 describes the link types. Table 50: OSPF Link Types
Link Type Auto Broadcast Number of Routers Description Varies Any ExtremeWare automatically determines the OSPF link type based on the interface type. This is the default setting. Routers must elect a designated router (DR) and a backup designated router (BDR) during synchronization. Ethernet is an example of a broadcast link. Synchronizes faster than a broadcast link because routers do not elect a DR or BDR. Does not operate with more than two routers on the same VLAN. PPP is an example of a point-to-point link. An OSPF point-to-point link supports only zero to two OSPF routers and does not elect a DR or BDR. If you have three or more routers on the VLAN, OSPF will fail to synchronize if the neighbor is not configured. A passive link does not send or receive OSPF packets.
Point-to-point
Up to 2
Passive
NOTE The number of routers in an OSPF point-to-point link is determined per-VLAN, not per-link.
NOTE All routers in the VLAN must have the same OSPF link type. If there is a mismatch, OSPF attempts to operate, but may not be reliable.
Route Re-Distribution
RIP, OSPF and IS-IS can be enabled simultaneously on the switch. Route re-distribution allows the switch to exchange routes, including static routes, between the three routing protocols. Figure 82 is an example of route re-distribution between an OSPF autonomous system and a RIP autonomous system.
385
OSPF AS
Backbone Area 0.0.0.0
ABR
Area 121.2.3.4
ASBR
ASBR
RIP AS
EW_019
386
Route Re-Distribution
These commands enable or disable the exporting of RIP, static, and direct routes by way of LSA to other OSPF routers as AS-external type 1 or type 2 routes. The default setting is disabled. The cost metric is inserted for all BGP, RIP, IS-IS, VIP, static, and direct routes injected into OSPF. If the cost metric is set to 0, the cost is inserted from the route. The tag value is used only by special routing applications. Use 0 if you do not have specific requirements for using a tag. The tag value in this instance has no relationship with 802.1Q VLAN tagging. The same cost, type, and tag values can be inserted for all the export routes, or route maps can be used for selective insertion. When a route map is associated with the export command, the route map is applied on every exported route. The exported routes can also be filtered using route maps. Routes filtered with a route map will be exported as ase-type-1. Enable or disable the export of virtual IP addresses to other OSPF routers using the following commands:
enable ospf export vip [cost <number> [ase-type-1 | ase-type-2] {tag <number>} | <route map>] disable ospf export vip
387
disable rip export [direct | isis | isis-level-1 | isis-level-1-external | isis-level-2 | isis-level-2-external | ospf | ospf-extern1 | ospf-extern2 | ospf-inter | ospf-intra | static | vip]
These commands enable or disable the exporting of static, direct, and OSPF-learned routes into the RIP domain. You can choose which types of OSPF routes are injected, or you can simply choose ospf, which will inject all learned OSPF routes regardless of type. The default setting is disabled.
388
192.207.35.1
192.207.36.1
IP NetBIOS IP NetBIOS
IP NetBIOS IP NetBIOS
The stations connected to the system generate a combination of IP traffic and NetBIOS traffic. The IP traffic is filtered by the protocol-sensitive VLANs. All other traffic is directed to the VLAN MyCompany. In this configuration, all IP traffic from stations connected to slots 1 and 3 have access to the router by way of the VLAN Finance. Ports on slots 2 and 4 reach the router by way of the VLAN Personnel. All other traffic (NetBIOS) is part of the VLAN MyCompany. The example in Figure 83 is configured as follows:
create vlan Finance create vlan Personnel create vlan MyCompany configure Finance protocol ip configure Personnel protocol ip configure Finance add port 1:*,3:* configure Personnel add port 2:*,4:* configure MyCompany add port all configure Finance ipaddress 192.207.35.1 configure Personnel ipaddress 192.207.36.1 enable ipforwarding configure rip add vlan all enable rip
389
Configuring OSPF
Each switch that is configured to run OSPF must have a unique router ID. It is recommended that you manually set the router ID of the switches participating in OSPF, instead of having the switch automatically choose its router ID based on the highest interface IP address. Not performing this configuration in larger, dynamic environments could result in an older link state database remaining in use.
You can configure the following parameters: Retransmit intervalThe length of time that the router waits before retransmitting an LSA that is not acknowledged. If you set an interval that is too short, unnecessary retransmissions will result. The default value is 5 seconds. Transit delayThe length of time it takes to transmit an LSA packet over the interface. The transit delay must be greater than 0. Hello intervalThe interval at which routers send hello packets. Smaller times allow routers to discover each other more quickly, but also increase network traffic. The default value is 10 seconds. Dead router wait interval (Dead Interval)The interval after which a neighboring router is declared down due to the fact that hello packets are no longer received from the neighbor. This interval should be a multiple of the hello interval. The default value is 40 seconds. Router wait interval (Wait Timer Interval)The interval between the interface coming up and the election of the DR and BDR. This interval should be greater than the hello interval. If it is close to the hello interval, the network synchronizes very quickly, but might not elect the correct DR or BDR. The default value is equal to the dead router wait interval. NOTE The OSPF standard specifies that wait times are equal to the dead router wait interval.
390
Area 0
IR 2
10.0.3.2
10.0.1.1
10.0.1.2 10.0.2.2
_1 0_ 0_ 2
IR 1
3 0_ 0_ _1 HQ
Headquarters
ABR 2
10.0.3.1
ABR 1
HQ
10.0.2.1
161.48.2.2
LA
Los Angeles
26
160.26.25.1
160.26.26.1
_2
161.48.2.1
_4
_1 61
6_
8_
160.26.26.2
Ch
160.26.25.2
Area 5
i_1
Virtual link
60
Chicago
Area 6 (stub)
EW_018
Area 0 is the backbone area. It is located at the headquarters and has the following characteristics: Two internal routers (IR1 and IR2) Two area border routers (ABR1 and ABR2) Network number 10.0.x.x Two identified VLANs (HQ_10_0_2 and HQ_10_0_3) Area 5 is connected to the backbone area by way of ABR1 and ABR2. It is located in Chicago and has the following characteristics: Network number 160.26.x.x
391
One identified VLAN (Chi_160_26_26) Two internal routers Area 6 is a stub area connected to the backbone by way of ABR1. It is located in Los Angeles and has the following characteristics: Network number 161.48.x.x One identified VLAN (LA_161_48_2) Three internal routers Uses default routes for inter-area routing Two router configurations for the example in Figure 84 are provided in the following section.
create ospf area 0.0.0.5 create ospf area 0.0.0.6 enable ipforwarding configure configure configure configure ospf ospf ospf ospf area 0.0.0.6 stub nosummary stub-default-cost 10 add vlan LA_161_48_2 area 0.0.0.6 add vlan Chi_160_26_26 area 0.0.0.5 add vlan all area 0.0.0.0
enable ospf
392
The detail option displays information about all OSPF areas in a detail format. To display information about OSPF interfaces for an area, a VLAN, or for all interfaces, use the following command:
show ospf interfaces {vlan <vlan name> | area <area identifier> | detail}
The detail option displays information about all OSPF interfaces in a detail format.
The detail option displays all fields of matching LSAs in a multi-line format. The summary option displays several important fields of matching LSAs, one line per LSA. The stats option displays the number of matching LSAs, but not any of their contents. If not specified, the default is to display in the summary format. A common use of this command is to omit all optional parameters, resulting in the following shortened form:
show ospf lsdb
The shortened form displays all areas and all types in a summary format.
393
Overview of IS-IS
The IS-IS routing protocol provides transport-independent routing. IS-IS partitions the network into routing domains. Routing domain boundaries are defined by interior and exterior links. Interior links are part of the IS-IS routing domain; exterior links are not. No IS-IS routing messages are sent on exterior links. A routing domain is partitioned into areas, as shown in Figure 85. IS-IS routing uses two levels of hierarchical routing: level 1 and level 2. Figure 85: Basic IS-IS network
Level 1
Level 1 Area 2
Level 2
Level 2
Level 1
Level 1
Level 1
Level 2 Subdomain
Level 1
Level 1 Area 1
Level 1 Area 3
XM_033
Level 1 routers know the topology in their area, including all routers and end systems. Level 1 routers do not know the identity of routers or end systems outside of their area. Level 1 routers forward all traffic for destinations outside of their area to a level 2 router in their area. Level 2 routers know the level 2 topology in their area, and know which addresses are reachable via each level 2 router. However, level 2 routers do not know the level 1 topology within any area, except to the extent that level 2 routers might also be level 1 routers within an area. Level 2 routers that are also level 1 routers are also called level 1/2 routers.
394
DualA dual IS-IS router is a router that uses IS-IS as a single integrated routing protocol for both IP and OSI. The IS-IS protocol uses the existing IS-IS packets and adds IP-specific fields containing the following: Authentication information The protocols supported by each router, as well as each router s IP addresses (specified in IS-IS Hello and Link State Packets (LSPs)) Internally and externally reachable IP addresses (specified in all Link State Packets) The same two-level hierarchy is used for both IP and OSI routing. Each area is specified as IP-only, OSI-only, or dual. The protocol does not allow for partial overlap of OSI and IP areas. Within an area, level 1 routers exchange link state packets, which identify the IP addresses reachable by each router. Specifically, zero or more combinations of IP address, subnet mask, and metric can be included in each link state packet. Each level 1 router is manually configured with the combinations that are reachable on each interface. A level 1 router routes as follows: 1 If a specified destination address matches a combination reachable within the area, the packet is routed via level 1 routing. 2 If a specified destination address does not match any combination listed as reachable within the area, the packet is routed towards the nearest level 2 router by ISO routing or the packet is routed by the originate default route. Flexible use of the limited IP address space is important in order to cope with the anticipated growth of IP environments. Thus an area (and by implication a routing domain) can simultaneously use a variety of different address masks for different subnets in the area (or domain). Generally, if a specified destination address matches more than one IP address and subnet mask pair, the more specific address (the one with more 1 bits in the mask, known as best match routing) is the one routed towards. Level 2 routers include in their level 2 LSPs a complete list of combinations specifying all IP addresses reachable in their area. In addition, both level 1 and level 2 routers can report external reachability information, corresponding to addresses that can be reached via routers in other routing domains. Typically, small IS-IS networks are a single area that includes all the routers in the network. As the network grows, that single area is usually reorganized into a backbone area made up of the connected set of all level 2 routers from all areas, which in turn connect to local areas.
395
ExtremeWare 6.1.8 IS-IS supports integrated IS-IS as specified in ISO/IEC 10589 and RFC 1195. The IS-IS implementation allows the switches to act as an IP-only IS-IS router. No OSI routes are calculated, as there is no support for network layer forwarding of OSI traffic in Extreme switches. ExtremeWare IS-IS does not support OSI. Integrated IS-IS is supported over VLANs containing Ethernet and PoS interfaces. VLANs containing Ethernet interfaces or a mixture of Ethernet and PoS interfaces are treated as broadcast subnetworks. VLANs containing PoS interfaces are treated as either broadcast or point-to-point subnetworks based on the PPP mode enabled on the PoS interfaces. Currently, you can create one level 1 area. A level 2 subdomain is the domain that contains all of the level 2 routers. A level 2 subdomain is always present in every system. When you enable IS-IS on an interface, you configure the type of the interface. Depending on the type, the interface is part of a level 1 area, level 2 subdomain, or both. The presence of an interface in a level 1 area or level 2 subdomain determines the type of the router. The IP routes that are generated as a result of running shortest-path-first (SPF) calculations on the information received from all the routers in the subdomain or area is installed in the IP routing table as IS-IS Level 1 Internal, IS-IS Level 1 External, IS-IS Level 2 Internal, and IS-IS Level 2 External routes. Basic IS-IS includes the following features: Authentication Summarizing level 1 routing information Filtering level 1 routing information External route redistribution Originating default route Overload bit Metric size
Authentication
Authentication is supported at two different levels: interface, and domain or area. Interface authenticationprevents unauthorized routers from forming adjacency. This is achieved by inserting authentication information in the Hello PDUs and validating them on the received Hello PDUs. You can configure authentication separately for level 1 and level 2. Domain or area authenticationprevents intruders from injecting invalid routing information into this router. Similar to interface authentication, this is achieved by inserting the authentication information using LSP, CSNP, and PSNP PDUs and validating them on receipt. You can configure authentication separately for level 1 and level 2. At each of the above levels two different authentication methods are supported: simple password as specified in ISO/IEC 10589, and HMAC-MD5 as specified in draft-ietf-isis-hmac-00.txt.
396
Overload Bit
This feature forces the router to set the overload bit (also known as the hippity bit) in its non-pseudo node link-state packets. Normally the setting of the overload bit is allowed only when a router runs into
397
problems. For example, when a router has a memory shortage, it might be that the Link State database is not complete, resulting in an incomplete or inaccurate routing table. By setting the overload bit in its LSPs, other routers can ignore the unreliable router in their SPF calculations until the router has recovered from its problems. Set the overload bit when you want to prevent traffic flow.
Metric Size
Normally, IS-IS metrics can have values up to 63. IS-IS generates two type, length, and value (TLV) codings, one for an IS-IS adjacency (code, length, and value (CLV) 2) and the second for an IP prefix (CLV 128 and CLV 130). During SPF, if the total cost of the path to a destination exceeds 1023, then according to ISO/IEC 10587, the path is ignored. To overcome these restrictions, a second pair of TLVs is available, one for IP prefixes (CLV 135) and the second for IS-IS adjacency (CLV 22). With these TLVs, IS-IS metrics can have values up 16,777,215 and the maximum path metric allowed is 4,261,412,864. This allows more flexibility while designing a domain. These metrics are wide metrics. You can configure a router to originate LSPs with regular metrics, wide metrics, or both.
Default Routes to Nearest Level 1/2 Switch for Level 1 Only Switches
When one router is a level 1 switch, the route to the nearest level 1/2 switch which attaches to a level 2 backbone network may be installed in the kernel routing table of the level 1 switch. There are three kinds of level 1 only switches: a switch that does not attach to any level 1/2 switch; it is part of a level 1 only network a switch that attaches to at least one level 1/2 switch, but none of the level 1/2 switches are attached to a level 2 backbone network. Here the level 1 non-pseudo node LSP of the level 1/2 switches should set the attach bit to 0. A level 1 only switch will not install the default routes based on the unattached level 1/2 switchs LSP information. a switch that attaches to at least one level 1/2 switch, and at least one of the level 1/2 switches is attached to the level 2 backbone network. Here the level 1 non-pseudo node LSP of the level 1/2 switch should set the attach bit to 1. A level 1 only switch will install the default routes based on the attached level 1/2 switchs LSP information. The level 1/2 switch that is attached to the level 2 backbone network when at least one of area addresses of level 2 LSP received from other level 2 or level 1/2 switches is not in the list of the level 1 union area address set. When IS-IS installs default routes based on the attached bit, the routes should have a lower priority than originated default routes. Default routes based on the attached bit can only be installed when an originated default route does not exist. The metric installed should be 2047(e1) for the regular metric and 4,261,412,864 (i1) for the wide metric. A maximum of eight equal default routes is supported. This feature is enabled by default. The level 1 router installs default routes based on the attach bit. To disable this feature, the attach bit must be ignored. The following command disables this feature by configuring the router to ignore the attach bit:
enable isis ignore-attached-bit
398
399
400
This chapter covers the following topics: Overview on page 401 BGP Attributes on page 402 BGP Communities on page 402 BGP Features on page 402 This chapter describes how to configure the Border Gateway Protocol (BGP), an exterior routing protocol available on the switch. For more information on BGP, refer to the following documents: RFC 1771Border Gateway Protocol version 4 (BGP-4) RFC 1965Autonomous System Confederations for BGP RFC 1966BGP Route Reflection RFC 1997BGP Communities Attribute RFC 1745BGP/OSPF Interaction RFC 2439BGP Route Flap Damping NOTE ExtremeWare supports BGP version 4 only.
Overview
BGP is an exterior routing protocol that was developed for use in TCP/IP networks. The primary function of BGP is to allow different autonomous systems (ASs) to exchange network reachability information. An autonomous system is a set of routers that are under a single technical administration. This set of routers uses a different routing protocol (such as OSPF) for intra-AS routing. One or more routers in the AS are configured to be border routers, exchanging information with other border routers (in different autonomous systems) on behalf of all of the intra-AS routers.
401
BGP can be used as an exterior gateway protocol (E-BGP), or it can be used within an AS as an interior gateway protocol (I-BGP).
BGP Attributes
The following well-known BGP attributes are supported by the switch: Origin Defines the origin of the route. Possible values are IGP, EGP, and incomplete. AS_Path The list of ASs that are traversed for this route. Next_hop The IP address of the next hop BGP router to reach the destination listed in the NLRI field. Multi_Exist_Discriminator Used to select a particular border router in another AS when multiple border routers exist. Local_Preference Used to advertise this router s degree of preference to other routers within the AS. Atomic_aggregate Indicates that the sending border router has used a route aggregate prefix in the route update. Aggregator Identifies the BGP router AS number and IP address that performed route aggregation. Community Identifies a group of destinations that share one or more common attributes. Cluster_ID Specifies a 4-byte field used by a route reflector to recognize updates from other route reflectors in the same cluster. Originator_ID Specifies the router ID of the originator of the route in the local AS.
BGP Communities
A BGP community is a group of BGP destinations that require common handling. ExtremeWare supports the following well-known BGP community attributes: no-export no-advertise no-export-subconfed
BGP Features
This section describes the following BGP features supported by ExtremeWare: Route Reflectors on page 403 Route Confederations on page 403 Route Aggregation on page 406 IGP Synchronization on page 407 Using the Loopback Interface on page 407 BGP Peer Groups on page 407
402
BGP Features
Route Reflectors
Another way to overcome the difficulties of creating a fully-meshed AS is to use route reflectors. Route reflectors allow a single router to serve as a central routing point for the AS or sub-AS. A cluster is formed by the route reflector and its client routers. Peer routers that are not part of the cluster must be fully meshed according to the rules of BGP. A BGP cluster, including the route reflector and its clients, is shown in Figure 86. Figure 86: Route reflectors
Non-client
Client
Cluster
EW_042
Route Confederations
BGP requires networks to use a fully-meshed router configuration. This requirement does not scale well, especially when BGP is used as an interior gateway protocol. One way to reduce the size of a fully-meshed AS is to divide the AS into multiple sub-autonomous systems and group them into a routing confederation. Within the confederation, each sub-AS must be fully-meshed. The confederation is advertised to other networks as a single AS.
403
AS 200
SubAS 65001 EBGP A
192.1.1.6/30 192.1.1.5/30
B
192.1.1.22/30
192.1.1.9/30
192.1.1.17/30
IBGP
192.1.1.18/30 192.1.1.21/30
EBGP
EBGP E
192.1.1.13/30
192.1.1.14/30
192.1.1.10/30
EW_049
In this example, AS 200 has five BGP speakers. Without a confederation, BGP would require that the routes in AS 200 be fully meshed. Using the confederation, AS 200 is split into two sub-ASs: AS65001 and AS65002. Each sub-AS is fully meshed, and IBGP is running among its members. EBGP is used between sub-AS 65001 and sub-AS 65002. Router B and router D are EBGP peers. EBGP is also used between the confederation and outside ASs. To configure router A, use the following commands:
create vlan ab configure vlan ab add port 1 configure vlan ab ipaddress 192.1.1.6/30 enable ipforwarding vlan ab configure ospf add vlan ab area 0.0.0.0 create vlan ac configure vlan ac add port 2 configure vlan ac ipaddress 192.1.1.17/30 enable ipforwarding vlan ac configure ospf add vlan ac area 0.0.0.0 disable bgp configure bgp as-number 65001 configure bgp routerid 192.1.1.17 configure bgp confederation-id 200 enable bgp
404
BGP Features
create bgp neighbor 192.1.1.5 as-number remote-AS-number 65001 create bgp neighbor 192.1.1.18 as-number remote-AS-number 65001 enable bgp neighbor all
405
create bgp neighbor 192.1.1.17 as-number remote-AS-number 65001 enable bgp neighbor all
Route Aggregation
Route aggregation is the process of combining the characteristics of several routes so that they are advertised as a single route. Aggregation reduces the amount of information that a BGP speaker must store and exchange with other BGP speakers. Reducing the information that is stored and exchanged also reduces the size of the routing table.
406
BGP Features
IGP Synchronization
You can configure an AS to be a transit AS, so that it can pass traffic through from one AS to a third AS. When you configure a transit AS, it is important that the routes advertised by BGP are consistent with the routes that are available within the AS using its interior gateway protocol. To ensure consistency, BGP should be synchronized with the IGP used within the AS. This will ensure that the routes advertised by BGP are, in fact, reachable within the AS. IGP synchronization is enabled by default.
Changes made to the parameters of a peer group are applied to all neighbors in the peer group. Modifying the following parameters will automatically disable and enable the neighbors before changes take effect: remote-as timer source-interface
407
soft-in-reset password
The new neighbor is created as part of the peer group and inherits all of the existing parameters of the peer group. The peer group must have remote AS configured. To add an existing neighbor to a peer group, use the following command:
configure bgp neighbor [<ip address> | all] peer-group <peer group> {acquire-all}
If you do not specify acquire-all, only the mandatory parameters are inherited from the peer group. If you specify acquire-all, all of the parameters of the peer group are inherited. This command disables the neighbor before adding it to the peer group. To remove a neighbor from a peer group, use the following command:
configure bgp neighbor [<ip address> | all] peer-group none
When you remove a neighbor from a peer group, it retains the parameter settings of the group. The parameter values are not reset to those the neighbor had before it inherited the peer group values.
408
BGP Features
a route has flapped, once it stops flapping, it will again be advertised after the maximum route suppression time.
Use the following command to enable route flap dampening for a BGP peer group:
configure bgp peer-group [<ipaddress> | all] dampening {{<half-life> {<reuse> <suppress> <max-suppress>}} | {route-map <route map>}}
You can supply the dampening parameters through the route map or directly in the CLI command, but not both (these are mutually exclusive). For route maps there is a set operation to configure dampening parameters. Use the following command to add a set statement to a route map for dampening:
configure route-map <route map> <sequence number> add set dampening <half-life> <reuse-limit> <suppress-limit> <max-suppress>
Use the following command to disable route flap dampening for a BGP peer group:
configure bgp peer-group <peer group> no-dampening
Use the following command to view the configured values of the route flap dampening parameters for a BGP peer group:
show bgp peer-group <peer group>
409
Use the following command to view the flap statistics of all the routes from a particular BGP neighbor:
show bgp neighbor <ip address> flap-statistics {detail} all
Use the following command to view the flap statistics of all the routes which matches a route map filter from a particular BGP neighbor:
show bgp neighbor <ip address> flap-statistics {detail} route-map <route map>
Use the following command to view the flap statistics of all the routes which matches a community criteria from a particular BGP neighbor:
show bgp neighbor <ip address> flap-statistics {detail} [community [access-profile <access-profile> | <autonomous-system-id>:<bgp-community> | number <community_number> | no-advertise | no-export | no-export-subconfed]
Use the following command to view the flap statistics of all the routes which matches a AS-PATH criteria from a particular BGP neighbor:
show bgp neighbor <ip address> flap-statistics {detail} as-path [access-profile <access-profile> | <path-expression]
Use the following command to delete the flap statistics of all the routes from a particular BGP neighbor:
clear bgp neighbor <ip address> flap-statistics all
Use the following command to delete the flap statistics of all the routes which matches a route map filter from a particular BGP neighbor:
clear bgp neighbor <ip address> flap-statistics route-map <route map>
Use the following command to delete the flap statistics of all the routes which matches a community criteria from a particular BGP neighbor:
clear bgp neighbor <ip address> flap-statistics [community [access-profile <access-profile> | <autonomous-system-id>:<bgp-community> | number <community_number> | no-advertise | no-export | no-export-subconfed]
Use the following command to delete the flap statistics of all the routes which matches a AS-PATH criteria from a particular BGP neighbor
clear bgp neighbor <ip address> flap-statistics {detail} as-path [access-profile <access-profile> | <path-expression]
Use the following command to view all the suppressed routes from a particular BGP neighbor
show bgp neighbor <ip address> suppressed-routes {detail} all
Use the following command to view all the suppressed routes which matches a route-map filter from a particular BGP neighbor
show bgp neighbor <ip address> suppressed-routes {detail} route-map <route map>
Use the following command to view all the suppressed routes which matches a community criteria from a particular BGP neighbor
410
Route Re-Distribution
show bgp neighbor <ip address> suppressed-routes {detail} [community [access-profile <access-profile> | <autonomous-system-id>:<bgp-community> | number <community_number> | no-advertise | no-export | no-export-subconfed]
Use the following command to view all the suppressed routes which matches a AS-PATH criteria from a particular BGP neighbor
show bgp neighbor <ip address> suppressed-routes {detail} as-path [access-profile <access-profile> | <path-expression]
Route Re-Distribution
BGP, OSPF, and RIP can be enabled simultaneously on the switch. Route re-distribution allows the switch to exchange routes, including static, direct, and VIP routes, between any two routing protocols. Exporting routes from OSPF to BGP, and from BGP to OSPF, are discreet configuration functions. To run OSPF and BGP simultaneously, you must first configure both protocols and then verify the independent
411
operation of each. Then you can configure the routes to export from OSPF to BGP and the routes to export from BGP to OSPF.
Using the export command to redistribute routes complements the redistribution of routes using the configure bgp add network command. The configure bgp add network command adds the route to BGP only if the route is present in the routing table. The enable bgp export command redistributes an individual route from the routing table to BGP. If you use both commands to redistribute routes, the routes redistributed using the network command take precedence over routes redistributed using the export command.
412
19 IP Multicast Routing
This chapter covers the following topics: Overview on page 413 DVMRP Overview on page 414 PIM Overview on page 414 IGMP Overview on page 415 Multicast Tools on page 416 Configuring IP Multicasting Routing on page 418 Configuration Examples on page 419 For more information on IP multicasting, refer to the following publications: RFC 1112 Host Extension for IP Multicasting RFC 2236 Internet Group Management Protocol, Version 2 DVMRP Version 3 draft_ietf_dvmrp_v3_07 PIM-DM Version 2 draft_ietf_pim_v2_dm_03 PIM-SM Version 2 draft_ietf_pim_sm_v2_new_04 The following URLs point to the Web sites for the IETF Working Groups: IETF DVMRP Working Group: http://www.ietf.org/html.charters/idmr-charter.html IEFT PIM Working Group: http://www.ietf.org/html.charters/pim-charter.html
Overview
IP multicast routing is a function that allows a single IP host to send a packet to a group of IP hosts. This group of hosts can include devices that reside on the local network, within a private network, or outside of the local network. IP multicast routing consists of the following functions:
413
IP Multicast Routing
A router that can forward IP multicast packets. A router-to-router multicast routing protocol (for example, Distance Vector Multicast Routing Protocol (DVMRP) or Protocol Independent Multicast (PIM)). A method for the IP host to communicate its multicast group membership to a router (for example, Internet Group Management Protocol (IGMP)). NOTE You should configure IP unicast routing before you configure IP multicast routing.
DVMRP Overview
DVMRP is a distance vector protocol that is used to exchange routing and multicast information between routers. Like RIP, DVMRP periodically sends the entire routing table to its neighbors. DVMRP has a mechanism that allows it to prune and graft multicast trees to reduce the bandwidth consumed by IP multicast traffic.
PIM Overview
The switch supports both dense mode and sparse mode operation. You can configure dense mode or sparse mode on a per-interface basis. Once enabled, some interfaces can run dense mode, while others run sparse mode.
414
Overview
When a router determines that the multicast rate has exceeded a configured threshold, that router can send an explicit join to the originating router. Once this occurs, the receiving router gets the multicast directly from the sending router, and bypasses the RP.
IGMP Overview
IGMP is a protocol used by an IP host to register its IP multicast group membership with a router. Periodically, the router queries the multicast group to see if the group is still in use. If the group is still active, a single IP host responds to the query, and group registration is maintained. IGMP is enabled by default on the switch. However, the switch can be configured to disable the generation of periodic IGMP query packets. IGMP should be enabled when the switch is configured to perform IP unicast or IP multicast routing. IGMP must be enabled if the switch is configured for DVMRP.
IGMP Snooping
IGMP snooping is a layer 2 function of the switch. It does not require multicast routing to be enabled. In IGMP snooping, the layer 2 switch keeps track of IGMP requests, and only forwards multicast traffic to the part of the local network that requires it. IGMP snooping optimizes the usage of network bandwidth, and prevents multicast traffic from being flooded to parts of the local network that do not need it. The switch does not reduce any IP multicast traffic in the local multicast domain (224.0.0.x). IGMP snooping is enabled by default on the switch. If IGMP snooping is disabled, all IGMP and IP multicast traffic floods within a given VLAN. IGMP snooping expects at least one device on every VLAN to periodically generate IGMP query messages. The static IGMP snooping entries do not require periodic query. An optional optimization for IGMP snooping is the strict recognition of multicast routers only if the remote devices have joined the DVMRP (224.0.0.4) or PIM (244.0.0.13) multicast groups. When a port sends an IGMP leave message, the switch removes the IGMP snooping entry after 1000 milli-seconds (the leave time is configurable, ranging from 0 to 10000 ms). The switch sends a query to determine which ports want to remain in the multicast group. If other members of the VLAN want to
415
IP Multicast Routing
remain in the multicast group, the router ignores the leave message, but the port that requests removal is removed from the IGMP snooping table. If the last port within a VLAN sends an IGMP leave message, the router does not receive any responses to the query, and the router immediately removes the VLAN from the multicast group.
Static IGMP
In order to receive multicast traffic, a host needs to explicitly join a multicast group by sending an IGMP request, then the traffic is forwarded to that host. There are situations where you would like multicast traffic to be forwarded to a port where a multicast enabled host is not available (for example, testing multicast configurations). Static IGMP emulates a host or router attached to a switch port, so that multicast traffic will be forwarded to that port. Emulate a host to forward a particular multicast group to a port; emulate a router to forward all multicast groups to a port. Use the following command to emulate a host on a port:
configure igmp snooping vlan <vlan name> ports <portlist> add static group <group address>
To display the IGMP snooping static groups, use the following command:
show igmp snooping {vlan <vlan name>} static group
Multicast Tools
ExtremeWare provides two commonly available tools to monitor and troubleshoot IP multicast, mrinfo and mtrace.
416
Overview
Mrinfo
The multicast router information tool, (mrinfo), uses the facility provided in DVMRP for requesting information from a router that could be used for tracing and troubleshooting. A request is sent to a multicast router, and the router responds with the following information: code version system multicast information interface information interface IP address interface multicast capabilities metric configured on the interface threshold configured on the interface count and IP address of the neighbors discovered on the interface Use the following command to send an mrinfo request:
mrinfo <ip address> {from <ip address>} {timeout <seconds>}
Mtrace
Multicast trace (mtrace) relies on a feature of multicast routers that is accessed using the IGMP protocol. Since multicast uses reverse path forwarding, a multicast trace is run from the destination to the source. A query packet is sent to the last-hop multicast router. This router builds a trace response packet, fills in a report for its hop, and forwards the packet to the next upstream router. As the request is forwarded, each router in turn adds its own report to the trace response. When the request reaches the first-hop router, the filled in request is sent back to the system requesting the trace. The request will also be returned if the maximum hop limit is reached. If a router does not support the mtrace functionality, it will silently drop the request packet and no information will be returned. For this situation, you could send the trace with a small number of maximum hops allowed, increasing the number of hops as the stream is traced. The group IP address must be in the class-D multicast address space, but should not be in the multicast control subnet range (224.0.0.x/24). Use the following command to trace a multicast stream:
mtrace source <ip address> {destination <ip address>} {group <ip address>} {from <ip address>} {gateway <ip address >} {timeout <seconds>} {maximum-hops <number>}
417
IP Multicast Routing
NOTE The round-robin algorithm is not supported on non-i series I/O modules. The default backplane loadsharing policy is port-based. To configure the switch backplane load-sharing policy, use this command:
configure backplane-ls-policy [address-based | port-based | round-robin]
3 Enable DVMRP or PIM on all IP multicast routing interfaces using one of the following commands:
configure dvmrp add vlan [<vlan name> | all] configure pim add vlan [<vlan name> | all] {dense | sparse}
4 Enable DVMRP or PIM on the router using one of the following commands:
enable dvmrp [rxmode | txmode] enable pim
418
Configuration Examples
Configuration Examples
Figure 88 andFigure 89 are used in Chapter 17 to describe the OSPF configuration on a switch. Refer to Chapter 17 for more information about configuring OSPF. In the first example, the system labeled IR1 is configured for IP multicast routing, using PIM-DM. In the second example, the system labeled ABR1 is configured for IP multicast routing using PIM-SM.
Area 0
IR 2
10.0.3.2
10.0.1.1
10.0.1.2 10.0.2.2
0_ 0_ 2
IR 1
HQ
Headquarters
ABR 2
10.0.3.1
ABR 1
HQ
10.0.2.1
_1
26
160.26.25.1
160.26.26.1
_2
6_
_1 0_ 0_ 3
161.48.2.2
LA _1 61 _4 8_
Los Angeles
161.48.2.1
160.26.26.2
Ch
160.26.25.2
Area 5
i_1
Virtual link
60
Chicago
Area 6 (stub)
EW_018
419
IP Multicast Routing
The following example configures PIM-SM. Figure 89: IP multicast routing using PIM-SM configuration example
Area 0
IR 2
10.0.3.2
10.0.1.1
10.0.1.2 10.0.2.2
0_ 0_ 2
IR 1
HQ_10_10_4
HQ_10_0_1
HQ _1
Headquarters
ABR 2
10.0.3.1
ABR 1
HQ
10.0.2.1
_1
0_ 0_ 3
Rendezvous point
161.48.2.2
LA
Los Angeles
26
160.26.25.1
160.26.26.1
_2
161.48.2.1
_4
_1 61
6_
8_
160.26.26.2
Chicago
160.26.25.2 Chi_160_26_24
Area 5
Ch
i_1
Virtual link
60
Area 6 (stub)
EW_018
420
Configuration Examples
421
IP Multicast Routing
422
20 IPX Routing
This chapter describes the following topics: Overview of IPX on page 423 IPX/RIP Routing on page 426 Configuring IPX on page 427 IPX Configuration Example on page 429 This chapter assumes that you are already familiar with IPX. If not, refer to your Novell documentation.
Overview of IPX
The switch provides support for the IPX, IPX/RIP, and IPX/SAP protocols. The switch dynamically builds and maintains an IPX routing table and an IPX service table.
Router Interfaces
The routing software and hardware routes IPX traffic between IPX router interfaces. A router interface is simply a VLAN that has an IPX network identifier (NetID) and IPX encapsulation type assigned to it. As you create VLANs with different IPX NetIDs the switch automatically routes between them. Both the VLAN switching and IPX routing function occur within the switch. Extreme switches support these IPX routing features: Separate routing interfaces for IP and IPX traffic on the same VLAN Load sharing of IPX routed traffic 802.1Q tagged packets on a routed IPX VLAN Figure 90 shows the same BlackDiamond switch discussed in earlier chapters. In Figure 90, IPX routing has been added to the BlackDiamond switch, and two additional VLANs have been defined; Exec and Support. Both VLANs have been configured as protocol-specific VLANs, using IPX.
423
IPX Routing
IP
IPX
192.207.35.0 Finance
192.207.36.0 Personnel
2516 Exec
A2B5 Support
Exec has been assigned the IPX NetID 2516. Support has been assigned the IPX NetID A2B5. All ports on slot 5 are assigned to Exec; all ports on slot 7 are assigned to Support. In addition, all ports on slot 4 have been assigned to Exec. Thus, the ports on slot 4 belong to both the Personnel VLAN (running IP) and the Exec VLAN (running IPX). Traffic within each VLAN is switched using the Ethernet MAC address. Traffic between Exec and Support is routed using the IPX NetID. Traffic cannot be sent between the IP VLANs (Finance and Personnel) and the IPX VLANs (Exec and Support).
424
Overview of IPX
ENET_8022 ENET_SNAP
To configure a VLAN to use a particular encapsulation type, use the following command:
configure vlan <vlan name> xnetid <netid> [enet_ii | enet_8023 | enet_8022 | enet_snap]
The valid range is from 1 to 4095. To assign tagged ports to the VLAN, use the following command:
configure vlan <vlan name> add port <portlist> {tagged | untagged} {nobroadcast}
425
IPX Routing
Dynamic Routes
Dynamic routes are typically learned by way of IPX/RIP. Routers that use IPX/RIP exchange information in their routing tables in the form of advertisements. Using dynamic routes, the routing table contains only networks that are reachable. Dynamic routes are aged out of the table when an update for the network is not received for a period of time, as determined by the routing protocol.
Static Routes
Static routes are manually entered into the routing table. Static routes are used to reach networks not advertised by routers. You can configure up to 64 static IPX routes on the switch. Static routes are never aged out of the routing table. Static routes are advertised to the network using IPX/RIP.
IPX/RIP Routing
The switch supports the use of IPX/RIP for unicast routing. IPX/RIP is different from IP/RIP. However, many of the concepts are the same. ExtremeWare supports the following IPX/RIP features: Split horizon Poison reverse Triggered Updates Route information is entered into the IPX route table in one of the following two ways: Dynamically, by way of RIP Statically, using the command:
configure ipxroute add [<dest_netid> | default] next_hop_netid next_hop_node_addr <hops> <ticks>
IPX/RIP is automatically enabled when a NetID is assigned to the VLAN. To remove the advertisement of an IPX VLAN, use the command:
configure ipxrip delete {vlan <vlan name> | all}
426
Configuring IPX
GNS Support
ExtremeWare supports the Get Nearest Server (GNS) reply function. When a NetID is assigned to the switch, the GNS reply service is automatically enabled. When a station requests a particular service on the network (for example, locating a print server), the station sends a GNS request and the switch responds to the request. If GNS-reply is disabled, the switch drops the request. To disable GNS-reply, use the following command:
disable ipxsap gns-reply {vlan <vlan name>}
Configuring IPX
This section describes the commands associated with configuring IPX, IPX/RIP, and IPX/SAP on the switch. To configure IPX routing, follow these steps: 1 Create at least two VLANs. 2 If you are combining an IPX VLAN with another VLAN on the same port(s), you must use a protocol filter on one of the VLANs, or use 802.1Q tagging. 3 Assign each VLAN a NetID and encapsulation type using the following command:
configure vlan <vlan name> xnetid <netid> [enet_ii | enet_8023 | enet_8022 | enet_snap]
Ensure that each VLAN has a unique IPX NetID and that the encapsulation type matches the VLAN protocol. Once you configure the IPX VLAN information, IPX forwarding automatically begins to function. Specifically, configuring the IPX VLAN automatically enables the IPX/RIP, IPX/SAP, and SAP GNS services.
427
IPX Routing
It is not possible to define a protocol-sensitive VLAN for filtering the IPX enet_8023 encapsulation type. Instead, use a protocol-sensitive filter on the other VLANs that share the same ports, leaving the enet_8023 encapsulation VLAN configured using the any protocol.
428
IP
IPX
192.207.35.0 Finance
192.207.36.0 Personnel
2516 Exec
A2B5 Support
The stations connected to the system generate a combination of IP traffic and IPX traffic. The IP traffic is filtered by the IP VLANs. IPX traffic is filtered by the IPX VLANs. In this configuration, all IP traffic from stations connected to slots 1 and 3 have access to the IP router by way of the VLAN Finance. IP traffic on ports on slots 2 and 4 reach the IP router by way of the VLAN Personnel. Similarly, IPX traffic from stations connected to slots 4 and 5 have access to the IPX router by way of the VLAN Exec. IPX traffic on ports on slot 7 reach the IPX router by way of the VLAN Support. Both Exec and Support use enet_8022 as the encapsulation type.
429
IPX Routing
430
Part 3
Configuring Modules
The Accounting and Routing Module (ARM) is a self-contained module for the BlackDiamond 6800 series chassis-based system. Unlike most other BlackDiamond modules, there are no external network interfaces on the ARM. Instead, the ARM provides advanced IP services for the other input/output (I/O) modules installed in the chassis. The ARM contains a powerful set of packet processing resources that operate in a one-armed fashion: receiving frames from the switch fabric, processing the frames, and transmitting the frames back into the switch fabric. More specifically, the accounting feature is used to track and record IP unicast packets. This enables you to create custom billing rates for your customers. This chapter covers the following topics: Summary of Features on page 433 Configuring the ARM on page 437 ARM Configuration Examples on page 443 Retrieving Accounting Statistics on page 452 Diagnostics Commands on page 453 Layer 2 and Layer 3 Switching Attributes on page 454 Debug Trace Commands on page 454
Summary of Features
The ARM includes the following features: Selective Longest Prefix MatchIP unicast packets are routed in the ARM hardware using a longest prefix match (LPM) algorithm. This differs from the BlackDiamond switch fabric, which uses an exact match algorithm. The BlackDiamond switch fabric has great forwarding capacity, but the ARM module has better handling of large numbers (hundreds of thousands) of destination IP addresses to match each packets destination IP address. To take advantage of the BlackDiamond switch fabric forwarding capacity and the ARM modules scalability, the ARM module can be configured to use the BlackDiamond switch fabric for some routes and the ARMs LPM for others. This feature is called Selective Longest Prefix Match (Selective-LPM). Destination-Sensitive AccountingDestination Sensitive Accounting gives you the flexibility to bill your customers at predetermined and different rates. The rates are based on the customers IP unicast packet destinations.
433
The accounting feature categorizes IP unicast packets using two parameters, input VLAN ID and accounting bin number. The VLAN ID is used to identify from which customer the packet is received. The accounting bin number is associated with the route used to forward the packet. External billing application servers can correlate the accounting bin number to a specific billing rate.
434
Summary of Features
installed and active, LPM processing is performed on those modules. Packets destined to VLANs or routes that are configured for LPM are forwarded to the MPLS modules or ARMs for processing when SLPM is enabled. The term for packets forwarded in this manner is LPM routing. The IP address-caching method is implemented in hardware on both the MSM and many of the I/O modules. On Extreme Networks products, this IP address cache is called the IP Forwarding Database (IP FDB). Packets destined to VLANs or routes that are not configured for LPM routing will not be sent to the MPLS module or ARM for processing. The term for packets forwarded in this manner is IP host routing. The default forwarding behavior for IP unicast packets is IP host routing. Due to the nature of the IP FDB, the overall system performance can suffer under adverse conditions. Under heavy traffic loads with a large number of destination IP addresses, updating IP FDB entries can tax the system's CPU resources. Similarly, network topology changes can cause large numbers of IP FDB entries to be added or deleted, taxing the system's CPU. Enabling LPM routing can allow forwarding decisions for one or more traffic flows to bypass the IP FDB and reduce the load on the CPU. SLPM, when enabled, also augments the performance of slow path forwarding. Under normal circumstances, if an IP packet received by the system has a destination IP address that cannot be found in the IP FDB, the CPU must forward that packet. Inserting an MPLS module or ARM, and enabling SLPM allows slow path processing to be performed by the module's hardware at a greatly accelerated rate. The choice of when to configure LPM routing versus IP host routing depends on two criteria: The ratio of destination IP addresses to IP routes. Bandwidth requirements for IP traffic flows. When the ratio of destination IP addresses to IP routes is extremely high, as is usually the case for a switch connected to the Internet, LPM routing should be considered. Typically, LPM routing would be enabled for any VLAN containing ports that connect to the Internet. However, LPM routing can be beneficial in any circumstance where the number of IP addresses in a destination network greatly exceeds the number of routes being advertised by that network. For example, LPM routing could be enabled for a network consisting mainly of end-user computers or one consisting of dial-up customers. The amount of bandwidth required by specific IP traffic flows needs to considered as well. LPM routing is performed by hardware on the MPLS modules or ARMs installed in the system. Each module is capable of processing 4 Gbps of traffic at maximum, and a maximum of four modules can be installed. This places an upper limit of 16 Gbps of throughput for traffic being LPM routed. If the aggregate bandwidth for a set of IP traffic flows exceeds the LPM routing bandwidth, then IP host routing should be used. An example where IP host routing is beneficial is a core router connecting multiple campus networks to each other. A special set of commands is used to configure the SLPM function. Table 53 describes the commands added to the ExtremeWare software for configuring SLPM. Table 53: SLPM Commands
Command configure iproute route-map [ospf-intra | ospf-inter | ospf-extern1 | ospf-extern2 | ospf | rip | static | e-bgp | i-bgp | bgp | direct] <route-map> | none Description of Change Configures how the specified route map is to be applied to IP routing tables. If none is selected, it disassociates the route map from the routing protocol.
435
Command
Description of Change
configure route-map <route-map> Configures IP host routing for the specified route map entry. <sequence_number> [add | delete] set iphost-routing configure route-map <route-map> Configures LPM routing for the specified route map entry. <sequence_number> [add | delete] set lpm-routing disable ipforwarding lpm-routing {{vlan} <vlan>} disable lpm enable ipforwarding lpm-routing {{vlan} <vlan>} enable lpm show lpm Disable the LPM routing feature for the specified VLAN. If no VLAN is specified, LPM routing is disabled for all VLANs except the management VLAN. Disables the SLPM function. Enables the LPM routing feature for the specified VLAN. If no VLAN is specified, LPM routing is enabled for all VLANs except the management VLAN. Enables the SLPM function. Indicates if SLPM is currently enabled or disabled.
NOTE SLB, Selective-LPM and DSA are mutually exclusive functions and cannot be simultaneously enabled.
436
configure route-map <route-map> Configures the accounting bin number to be associated with <sequence_number> [add | the specified route map entry. The accounting-index value is delete] set accounting-index 1 always set to 1 for destination-sensitive accounting. value <bin_number> disable accounting enable accounting show accounting {<vlan>} Disables the destination-sensitive accounting function. Enables the destination-sensitive accounting function. Displays accounting statistics for the specified VLAN. If no VLAN is specified, statistics for all VLANs are displayed.
NOTE SLB, Selective-LPM and DSA are mutually exclusive functions and cannot be simultaneously enabled.
NOTE Documentation for Extreme Networks products is available on the World Wide Web at the Extreme Networks home page at http://www.extremenetworks.com. This section includes information on the following topics: Basic Accounting Configuration Information on page 437 Basic SLPM Configuration Information on page 439 Using Route Maps on page 441
437
You use a special set of commands to configure the accounting function. Due to the redirection of all incoming IP unicast packets to the ARM, the accounting feature is incompatible with ExtremeWare Server Load Balancing, and Selective-LPM. These features cannot be enabled simultaneously. The following sections describe how to create a customer VLAN ID, how to enable and disable IP forwarding, how to configure the accounting bin, and how to display destination-based accounting statistics.
The name parameter is the name of the VLAN you created. The vlanid parameter is the number assigned to the VLAN. The valid numerical range for a VLAN ID is from 1 to 4095. The portlist parameter specifies one or more ports assigned to the VLAN. The tagged | untagged keyword configures the ports as tagged or untagged. The nobroadcast keyword prevents the switch from forwarding broadcast, multicast, and unknown unicast traffic. The following command example creates a customer VLAN named acme with a VLAN ID of 100. Ports 1 and 2 in slot 6 are assigned to the VLAN.
create vlan acme configure vlan acme tag 100 configure vlan acme add ports 6:1-6:2 tagged
The name parameter is the name of the VLAN you created. The following command example enables IP forwarding on a VLAN named acme:
enable ipforwarding acme
438
If you specify the optional vlan parameter, traffic statistics for that VLAN are displayed. If you do not specify the vlan parameter, traffic statistics for all VLANS are displayed. The statistics include eight bins per VLAN, where each bin includes the number of packets and bytes forwarded and IP destinations associated with the bin.
439
For both commands, if a VLAN is specified, the command applies only to that VLAN. If no VLAN is specified, then all VLANs except for the management VLAN are affected. This command only affects VLANs that exist at the time the command is issued. If neither of these commands is issued, then the default selection is to use IP host routing for all VLANs. The following command example enables LPM routing for the VLAN named customer1 and disables LPM routing (selecting IP host routing) for the VLAN named srvr-farm.
enable ipforwarding lpm-routing customer1 disable ipforwarding lpm-routing srvr-farm
It is allowable to enable the SLPM feature even though LPM routing has not been configured for any VLAN or IP route entry. In this case, the MPLS module or ARM takes over slow path forwarding from the MSM CPU. Any packet received by the system whose destination IP address cannot be found in the IP FDB, is forwarded using the slow path. The MPLS module or ARM, when SLPM is enabled, augments the performance of the slow path, providing a greatly accelerated forwarding rate.
440
This command will report if SLPM is enabled or disabled. The ExtremeWare show vlan and show iproute commands have been modified to indicate which VLANs and IP route entries have been enabled for LPM routing. A VLAN for which LPM routing has been enabled will display an I (capital i) in the flags field of the show vlan command output. An IP route entry for which LPM routing has been enabled will display a P in the flags field of the show iproute command.
Where the following is true: The route-map parameter identifies a particular route map. The sequence_number parameter identifies a specific entry in that route map. The sequence number must be associated with a match statement. The set accounting-index 1 value keyword phrase indicates that the following parameter is an accounting bin number. The bin_number parameter is an integer between 07, and allows you to define the accounting bin number.
441
configure route-map <route-map> <sequence_number> [add | delete] set iphost-routing configure route-map <route-map> <sequence_number> [add | delete] set lpm-routing
Where the following is true: The route-map parameter identifies a particular route map. The sequence_number parameter identifies a specific entry in that route map. The sequence number must be associated with a match statement. The set iphost-routing keyword phrase indicates that IP host routing is to be used for IP route entries matching this route map entrys criteria. The set lpm-routing keyword phrase indicates that LPM routing is to be used for IP route entries matching this route map entrys criteria.
Where the following is true: The ospf-intra (intra-area), ospf-inter (inter-area), ospf-extern1 (external type 1), ospf-extern2 (external type 2), ospf, rip, static, e-bgp (exterior gateway protocol), i-bgp (interior gateway protocol), bgp (border gateway protocol), and direct (directly connected subnets) are keywords that identify route sources that are inserted into the IP routing table. The configured route map is applied when routes of the specified source type are entered into the routing table. If there is a match between a route map entry and routing table entry, then the specified action is taken. For accounting, the configured bin number is associated with the matching routing table entry. If there is no match, the bin number 0 is assigned to the routing table entry. For SLPM, the configured routing method is selected for the matching routing table entry. If there is no match, the routing method selected will be based on the routing method for the VLAN associated with the routing table entrys next-hop.
The following command displays the route map associated with each IP route protocol:
show iproute route-map Route Origin Route-Map Direct Static OSPFIntra OSPFInter RIP OSPFExt1 dsb1 dsb1 dsb2 dsb2 dsb1 dsb2
442
If a route map is excluded from the IP routing table, the route origins for that specific route map are not displayed. For example, if you exclude ospf from the iproute configuration command configure iproute route-map ospf none, OSPF information is not displayed in the show iproute route-map command:
show iproute route-map Route Origin Route-Map Direct Static RIP EBGP IBGP dsb1 dsb1 dsb1 dsb2 dsb2
443
4
192.168.101.0/24
5
192.168.102.0/24
DSA
VLAN 1
VLAN 2
VLAN 3
Packet count from VLAN 3 to 192.168.100.0/24 Byte count from VLAN 3 to 192.168.100.0/24
MPLS_22
In this example, all IP unicast traffic is forwarded by the BlackDiamond switch to one of three subnets. Each IP subnet is mapped to a different accounting bin. Configure the accounting feature by following these steps: 1 Create VLANs for each attached IP subnet by using the following commands to configure the customer network interfaces as well as the providers internal network interface. In this example, the provider is using OSPF to advertise network service IP subnets.
create vlan vlan1 configure vlan1 ipaddress 192.168.200.1/24 configure vlan1 add ports 8:1 create vlan vlan2 configure vlan2 ipaddress 192.168.201.1/24 configure vlan2 add ports 8:2 create vlan vlan3 configure vlan3 ipaddress 192.168.202.1/24 configure vlan3 add ports 8:3 create vlan backbone configure backbone ipaddress 192.168.10.1/30 configure backbone add ports 7:1 enable ipforwarding configure ospf add backbone area 0.0.0.0 enable ospf
444
2 Create access profiles for each destination subnet by using the following commands to create three different profiles: service1, service2, and service3. Each profile is defined to be type ipaddress. Each subnet is then assigned to one of the profiles.
create access-profile service1 type ipaddress configure service1 add ipaddress 192.168.100.0/24 create access-profile service2 type ipaddress configure service2 add ipaddress 192.168.101.0/24 create access-profile service3 type ipaddress configure service3 add ipaddress 192.168.102.0/24
4 Assign bin numbers to each route map entry by using the following commands:
configure service_example 10 add set accounting-index 1 value 3 configure service_example 20 add set accounting-index 1 value 4 configure service_example 30 add set accounting-index 1 value 5
5 Correlate the route map to OSPF intra-area routes by using the following command:
configure iproute route-map ospf-intra service_example
The show iproute detail command displays the bin number, if any, that is associated with a particular route. This command is useful for verifying that bin number configurations are correct. Below is an excerpt from the output of the show iproute detail command for this example configuration
Destination: 192.168.100.0/24 Gateway: 192.168.10.2 Metric: 14 Flags: UG-----umPAcct-1: 3 Use: 0 M-Use: 0 VLAN: backbone Destination: 192.168.101.0/24 Gateway: 192.168.10.2 Metric: 14 Flags: UG-----umPAcct-1: 4 Use: 0 M-Use: 0 VLAN: backbone Destination: 192.168.102.0/24 Gateway: 192.168.10.2 Metric: 14 Flags: UG-----umPAcct-1: 5 Use: 0 M-Use: 0 VLAN: backbone Origin: *OSPFIntra Duration: 0d:1h:07m:43s
445
Origin(OR): (b) BlackHole, (be) EBGP, (bg) BGP, (bi) IBGP, (bo) BOOTP (ct) CBT, (d) Direct, (df) DownIF, (dv) DVMRP, (e1) ISISL1Ext (e2) ISISL2Ext, (h) Hardcoded, (i) ICMP, (i1) ISISL1 (i2) ISISL2, (ma) MPLSIntra, (mr) MPLSInter, (mo) MOSPF (o) OSPF, (o1) OSPFExt1, (o2) OSPFExt2, (oa) OSPFIntra (oe) OSPFAsExt, (or) OSPFInter, (pd) PIM-DM, (ps) PIM-SM (r) RIP, (ra) RtAdvrt, (s) Static, (sv) SLB_VIP, (un) UnKnown (*) Preferred route Flags: (B) (L) (P) (t) BlackHole, (D) Dynamic, (G) Gateway, (H) Host Route Direct LDP LSP, (l) Indirect LDP LSP, (m) Multicast LPM-routing, (R) Modified, (S) Static, (T) Direct RSVP-TE LSP Indirect RSVP-TE LSP, (u) Unicast, (U) Up
Mask distribution: 1 routes at length 8 2 routes at length 30 Route origin distribution: 6 routes from Direct 2 routes from EBGP Total number of routes = 11.
8 routes at length 24
The show accounting command lists the packet and octect counts for each bin number per VLAN. Bin 0 is always the default bin and is used to maintain traffic statistics for packets that do not match any of the route map profiles. Bins that have the same packet and octect counts are grouped together. All maintained statistics are 64-bit values. Below is an excerpt of the show accounting command. It is assumed that 1000 64-byte packets have been received for each service from each customer.
VLAN Name( ID) ---------------------Default( 1) MacVlanDiscover(4095) Mgmt(4094) vlan1(4093) Bins ---0-7 0-7 0-7 0-2 3-5 6-7 0-2 3-5 6-7 0-2 3-5 6-7 0-7 Packets ---------------------0 0 0 0 1000 0 0 1000 0 0 1000 0 0 Octets ---------------------0 0 0 0 46000 0 0 46000 0 0 46000 0 0
vlan2(4092)
vlan3(4091)
backbone(4090)
446
0 1 default
3
DSA
VLAN 1
VLAN 2
VLAN 3
Packet count from VLAN 2 to BGP routes with community string 2222:2 Byte count from VLAN 2 to BGP routes with community string 2222:2
MPLS_23
In this example, all IP unicast traffic forwarded by the BlackDiamond switch to one of two BGP communities is counted. Each IP subnet associated with the configured BGP community is mapped to a different accounting bin. Configure the accounting feature by following these steps: 1 Create VLANs for each attached IP subnet by using the following commands to configure the customer network interfaces as well as the providers Internet uplink:
create vlan vlan1 configure vlan1 ipaddress 192.168.200.1/24 configure vlan1 add ports 8:1 create vlan vlan2 configure vlan2 ipaddress 192.168.201.1/24 configure vlan2 add ports 8:2 create vlan vlan3 configure vlan3 ipaddress 192.168.202.1/24
447
configure vlan3 add ports 8:3 create vlan to-internet configure to-internet ipaddress 192.168.20.1/30 configure to-internet add ports 7:2 enable ipforwarding configure bgp routerid 192.168.20.1 configure bgp AS-number 65001 create bgp neighbor 192.168.20.2 remote-AS-number 65002 enable bgp neighbor all enable bgp
2 Create the route map bgp_example, map the communities 1111:1 and 2222:2 to the newly created route map and assign a bin number to each BGP community by using the following commands:
create route-map bgp_example configure bgp_example add 10 permit configure bgp_example 10 add match community 1111:1 configure bgp_example 10 add set accounting-index 1 value 1 configure bgp_example add 20 permit configure bgp_example 20 add match community 2222:2 configure bgp_example 20 add set accounting-index 1 value 2
3 Apply the route map to external BGP routes by using the following commands:
configure iproute route-map e-bgp bgp_example
Below is an excerpt of show accounting command. It is assumed that 1000 64-byte packets have been received for each service from each customer.
VLAN Name( ID) ---------------------Default( 1) MacVlanDiscover(4095) Mgmt(4094) vlan1(4093) Bins ---0-7 0-7 0-7 0 1-2 3-7 0 1-2 3-7 0 1-2 3-7 0-7 Packets ---------------------0 0 0 0 1000 0 0 1000 0 0 1000 0 0 Octets ---------------------0 0 0 0 46000 0 0 46000 0 0 46000 0 0
vlan2(4092)
vlan3(4091)
to-internet(4090)
448
Internet
Firewall
DMZ: 10.5.1.0/28
In this example, IP unicast traffic between the local and remote branches is forwarded using the BlackDiamonds switch fabric. However, IP subnet 10.4.0.0/16 does not require a high-bandwidth switching path. To conserve IP FDB entries, packets destined for this subnet are routed using LPM. IP unicast traffic between either branch network and the Internet is routed using LPM. However, IP packets destined for IP subnet 10.5.1.0/28 are forwarded using the BlackDiamonds switch fabric. Configure the SLPM feature by following these steps: 1 Create VLANs for each attached IP network by using the following commands:
create vlan local_branch configure local_branch ipaddress 10.2.0.1/16 configure local_branch add ports 7:1
449
create vlan remote_branch configure remote_branch ipaddress 10.3.0.1/24 configure remote_branch add ports 7:2 create vlan to_internet configure to_internet ipaddress 10.1.0.1/30 configure to_internet add ports 7:3 enable ipforwarding
2 Configure routing for the destination IP subnets by using the following commands:
configure iproute add 10.4.0.0/16 10.3.0.2 configure iproute add 10.5.1.0/28 10.1.0.2 configure bgp routerid 10.1.0.1 configure bgp AS-number 65001 create bgp neighbor 10.1.0.2 remote-AS-number 65002 enable bgp neighbor all enable bgp
3 Enable LPM routing of IP packets for the to_internet VLAN by using the following commands. Though the LPM routing feature is disabled by default, the commands to disable it on the local_branch and remote_branch VLANs are included here.
enable ipforwarding lpm-routing to_internet disable ipforwarding lpm-routing local_branch disable ipforwarding lpm-routing remote_branch
4 Create access profiles for the DMZ and the remote branchs low-bandwidth IP subnet by using the following commands to create two different access profiles, dmz and remote_hosts. Each profile is defined to be type ipaddress. Each subnet is then assigned to one of the profiles.
create access-profile dmz type ipaddress configure dmz add ipaddress 10.5.1.0/28 create access-profile remote_hosts type ipaddress configure remote_hosts add ipaddress 10.4.0.0/16
5 Create a route map named lpm_example, and configure the LPM and IP host routing features for each of the subnets in the newly created route map by using the following commands:
create route-map lpm_example configure lpm_example add 10 permit configure lpm_example 10 add match nlri-list dmz configure lpm_example 10 add set iphost-routing configure lpm_example add 20 permit configure lpm_example 20 add match nlri-list remote_hosts configure lpm_example 20 add set lpm-routing
6 Apply the route map to static routes by using the following command:
configure iproute route-map static lpm_example
450
The show vlan command has been enhanced to indicate which VLANs have the LPM routing feature enabled. The LPM routing feature is indicated by an I in the flags column of the show vlan command output. Below is the output of the show vlan command for this example:
Name Default MacVlanDiscover Mgmt local_branch remote_branch to_internet Flags: (C) (E) (i) (L) (N) (p) (S) (2) VID 1 4095 4094 4093 4092 4091 Protocol Addr 0.0.0.0 /BP ----------------------------------10.2.0.1 /16 10.3.0.1 /24 10.1.0.1 /30 Flags -----f-------------------f-----------f-----------f-I----Proto ANY ANY ANY ANY ANY ANY Super Ports 0/0 0/0 1/1 1/1 1/1 1/1 STP 0 0 0 0 0 0
Domain-masterVlan, (c) Domain-memberVlan, (d) DVMRP Enabled ESRP Slave, (f) IP Forwarding Enabled, (G) GVRP Enabled ISIS Enabled, (I) IP Forwarding lpm-routing Enabled Loopback Enabled, (M) ESRP Master, (m) IPmc Forwarding Enabled GNS Reply Enabled, (o) OSPF Enabled, (P) IPX SAP Enabled PIM Enabled, (R) SubVLAN IP Range Configured, (r) RIP Enabled SuperVlan, (s) SubVlan, (v) VRRP Enabled, (X) IPX RIP Enabled IPX Type 20 Forwarding Enabled
The show iproute command has been enhanced to indicate which routes have the LPM routing feature enabled. The LPM routing feature is indicated by a P in the flags column of the show iproute command output. Below is the output of the show iproute command for this example:
Ori *d *s *d *d *s *d Destination 10.1.0.0/30 10.5.1.0/28 10.3.0.0/24 10.2.0.0/16 10.4.0.0/16 127.0.0.1/8 Gateway 10.1.0.1 10.1.0.2 10.3.0.1 10.2.0.1 10.3.0.2 127.0.0.1 Mtr 1 1 1 1 1 0 Flags U------u-PUG---S-um-U------u--U------u--UG---S-umPU-H----um-VLAN to_inter to_inter remote_b local_br remote_b Default Duration 0d:0h:11m:34s 0d:0h:00m:21s 0d:0h:11m:46s 0d:0h:11m:56s 0d:0h:00m:02s 0d:0h:19m:34s
Origin(OR): (b) BlackHole, (be) EBGP, (bg) BGP, (bi) IBGP, (bo) BOOTP (ct) CBT, (d) Direct, (df) DownIF, (dv) DVMRP, (e1) ISISL1Ext (e2) ISISL2Ext, (h) Hardcoded, (i) ICMP, (i1) ISISL1 (i2) ISISL2, (ma) MPLSIntra, (mr) MPLSInter, (mo) MOSPF (o) OSPF, (o1) OSPFExt1, (o2) OSPFExt2, (oa) OSPFIntra (oe) OSPFAsExt, (or) OSPFInter, (pd) PIM-DM, (ps) PIM-SM (r) RIP, (ra) RtAdvrt, (s) Static, (sv) SLB_VIP, (un) UnKnown (*) Preferred route Flags: (B) (L) (P) (t) BlackHole, (D) Dynamic, (G) Gateway, (H) Host Route Direct LDP LSP, (l) Indirect LDP LSP, (m) Multicast LPM-routing, (R) Modified, (S) Static, (T) Direct RSVP-TE LSP Indirect RSVP-TE LSP, (u) Unicast, (U) Up
451
1 routes at length 30 Route origin distribution: 4 routes from Direct Total number of routes = 6.
452
Diagnostics Commands
Diagnostics Commands
The show diag slot <slot> iproute command displays the ARM IP routing table. The ARM IP routing table is similar to the IP routing table maintained on the MSM module, but differs in the following ways: A maximum of four equal cost routes are stored. Directly attached hosts are inserted into the ARM IP routing table as host routes (OR=ho). The following commands display the ARM IP routing table:
show diag slot <slot> iproute [origin | summary | <ipaddress>] show diag slot <slot> iproute origin [bgp | blackhole | direct | e-bgp | best-route | i-bgp | ospf-extern1 | ospf-extern2 | ospf-inter | ospf-intra | rip | static]
Below is an example of the show diagnostics slot <slot number> iproute command:
GWay Flags mf_L mf_L mf_L mf_L mf_L mf__ mf__ mf__ VLAN Flags 0 _____ _____ _____ _____ _____ f_urt 0 f_urt 1 f_urt
OR d d d d d ho ho be
Gateway MAC 000130032000 000130032000 000130032000 000130032000 000130032000 00a2f1000001 00a2f2000001 00a2f2000001
VLAN Acct to-internet backbone 0 vlan1 0 vlan2 0 vlan3 0 backbone 0 to-internet to-internet
453
be oa oa oa
Origin(OR): b - BlackHole, bg - BGP, be - EBGP, bi - IBGP, bo - BOOTP, ct - CBT d - Direct, df - DownIF, dv - DVMRP, h - Hardcoded, ho - Host i - ICMP, mo - MOSPF, o - OSPF, oa - OSPFIntra, or - OSPFInter oe - OSPFAsExt, o1 - OSPFExt1, o2 - OSPFExt2, pd - PIM-DM ps - PIM-SM, r - RIP, ra - RtAdvrt, s - Static, sv - SLB_VIP mp - MPLS, un - UnKnown. Flags: d - Discard, f - IP Forwarding, m - MAC Address Valid, L - Local Route Vlan Flags: f - IP Forwarding, I - IP Forwarding lpm-routing, r - Redirect, t - Send Time Exceeded, u - Unreachable Total number of routes = 12. Mask distribution: 8 routes at length 24 2 routes at length 32 Route origin distribution: 5 routes from Direct 2 routes from EBGP
2 routes at length 30
454
System-level debug tracing is provided for the Network Processor card (npcard) subsystem. To enable this support, use the following command:
configure debug-trace npcard <level>
NOTE The debug commands should be used only under the guidance of Extreme Networks technical personnel. In general, the level maps the severity of the log message. Table 55 displays the definitions for the npcard subsystem. Table 55: NPCard Debug Log Messages
Debug Level 0Error 1Warning Debug Level Definition Indicates that a severe event has occurred that most likely will result in the termination or improper operation of the ARM. Indicates that a major event has occurred. It may represent a negative operation. It should be reviewed to ensure proper continuation of ARM operation. Indicates a minor event has occurred. Provides additional information to support engineers for the purpose of diagnosing network problems.
2Informational 3Debug
455
456
The Asynchronous Transfer Mode (ATM) module is an I/O module for the BlackDiamond 6800 series chassis-based system. The ATM module connects a BlackDiamond 6800 series switch to the ATM infrastructure used by service providers or enterprise customers. This chapter includes information on the following topics: About the ATM Module on page 457 Configuring the ATM Module on page 460
457
Feature Summary
The ATM module supports the following key networking functions: Synchronous Optical Network (SONET) and Synchronous Digital Hierarchy (SDH) modes of operation IP routing via the Logical Link Control (LLC) Encapsulation for Routed Protocols compatible with RFC 2684/RFC 1483 Transparent LAN Services (TLS) over Asynchronous Transfer Mode (ATM) via the LLC Encapsulation Bridged Protocols compatible with RFC 2684/RFC 1483 Permanent Virtual Circuits (PVCs) may be associated with one or more VLANs Routed and bridged encapsulations on the same PVC Jumbo frames Quality of Service (QoS) and Differentiated Services (DiffServ) features, including support for: Eight ingress queues and eight egress queues per interface Ingress and egress rate shaping and limiting IEEE 802.1p VLAN priorities Weighted RED (WRED) congestion avoidance algorithm Assured Forwarding and Expedited Forwarding RFCs Service provider specific features, such as: Flexible remapping of DiffServ codepoints Flexible remapping of IEEE 802.1Q VLAN IDs VLAN tunneling via nested 802.1Q tags
Function Summary
The following sections provide brief descriptions of the key functions provided by the ATM module. Each of these sections is expanded into greater detail in Configuring the ATM Module on page 460.
458
Union (ITU) for use in Europe and elsewhere in the global digital network. Because SDH evolved out of SONET, the two standards are closely related and have been widely accepted as a dominant choice for implementations requiring high transport capacity and resistance to failure. The term SONET is used through out this guide. In instances where there are differences between SONET and SDH, the differences are explicitly called out.
Jumbo Frames
The ATM module ports provide jumbo frame support that is similar to that provided by Ethernet ports on a BlackDiamond 6800 series switch. Jumbo frames are Ethernet frames that are larger than 1522 bytes, including four bytes used for the cyclic redundancy check (CRC). Extreme products support switching and routing of jumbo frames at wire-speed on all ports. Jumbo frames are used between endstations that support larger frame sizes for more efficient transfers of bulk data. Both endstations involved in the transfer must be capable of supporting jumbo frames.
459
DSCP Mapping. You can use the diffserv dscp-mapping command to configure a mapped relationship between an input DSCP and an associated output DSCP. Each ATM port supports three DSCP mapping tables: one of the tables is used in the ingress direction; two are used for egress flows (onto the ATM link). The two egress tables are for the congested and noncongested states, as determined by the RED algorithm. If RED is not enabled on the ATM port, the egress congested-state mapping table is not used. In the ingress direction, the input DSCP of a packet received from the ATM link is replaced by an output DSCP before the packet is forwarded. In the egress direction, the operation is similar, except that the DSCP mapping occurs before the packet is transmitted onto the ATM link. One potential use of the DSCP mapping capability is to reconcile varying DiffServ policies at the boundary between autonomous systems, such as at the boundary between two ISPs. The availability of different tables for the congested and noncongested states is useful in marking operations that increase the probability of packets being dropped during times of congestion, as discussed in the DiffServ Assured Forwarding RFC (RFC 2597). VLAN ID (VID) Tag Mapping. An analogous feature has been added for the managing of 802.1Q tags. The dot1q tagmapping command provides support for VLAN ID (VID) mapping tables. Each ATM port supports two VID tables: one table is used in the ingress direction; the other is used in the egress direction. Each of the tables enables an input VID to be mapped to an output VID. This feature is useful in reconciling policy differences at the boundary between the customer and the service provider. VLAN ID (VID) Tag Nesting. Another related enhancement provides support for nested 802.1Q tags by allowing a tag push or tag pop attribute to be associated with a VID. The push attribute indicates that a new tag is to be added to the frame, while the pop attribute indicates that the top-level tag is to be removed from the frame. This capability is augmented by an option that allows the 802.1p priority of the frame to be either preserved or set to a user-configurable value when a new tag is pushed. These functions make it possible for service providers to tunnel customer-specific VLANs across a common ATM backbone in a very simple manner. VLAN to PVC Mapping. VLAN to PVC mapping can be used by service providers to isolate and provision a customer s traffic using different VLANs and PVCs for each customer. Thus, a service provider can securely transport a customer s Ethernet traffic across an ATM backbone or vice-versa.
NOTE Documentation for Extreme Networks products is available on the World Wide Web at the Extreme Networks home page at http://www.extremenetworks.com/.
460
NOTE The ATM module can support one PVC per VLAN for each port. The BlackDiamond 6800 series switch can support 3000 VLANs.
461
(except the Frame Check Sequence) across an ATM PVC. The ATM PVC looks like an Ethernet segment to the rest of the switch. The Ethernet frame can carry any protocol including IP, IPX, and MPLS, and it can also include 802.1Q and 802.1p tags. The ATM module can also use the routed protocol encapsulation for sending IP packets across an ATM PVC. When using the routed protocol encapsulation, the ATM module strips the Ethernet header and only forwards the IP datagram across the ATM PVC, resulting in improved throughput for IP packets. Before packets can be forwarded over ATM ports, at least one PVC must be configured on the port and mapped to a VLAN using the configure atm add pvc command. Each PVC must be mapped to one or more VLANs and each mapping must be designated to use the bridged protocol encapsulation (using the encap l2 keywords in the configure atm add pvc command) or the routed protocol encapsulation (using the encap ip keywords in the configure atm add pvc command). Both encapsulations can be simultaneously used on a PVC as long as they are associated with different VLANs. ExtremeWare supports up to 500 routed VLANs and 4000 total VLANs in the BlackDiamond switch. When a routed VLAN is configured, the total number of VLANs supported in the BlackDiamond switch is 1500. Each ATM port can support the previously described VLAN limits, and the following rules govern the association of PVCs with VLANs: Each PVC configured on a given ATM port must be associated with one or more VLANs. The same VLAN cannot be associated with multiple PVCs on the same ATM port. Ports 1 and 2 on the same ATM module may not be bridged together; similarly, ports 3 and 4 on the same ATM module may not be bridged together. Ports 1 and 2 or ports 3 and 4 may not be members of the same VLAN. Ports 1 and 2 on the same ATM module may not use the same VPI/VCI for a PVC; similarly, ports 3 and 4 on the same ATM module may not use the same VPI/VCI for a PVC. Both encapsulation types may be carried on the same PVC as long as they are associated with different VLANs. Multiple tagged VLANs may be configured to use the L2 encapsulation on the same PVC. Only one VLAN may be configured to use the IP encapsulation on a given PVC. Only one untagged VLAN may use the L2 encapsulation on a given PVC. When the IP encapsulation is configured, the ATM port must be the only member of the associated VLAN, and the IP address of the peer router must be configured using the peer-ipaddress <ipaddress> parameter in the configure atm add pvc command. Frames received on an ATM port for VLANs that the ATM port is not a member of are discarded. Additionally, frames received from a PVC that contain a VLAN ID which does not match the VLAN ID associated with any of the VLANs configured for that PVC are discarded. Similarly, a frame received from the switch backplane is only forwarded on a PVC when the VLAN ID in the frame matches the VLAN ID associated with one of the VLANs configured for that PVC. The ATM module supports all of the Spanning Tree Protocol (STP) commands. STP Bridge Protocol Data Units (BPDUs) are sent on a PVC when an L2 encapsulated VLAN associated with the PVC has been added to an STP domain. STP BPDUs are always transmitted as untagged frames on ATM PVCs. The enable ignore-stp vlan command can be used to indicate that the spanning tree forwarding state should be ignored for a particular VLAN. Bridging Over ATM ports. Figure 95 displays multiple BlackDiamonds being used by an Ethernet Service Provider to provide point-to-point connectivity between their customer s Ethernet networks using ATM PVCs. In this example, CustomerA has an Ethernet network in two different locations, one
462
connected to BlackDiamond switch 1 via port 1:1 and the other connected to BlackDiamond switch 2 via port 8:1. Similarly, CustomerB is connected to BlackDiamond switch 1 via port 1:16 and BlackDiamond switch 3 via port 8:1. On BlackDiamond switch 1, the service provider has configured PVC 5/101 on ATM port 8:1 to connect to BlackDiamond switch 2 and PVC 5/102 on ATM port 8:1 to connect to BlackDiamond switch 3. The following configuration commands describe the basic steps necessary to configure the network displayed in Figure 95. Figure 95: Bridging over ATM ports
BlackDiamond 2 Customer A
1 2 3 4 A B 5 6 7 8
1:1
Customer A 8:1
PVC 5/101
BlackDiamond 1
1 2 3 4 A B 5 6 7 8
8:1
PVC 5/101
1:1 1:16
ATM network
BlackDiamond 3
1 2 3 4 A B 5 6 7 8
Customer B 8:1
1:1 Customer B
Commands for configuring BlackDiamond switch 1:
ATM_011
create vlan customerA configure vlan customerA tag 101 configure vlan customerA add ports 1:1, 8:1 tagged configure atm add pvc 5/101 encap l2 vlan customerA port 8:1 create vlan customerB configure vlan customerB tag 102 configure vlan customerB add ports 1:16, 8:1 tagged configure atm add pvc 5/102 encap l2 vlan customerB port 8:1
463
Routing Over ATM Ports. Figure 96 displays multiple BlackDiamonds being used to inter-connect server co-location sites using an ATM PVC. In this example, the customer has leased an ATM PVC between the different server co-location sites. The following configuration commands describe the basic steps necessary to configure the network displayed in Figure 96. Figure 96: Routing over ATM ports
Server farm A
Server farm B
192.168.9.1
192.168.11.1
BlackDiamond 1
1 2 3 4 A B 5 6 7 8
BlackDiamond 2
1 2 3 4 A B 5 6 7 8
8:1 1:1
PVC 5/101 192.168.10.1
8:1
ATM_012
464
Configuring PVCs
This section describes how to configure a PVC on an ATM port. The following command is used to define a PVC on an ATM port:
configure atm add pvc <vpi/vci> encap [l2 | ip peer-ipaddress <ipaddress>] vlan <vlan name> ports <portlist>
Where the following is true: The PVC is identified by the specified vpi and vci parameters. The vpi parameter is an integer in the range of 0 through 15. The vci parameter is an integer in the range of 17 through 4095. The encap parameter indicates the type of encapsulation that is to be used on the PVC for traffic from the associated VLAN. The l2 keyword is an abbreviation for Layer-2 and indicates the LLC Encapsulation for Bridged Protocols (defined in RFC 2684). The ip keyword indicates that the VLAN will carry only routed IP traffic and that the LLC Encapsulation for Routed Protocols (defined in RFC 2684) should be used.
Deleting PVCs
The following command is used to delete a PVC configuration on an ATM port:
configure atm delete pvc [<vpi / vci> | all] {vlan <vlan name>} ports <portlist>
This command deletes the specified PVC configuration on the specified ATM port(s). The optional vlan parameter may be used to limit the scope of the command to the specified VLAN. The PVC may still exist following command execution if multiple VLANs have been configured to use the PVC. If the vlan parameter is omitted, the PVC configuration is deleted for all VLANs on the specified ATM port(s). The command can be used to delete configuration information for the PVC identified via the vpi and vci parameters for all PVCs defined for the specified VLAN(s) or port(s). The all keyword may also be used as the portlist parameter to indicate that the command should be applied to all ATM ports. A PVC is completely deleted when there are no longer any VLANs configured for the PVC on a given ATM port.
NOTE All associated PVCs must be deleted before an ATM port can be removed from a VLAN.
465
You can use the optional portlist parameter to narrow the range of status information the command displays; otherwise, the command displays the status information for all ports. By default, the command displays a summary of status information for the specified ports. The summary of status information includes the following information for each port: Values of all port configuration parameters Port state ATM statistics The detailed status information includes the summary information plus any ATM statistics. Table 56 describes the ATM receive statistics, and Table 57 describes the ATM transmit statistics.
466
You can specify a particular PVC to display information for, or you can specify that information for all PVCs be displayed. You can use the optional vlan parameter to narrow the range of status information the command displays; otherwise, the command displays status information for all VLANs. You can use the optional portlist parameter to narrow the range of status information the command displays; otherwise, the command displays the status information for all PVCs associated with all ATM ports. By default, the command displays a summary of status information for the specified PVC. The summary of status information includes the following information for each PVC: Port number VPI/VCI VLAN IDs on this PVC Type of PVC (L2 or IP) Peer IP address (for IP PVCs) Received octets Received packets Transmitted octets Transmitted packets The following command example displays all of the PVC status information for a PVC configured on an ATM port in a BlackDiamond switch:
show atm pvc 5/101 port 1:1
Choose either on or off. Scrambling is enabled by default. Scrambling is used to improve signal synchronization and the performance of the ATM cell delineation process. The following command example turns off the scrambling function for port 1 of the ATM module installed in slot 8 of the BlackDiamond switch.
configure atm scrambling off ports 8:1
467
1. B2 bit error rate (BER) threshold; a Signal Failure (SF) event is generated if the BER exceeds the specified threshold. 2. B2 bit error rate (BER) threshold; a Signal Degrade (SD) event is generated if the BER exceeds the specified threshold. 3. The default value of 1 is per ANSI T1.105-1995. This parameter applies only when SONET framing is configured on the port. 4. This parameter applies only when SDH framing is configured on the port. 5. When SDH framing is configured on the port, only the first 15 characters of the string are applied. 6. Set automatically based on synchronous payload envelope (SPE) payload type.
468
The following command example selects SDH framing for port 1 of the ATM module installed in slot 8 of the BlackDiamond switch.
configure sonet framing sdh ports 8:1
The following command example selects line clocking for port 1 of the ATM module installed in slot 8 of the BlackDiamond switch.
configure sonet clocking line ports 8:1
The error_rate parameter is an integer in the range from 3 to 5, where the SF BER is 10-error_rate. The default value of the error_rate parameter is 5, which equates to an SF bit error rate of 10-5, or 1 per hundred thousand. The following command example sets the Signal Fail threshold value to 3 for port 1 of the ATM module installed in slot 8 of the BlackDiamond switch.
configure sonet threshold signal fail 3 ports 8:1
NOTE You can set the signal fail threshold to a value different than the default value of 5 if your particular application has a very low tolerance for errors. In general, you should not change the default setting unless you are an expert and have a specific reason for the change.
469
The error_rate parameter is an integer in the range from 5 to 9, where the SD bit error rate is 10-error_rate. The default value of the error_rate parameter is 6, which equates to an SD bit error rate of 10-6, or 1 per million. The following command example sets the Signal Degrade threshold value to 8 for port 1 of the ATM module installed in slot 8 of the BlackDiamond switch.
configure sonet threshold signal degrade 8 ports 8:1
NOTE You can set the signal degrade threshold to a different value than the default value of 6 depending on your particular applications tolerance for errors. In general, you should not change the default setting unless you are an expert and have a specific reason for the change.
In this command, the Section Trace identifier can take one of two forms: an ID byte (id_byte) or an ID string (id_string). The id_byte parameter is an integer in the range from 1 to 255, with a default value of 1. This parameter applies only when SONET framing is configured, in which case, the configured id_byte value is transmitted in each SONET frame. The id_string parameter is a string of up to 15 characters. By default, the <id_string> parameter contains 15 NULL characters. This parameter applies only when SDH framing is configured, in which case the SDH framing cycles repetitively through a 15-character string, sending one character per frame. If the configured string contains fewer than 15 characters, it is padded to full length by NULL characters.
470
The following command example sets the Section Trace identifier to the string 1800wombat for port 1 of the ATM module installed in slot 8 of the BlackDiamond switch:
configure sonet trace section string 1800wombat ports 8:1
The id_string parameter defaults to a string of 62 NULL characters. When SONET framing is configured, a 62-character string is transmitted repetitively, one character per frame. If the configured string consists of fewer than 62 characters, it is padded to its full length with NULL characters. When SDH framing is configured, the maximum length of the id_string parameter is 15 characters. If the configured string consists of more than 15 characters, it is truncated to 15 characters. The following command example sets the Path Trace identifier to the string parador for port 1 of the ATM module installed in slot 8 of the BlackDiamond switch.
configure sonet trace path parador ports 8:1
The hex_octet parameter is specified as a hexadecimal integer in the range from 00 to FF. It may be necessary to specify a particular Signal Label value in order to interoperate with implementations that do not follow the standard conventions for the Signal Label field. To determine whether you need to specify a particular Signal Label value, perform the following tasks: 1 Use the show sonet command to display SONET status information on ATM ports. 2 Look for a Path Payload Label Mismatch (PLM-P) event indicating that the received payload type does not match the expected payload. 3 Compare the contents of the received C2 field (Signal Label value) with the contents of the transmitted C2 field. If no Signal Label value is specified, the command defaults to auto, which causes the value of the Signal Label field to be set automatically based on standard conventions for the given payload type.
471
The following command example sets the Signal Label to the hexadecimal value CF for port 1 of the ATM module installed in slot 8 of the BlackDiamond switch:
configure sonet signal label CF ports 8:1
You can use the optional portlist parameter to narrow the range of status information the command displays; otherwise, the command displays the status information for all ports. By default, the command displays a summary of status information for the specified ports. You can use the optional detail keyword to display detailed status information for the specified ports. The summary of status information includes the following information for each port: Values of all port configuration parameters Port state Any active events The detailed status information includes the summary information plus any SONET statistics (listed and described in Table 59).
472
473
configure vlan <vlan name> protocol [<protocol_name> | any] enable mac-vlan mac-group [any | group_number] ports <portlist>
474
The restrictions are as follows: An ATM port cannot be added to a VLAN if the VLAN is a protocol-based VLAN. A VLAN cannot be configured to be a protocol-based VLAN if the VLAN contains an ATM port. A MAC address VLAN cannot be enabled on an ATM port. The configure vlan <vlan name> protocol any command is supported, because it can be used to configure the default VLAN for ATM ports. In the configure vlan <vlan name> [add | delete] ports <portlist> {tagged | untagged} {nobroadcast} command, ATM ports support the optional tagged and untagged keywords when LLC encapsulation for bridged protocols is enabled, and ignore them when LLC encapsulation for routed protocols is enabled.
475
The input_vlanid and output_vlanid parameters are both integers in the range from 1 to 4095 and must be separated by a slash character. The priority parameter is an integer in the range from 0 to 7. Use the egress keyword to apply the mapping of the input VLAN ID to the output VLAN ID to frames received from the switch backplane prior to transmitting them onto the ATM link. Use the ingress keyword to apply the mapping to input frames received from the ATM link. The mappings are applied after they are classified to a QoS profile. Frames containing the VLAN ID specified in input_vlanid are changed so that the VLAN ID is set to the value specified in output_vlanid before the frame is forwarded. If you omit both the egress and the ingress keywords, the command automatically applies the specified mapping to the egress direction, and also applies a symmetrical mapping (with the input_vlanid and output_vlanid values reversed) to the ingress direction. These tables also give you the option of preserving the 802.1p priority or overwriting the priority with a user-configured value. Using the priority keyword in the command indicates that the 802.1p priority field is to be set to the value specified in priority. To preserve the 802.1p priority, do not enter the priority keyword and value when using this command. The default behavior is that the tables are initialized such that VLAN IDs are not altered by the mapping operations, and frame priority is preserved. For example, an input VLAN ID of n is always mapped to an output VLAN ID of n, and the 802.1p priority field is not changed.
The vlanid parameter is an integer in the range from 1 to 4095. The vlanid_range parameter is specified in the form start_vlanid-end_vlanid, where the start and end values are both integers in the range from 1 to 4095 and must be separated by a hyphen. The push keyword indicates that a new tag is to be added to frames containing the VID specified in vlanid or to one of the VIDs in the range specified in vlanid_range. The new tag added to frames contains the value specified in new_vlanid. The pop keyword indicates that the top-level tag is to be removed from frames when that tag contains either the VID specified in vlanid or any one of the VIDs in the range specified in vlanid_range. If you do not specify a VID or a range of VIDs, the command settings are applied to all VIDs. Tag operations can be performed in either the egress direction (to the ATM link) or the ingress direction (from the ATM link). If you do not specify a direction, the default behavior is that tag operations are performed in the egress direction. If you do not use either the egress or ingress keyword and tag pushing is configured, a corresponding tag pop operation is automatically configured for the ingress
476
direction. If you do not use either the egress or ingress keyword and tag nesting is disabled using the off keyword, tag nesting is disabled in both directions. The optional priority keyword provides a way to overwrite the 802.1p priority with a user-configured value when a new tag is pushed. Using the priority keyword in the command indicates that the 802.1p priority field is to be set to the value specified in priority, which is an integer in the range from 0 to 7. To preserve the 802.1p priority, do not enter the priority keyword and value when using this command. Default behavior is that tag nesting is disabled (off) for all VLAN IDs. Tag push operations apply to egress frames only when the port is configured to transmit tagged frames for the associated VLAN. Tag nesting operations apply only to ingress frames that contain a VLAN tag. Tag nesting operations are applied after classification to a QoS profile.
NOTE The DiffServ and RED functions are not performed by ATM ports when frames contain nested tags (more than one tag).
477
NOTE This section assumes some familiarity with the Extreme Networks implementation of QoS and DiffServ features. For more information about QoS and DiffServ features supported by ExtremeWare, see Chapter 7. This section contains information on the following topics: Configuring a QoS Profile on page 478 Classification and Replacement Policies on page 479 Configuring DiffServ on page 480 Enhanced RED Support on page 482
The optional egress and ingress keywords apply only to ATM ports. As stated earlier, the ATM module supports eight egress queues and eight ingress queues per port, and the scheduling parameters for these queues are controlled by QoS profiles qp1-qp8, which means queue #0 is controlled by qp1, queue #1 is controlled by qp2, and so on. The optional portlist parameter allows QoS profiles to be customized on a port-by-port basis for the ATM module. The egress and ingress keywords allow you to fine-tune the customization (down to a particular egress or ingress queue on a given port). If you do not enter either the egress or ingress keyword in the command, the configured parameters apply to the egress queue associated with the specified QoS profile by default. The minbw parameter specifies the minimum percentage of the bandwidth guaranteed to be available to the specified queue for transmissions from the QoS profile. The value is an integer in the range from 0 through 100. The default value is 0. The sum of the minimum bandwidth parameters across all eight QoS profiles cannot exceed 90%. The maxbw parameter specifies the maximum percentage of the bandwidth that the specified queue can use for transmissions from the QoS profile. The value is an integer in the range from 1 through 100. The default value is 100.
478
The optional priority keyword and level parameter specify the service priority for the specified queue. The service priority determines which traffic is scheduled when bandwidth is still available after the minimum requirements of all profiles have been satisfied. Settings for level include: low, lowHi, normal, normalHi, medium, mediumHi, high, or highHi. The default setting is low.
NOTE The minbuf and maxbuf keywords do not apply to ATM ports.
479
command has been enhanced for use with ATM ports. The syntax and description of the enhanced configure diffserv examination code-point command are given below. Also note that, in all cases, the 802.1p priority bits of ingress frames forwarded to the switch backplane are set based on the ingress QoS profile classification. More specifically, the 802.1p priority value is set to qp# 1. For example, if the packet is classified to qp5, then the 802.1p priority value is set to 4.
Configuring DiffServ
All of the existing ExtremeWare DiffServ commands are supported by ATM ports with IP frames that are encapsulated for bridged or routed protocols. ATM ports also support a DiffServ code point (DSCP) mapping function that you configure using the configure diffserv dscp-mapping command, which is described below. The DSCP is a 6-bit value in the IP-TOS byte of the IP packet header. For more information on DSCPs, see Chapter 7.
DiffServ Classification
When a packet arrives at the switch on an ingress port, the switch examines the first six of eight TOS bits, called the code point. The switch can assign the QoS profile used to subsequently transmit the packet based on the code point. The QoS profile controls a hardware queue used when transmitting the packet out of the switch, and determines the forwarding characteristics of a particular code point. The examination of DiffServ information is disabled by default. To enable examination of DiffServ information, use the command:
enable diffserv examination ports [<portlist> | all]
To configure the mapping between a DiffServ code point and a specified QoS profile, use the following command:
configure diffserv examination code-point <code_point> qosprofile <qosprofile> ports <portlist> {low-drop-probability | high-drop-probability}
The mapping is applied in the ingress directionfor IP packets received from the ATM link.
480
The optional low-drop-probability and high-drop-probability keywords apply only to ATM ports. If you do not enter either of these keywords in the command, the command uses low-drop-probability as the default. The low-drop-probability and high-drop-probability keywords are useful in conjunction with the Weighted RED (WRED) implementation provided by ATM ports. This implementation supports two different drop probabilities: one for DiffServ code points designated as having low drop-probability; another for DiffServ code points designated as having high drop-probability. These keywords give you complete flexibility in assigning DiffServ code points to these two drop-probability levels.
NOTE This command applies only to ATM ports with IP frames that are encapsulated for bridged or routed protocols. You should also be aware that DSCP mapping is performed even when the diffserv examination function is disabled on the port. To configure the mapping between an input DSCP and an associated output DSCP, use the following command:
configure diffserv dscp-mapping <input_codepoint>/<output_codepoint> ports <portlist> {egress {no-congestion | congestion} | ingress}
where:
input_codepoint output_codepoint egress no-congestion congestion ingress Specifies one of the 64 possible DiffServ code point values as the input code point. Specifies one of the 64 possible DiffServ code point values as the output code point. Applies the DSCP mapping to the egress direction. Applies the DSCP mapping to the egress mapping table for the non-congested state. Applies the DSCP mapping to the egress mapping table for the congested state. Applies the DSCP mapping to the ingress direction.
481
If you omit the no-congestion and congestion keywords, the command applies the mapping to the tables for both states. If you omit the egress and ingress keywords, the command applies the mapping to the egress direction, and automatically configures a symmetrical mapping (with the input_codepoint and output_codepoint values reversed) in the ingress direction. By default, all the tables are initialized such that DSCPs are not altered by the mapping operations. For example, an input DSCP value of n is always mapped to an output DSCP value of n.
You then change the 802.1p priority to DiffServ code point mapping to any code point value using the following command:
configure diffserv replacement priority <vpri> code_point <code_point> ports [<portlist> | all]
By doing so, the hardware queue used to transmit a packet determines the DiffServ value replaced in the IP packet. To verify the DiffServ configuration, use the command:
show ports <portlist> info detail
482
The optional low-drop-probability, high-drop-probability, and ports keywords are supported only for ATM ports. If you omit the ports keyword, the command applies the setting to all ports. The drop probability is specified as a percentage, where the percent parameter is an integer in the range from 1 to 100. Weighted RED (WRED) functionality is supported through two different drop probabilities: a low-drop-probability and a high-drop-probability. The DiffServ code points of IP packets indicate whether the packet should be dropped with low probability or high probability, and the appropriate percentage is then applied if WRED is active.
NOTE WRED is applied only to IP packets. The configure diffserv examination code-point command gives you complete flexibility in assigning DSCPs to the two different drop-probability levels. This configured mapping of DSCPs to drop-probability levels is used by WRED even if diffserv examination is disabled on the port. The drop-probability keyword indicates that the specified percentage should be used for both the low and high drop-probabilities. This effectively disables WRED and reverts to standard RED operation. For ATM ports, both the low and high drop-probabilities default to 10%. The role of the configured drop probability in RED operation on ATM ports is illustrated in Figure 97A. RED is active when the average queue length is between the minimum and maximum thresholds. In this region, the probability that a given packet is dropped increases in a straight line up to the configured drop probability at the maximum threshold. All packets are dropped when the average queue length exceeds the maximum threshold. The operation of WRED on ATM ports is depicted in Figure 97B. In this case, the drop probability depends not only on the average queue length, but also upon whether the DSCP indicates that the packet should be dropped with a low or high probability, which is to say, the DSCP of the packet controls which curve is used.
483
Configured drop-probability
Minimum threshold
Maximum threshold
The optional queue keyword applies only to ATM ports. You can use this keyword to enable or disable the RED function on an individual queue basis. The queue# parameter is an integer in the range from 0 to 7, and identifies one of the eight egress queues. If you omit the queue keyword, the command applies to all of the queues for the ATM port.
484
NOTE This command applies only to PoS and ATM ports. To configure the minimum queue length threshold for RED operation on a specified ATM port, use the following command:
configure red min-threshold <percent> ports <portlist>
The threshold value is specified as a percentage in the range from 1 to 100. For ATM ports, the minimum threshold is a percentage of 1000 packet buffers, and the maximum threshold is set to the value calculated by the formula: minimum ((3 * minimum threshold buffers), maximum available buffers) By default, the minimum threshold for ATM ports is 10%, or 100 buffers; thus, the default maximum threshold is 300 buffers. You can use the show ports info detail command to display the settings of the minimum and maximum thresholds, displayed in terms of the number of buffers. Use the ports keyword to configure the threshold parameter on specific ATM ports.
485
drop-precedence code-points with the high drop-precedence code-points). The Extreme implementation for the ATM module supports the two-level drop-precedence scheme.
In addition, a network element that complies with the DiffServ standards must also provide a recommended default code point, which must be unique for code points in the standard space. The default PHB describes the common, best-effort forwarding behavior offered by existing network elements, as defined in RFC 1812. As an additional differentiation, a set of code points has been allocated for use as the Class Selector code points, which describe the minimum forwarding handling requirements needed to preserve compatibility with existing practices while respecting flexibility for the future. Table 64 and the command examples that follow show how the standard per-hop behaviors (PHBs) might be mapped onto ExtremeWare QoS profiles qp1 through qp8.
The DSCPs associated with a PHB are assigned to the appropriate QoS profile using the configure diffserv examination code-point command. For example, the following command sets up the mapping for the EF PHB:
configure diffserv examination code-point 46 qosprofile qp8 ports 2:1-2:2
Additional configuration steps for ATM ports in this example are as follows:
486
Enable RED for all PHBs except the EF PHB. For example:
enable red ports 2:1-2:2 disable red ports 2:1-2:2 queue 8
Configure the drop-probability for the DSCPs assigned to AF1 through AF4. For example, for AF1 (qp4): configure diffserv examination code-point 10 qosprofile qp4
ports 2:1-2:2 low-drop-probability configure diffserv examination code-point 12 qosprofile qp4 ports 2:1-2:2 high-drop-probability configure diffserv examination code-point 14 qosprofile qp4 ports 2:1-2:2 high-drop-probability
487
Configure the congested-state mappings for DSCPs 10 (AF11), 18 (AF21), 26 (AF31), and 34 (AF41). For example:
configure configure configure configure diffserv diffserv diffserv diffserv dscp-mapping dscp-mapping dscp-mapping dscp-mapping 10/12 18/20 26/28 34/36 egress egress egress egress congestion congestion congestion congestion
Use the EF PHB to configure bandwidth reservation and rate limiting. For example:
configure diffserv examination code-point 46 qosprofile qp8 ports 2:1-2:2 configure qosprofile qp8 minbw 10 maxbw 20 2:1-2:2 egress configure qosprofile qp8 minbw 10 maxbw 20 2:1-2:2 ingress
NOTE For ATM ports, the existing show ports qosmonitor command has also been enhanced to display the number of packet transmissions and discards from each queue (in both egress and ingress directions).
QoS Monitor
The QoS Monitor utility is supported for ATM module ports. The QoS Monitor and its associated ExtremeWare commands are described in Chapter 7.
Intra-Subnet QoS
Intra-Subnet QoS (ISQ) is not supported on switches that use the i chipset; the ATM module is supported only on switches that use the i chipset.
488
enable mirroring to <port> disable learning ports <portlist> configure mirroring add [vlan <vlan name> | port <port> | vlan <vlan
name> ports <portlist>]
489
Frames received from the switch backplane, whose size exceeds 1522 octets, will not be forwarded onto the ATM link. IP frames that meet this criteria will be sent to the MSM CPU for fragmentation/Path MTU Discovery processing. Non-IP frames that meet this criteria will be discarded. PDUs received from the ATM link with routed protocol encapsulation will be discarded if the size of the IP packet exceeds 1500 octets. PDUs received from the ATM link with bridged protocol encapsulation will be discarded if the size of Ethernet frame (including a VLAN tag but excluding the LAN FCS) exceeds 1518 octets. If the Ethernet frame does not include a VLAN tag field, then the frame will be discarded if the size of the Ethernet frame (excluding the LAN FCS) exceeds 1514 octets. Consider these factors when configuring jumbo frame support on an ATM port: When the jumbo frame size is changed from a value of 6129 or less to a value greater than 6129, any ATM module that has ports with jumbo frame support enabled must be rebooted for the change to take effect. For more information on the ExtremeWare jumbo frame commands, see Chapter 4.
490
The Packet over SONET (PoS) modules are I/O modules for the BlackDiamond 6800 series chassis-based system. These modules connect a BlackDiamond 6800 series switch to the SONET infrastructure used by metropolitan area service providers and operators of server co-location networks. This chapter includes information on the following topics: About the PoS Modules on page 491 Configuring the PoS Module on page 496
491
The P3cMi (multimode version) operates in the 1310 nanometer (nm) wavelength window at a typical maximum cable distance of 2 kilometers (km) or 1.24 miles (mi). The P12cMi (multimode version) also operates in the 1310 nanometer (nm) wavelength, but at a typical maximum cable distance of 500 meters (m) or 0.31 (mi). The P3cSi and P12cSi (single-mode versions) also operate in the 1310 nanometer (nm) wavelength window, but at a typical maximum cable distance of 15 km or 9.32 (mi). All four versions of the PoS module use industry-standard duplex SC optical fiber connectors.
Summary of Features
The PoS modules provide the following key networking functions: Support for both Synchronous Optical Network (SONET) and Synchronous Digital Hierarchy (SDH) modes of operation Support for the Point-to-Point Protocol (PPP) suite, including: Link Control Protocol (LCP) Link Maintenance option for LCP Link Quality Report (LQR) Protocol Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) IP Control Protocol (IPCP) Bridging Control Protocol (BCP) Extreme Discovery Protocol Control Protocol (EDPCP) OSI Network Layer Control Protocol (OSINLCP) Support for MultiProtocol Label Switching Control Protocol (MPLSCP) via PPP Efficient support for IP routing over SONET via IPCP Support for Transparent LAN Services (TLS) over SONET via BCP Support for jumbo frames Extensive support for Quality of Service (QoS) and Differentiated Services (DiffServ), including: Eight ingress queues and eight egress queues per interface Ingress and egress rate shaping and limiting IEEE 802.1Q VLAN priorities Weighted RED (WRED) congestion avoidance algorithm Assured Forwarding and Expedited Forwarding RFCs Support for service provider specific features, such as: Flexible remapping of DiffServ codepoints Flexible remapping of IEEE 802.1Q VLAN IDs VLAN tunneling via nested 802.1Q tags Port tunneling of High-Level Data Link Control (HDLC) byte streams Support for NetFlow Version 1 per-flow statistics, including: Capacity for two million flow records per PoS module Scalability via distribution to groups of flow-record collector devices
492
Filters enabling statistics to be maintained for selected flows Aggregation option for further reducing the volume of exported data Resiliency with fast recovery from SONET link failures via support for Automatic Protection Switching (APS) protocol in multiple configurations, including networks where the working and protection lines are: Terminated in the same SONET module Terminated in different SONET modules residing in the same BlackDiamond 6800 series system Terminated in different SONET modules residing in different BlackDiamond 6800 series systems
Function Summary
The following sections provide brief descriptions of the key functions provided by the PoS modules. Each of these sections is expanded into greater detail in Configuring the PoS Module on page 496.
PPP
PPP encompasses a suite of protocols designed to provide standard methods for transporting datagrams over point-to-point links. The use of PPP over SONET links is commonly referred to as Packet over SONET, or PoS. The Extreme Networks implementation of PPP for the PoS module provides support for the following protocols in the PPP suite: Link Control Protocol (LCP) Link Quality Report (LQR) Protocol Challenge Handshake Authentication Protocol (CHAP) Password Authentication Protocol (PAP) IP Control Protocol (IPCP) Bridging Control Protocol (BCP) Extreme Discovery Protocol Control Protocol (EDPCP) MultiProtocol Label Switching Control Protocol (MPLSCP) OSI Network Layer Control Protocol (OSINLCP)
MPLS
The PoS module ports provide MPLS support via a PPP link. The MPLS Control Protocol (MPLSCP) allows MPLS labeled packets to be transported across a PPP link.
493
Jumbo Frames
The PoS module ports provide jumbo frame support that is similar to that provided by Ethernet ports on a BlackDiamond 6800 series switch. Jumbo frames are Ethernet frames that are larger than 1522 bytes, including four bytes used for the cyclic redundancy check (CRC). Extreme products support switching and routing of jumbo frames at wire-speed on all ports. Jumbo frames are used between endstations that support larger frame sizes for more efficient transfers of bulk data. Both endstations involved in the transfer must be capable of supporting jumbo frames.
494
One potential use of the DSCP mapping capability is to reconcile varying DiffServ policies at the boundary between autonomous systems, such as at the boundary between two ISPs. The availability of different tables for the congested and noncongested states is useful in marking operations that increase the probability of packets being dropped during times of congestion, as discussed in the DiffServ Assured Forwarding RFC (RFC 2597). An analogous feature has been added for managing 802.1Q tags. The dot1q tagmapping command provides support for VLAN ID (VID) mapping tables. Each PoS port supports two VID tables: one table is used in the ingress direction; the other is used in the egress direction. Each of the tables enables an input VID to be mapped to an output VID. This feature is useful in reconciling policy differences at the boundary between the customer and the service provider. Another related enhancement provides support for nested 802.1Q tags by allowing a tag push or tag pop attribute to be associated with a VID. The push attribute indicates that a new tag is to be added to the frame, while the pop attribute indicates that the top-level tag is to be removed from the frame. This capability is augmented by an option that allows the 802.1p priority of the frame to be either preserved or set to a user-configurable value when a new tag is pushed. These functions make it possible for service providers to tunnel customer-specific VLANs across a common SONET backbone in a very simple manner. The PoS module also supports port tunneling. Port tunneling can be used to encapsulate and transport the raw High-Level Data Link Control (HDLC) encapsulated byte stream from one PoS port to another PoS port across an MPLS network. This allows service providers to tunnel different types of SONET HDLC streams across a non-SONET backbone like Ethernet.
NetFlow Statistics
Each PoS port can maintain and export statistics for the flows that traverse the associated SONET link. Per-flow statistics are useful for many management purposes, including: Accounting and billing Network capacity planning and trend analysis Network monitoring Workload characterization User profiling Data warehousing and mining Each PoS module can maintain two million flow records. Per-flow statistics are reported in the NetFlow, Version 1 format, which groups flow records together into UDP datagrams for export to a flow-collector device. The PoS module also provides a NetFlow distribution feature to provide a growth path to more scalable and robust collection architectures. This feature allows a single PoS port to distribute statistics across multiple groups of flow-collector devices in a load-balanced manner. The function also includes a health-check feature that significantly improves the reliability of the collection architecture. The health-checker ensures that only responsive flow-collector devices are included in the effective export distribution lists. To further enhance scalability, the PoS module also offers filters and filter-based aggregation options that allow you to configure a PoS port to maintain statistics selectively for only those flows matching specified filters. The aggregation options can further reduce the volume of exported data by enabling a single set of statistics to be maintained for all the flows that match an aggregation filter.
495
NOTE Documentation for Extreme Networks products is available on the World Wide Web at the Extreme Networks home page at http://www.extremenetworks.com/. This section includes information on the following topics: Basic PoS Module Configuration Information on page 497 Configuring and Monitoring SONET Ports on page 504 Configuring and Monitoring PPP Functions on page 510 Configuring VLAN-Related Attributes on page 522 Configuring Forwarding Database Attributes on page 525 Configuring Spanning Tree Attributes on page 525 Configuring QoS Functions on page 525 Configuring and Monitoring Flow Statistics on page 536 Configuring and Monitoring APS Functions on page 546 Configuring Port Tunneling on page 563 Limitations and Unsupported Commands on page 565
496
For example, you would refer to the four ports on an OC-3 PoS module installed in slot 4 of the BlackDiamond 6800 series chassis by the port numbers 4:1, 4:2, 4:3, and 4:4.
NOTE For more information about port numbers and port configuration, see Chapter 4. Because the default Point-to-Point Protocol (PPP) network control protocol is the Bridge Control Protocol (BCP), all PoS ports are initially enabled for bridging. By default, only ports 1 and 3 on the OC-3 PoS modules are assigned to the default VLAN, while ports 2 and 4 are not assigned to a VLAN. Because the first port pair on the OC-3 PoS modules (ports 1 and 2) and the second port pair (ports 3 and 4) use a common link to the switch backplane, ports belonging to the same port pair cannot be assigned to the same VLAN. The only exception to this rule is when APS is defined and one of the two ports of a port pair is used as the working line port, while the second port is used as the protection line port.
497
NOTE The port-pair restriction described above for the OC-3 PoS modules does not apply to the OC-12 PoS module.
BlackDiamond 1
1 2 3 4 A B 5 6 7 8
BlackDiamond 2
1 2 3 4 A B 5 6 7 8
PoS_005
498
Table 65 lists the configurable SONET link parameters and their default values.
1. B2 bit error rate (BER) threshold; a Signal Failure (SF) event is generated if the BER exceeds the specified threshold. 2. B2 bit error rate (BER) threshold; a Signal Degrade (SD) event is generated if the BER exceeds the specified threshold. 3. The default value of 1 is per ANSI T1.105-1995. This parameter applies only when SONET framing is configured on the port. 4. This parameter applies only when SDH framing is configured on the port. 5. When SDH framing is configured on the port, only the first 15 characters of the string are applied. 6. Set automatically based on synchronous payload envelope (SPE) payload type.
BlackDiamond 1
1 2 3 4 A B 5 6 7 8
BlackDiamond 2
1 2 3 4 A B 5 6 7 8
1:1
1:3
PoS_006
499
The following configuration commands apply to the PoS module installed in slot 1 of BlackDiamond switch 2, as shown in Figure 99.
configure ppp bcp off ports 1:1, 1:3 configure ppp ipcp on ports 1:1, 1:3 create vlan vlanipcp1 create vlan vlanipcp2 configure vlanipcp1 ipaddress 192.168.100.2 /30 configure vlanipcp2 ipaddress 192.168.200.2 /30 enable ipforwarding vlanipcp1 enable ipforwarding vlanipcp2 configure vlanipcp1 add ports 1:3 configure vlanipcp2 add ports 1:1
500
BlackDiamond 1
1 2 3 4 A B 5 6 7 8
BlackDiamond 2
1 2 3 4 A B 5 6 7 8
8:2
(Protection line)
PoS_007
501
BlackDiamond 1
1 2 3 4 A B 5 6 7 8
BlackDiamond 2
1 2 3 4 A B 5 6 7 8
8:1
(Working line)
5:4
(Protection line)
1:4
PoS_008
502
BlackDiamond 2
1 2 3 4 A B 5 6 7 8
ADM 8:1
(Working line)
6:1
6 7 8
3:2
(Protection line)
PoS_009
The following configuration commands apply to the PoS module installed in slot 3 of BlackDiamond switch 3, as shown in Figure 102.
create vlan apsvlan configure apsvlan add port 6:1 configure apsvlan ipaddress 192.168.1.2 /30 enable ipforwarding create aps 1 configure aps 1 add 3:2 protection 192.168.1.1 enable aps
503
The following command example selects SDH framing for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
configure sonet framing sdh ports 8:1
To configure loopback on SONET port 1 of the PoS module installed in slot 8 of the BlackDiamond switch:
configure sonet loop internal ports 8:1
504
The following command example selects line clocking for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
configure sonet clocking line ports 8:1
The error_rate parameter is an integer in the range from 3 to 5, where the SF BER is 10-error_rate. The default value of the error_rate parameter is 5, which equates to an SF bit error rate of 10-5, or 1 per hundred thousand. The following command example sets the Signal Fail threshold value to 3 for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
configure sonet threshold signal fail 3 ports 8:1
NOTE You can set the signal degrade threshold to a different value than the default value of 6 depending on your particular applications tolerance for errors. In general, you should not change the default setting unless you are an expert and have a specific reason for the change.
The error_rate parameter is an integer in the range from 5 to 9, where the SD bit error rate is 10-error_rate. The default value of the error_rate parameter is 6, which equates to an SD bit error rate of 10-6, or 1 per million. The following command example sets the Signal Degrade threshold value to 8 for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
configure sonet threshold signal degrade 8 ports 8:1
505
NOTE You can set the signal degrade threshold to a different value than the default value of 6 depending on your particular applications tolerance for errors. In general, you should not change the default setting unless you are an expert and have a specific reason for the change.
In this command, the Section Trace identifier can take one of two forms: an ID byte (id_byte) or an ID string (id_string). The id_byte parameter is an integer in the range from 1 to 255, with a default value of 1. This parameter applies only when SONET framing is configured, in which case, the configured id_byte value is transmitted in each SONET frame. The id_string parameter is a string of up to 15 characters. By default, the <id_string> parameter contains 15 NULL characters. This parameter applies only when SDH framing is configured, in which case the SDH framing cycles repetitively through a 15-character string, sending one character per frame. If the configured string contains fewer than 15 characters, it is padded to full length by NULL characters. The following command example sets the Section Trace identifier to the string 1800wombat for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
configure sonet trace section string 1800wombat ports 8:1
The id_string parameter is a string of up to 64 characters. By default, the id_string parameter contains the IP address assigned to the VLAN to which the port belongs. This IP address is represented in dotted-decimal notation. If no IP address is assigned to the ports VLAN, the id_string parameter defaults to a string of 64 NULL characters. When SONET framing is configured, a 64-character string is transmitted repetitively, one character per frame. If the configured string consists of fewer than 64 characters, it is padded to its full length with NULL characters. When SDH framing is configured, the maximum length of the id_string parameter is 15 characters. If the configured string consists of more than 15 characters, it is truncated to 15 characters.
506
The following command example sets the Path Trace identifier to the string parador for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
configure sonet trace path parador ports 8:1
The value parameter is specified as a hexadecimal integer in the range from 00 to FF. It may be necessary to specify a particular Signal Label value in order to interoperate with implementations that do not follow the standard conventions for the Signal Label field. To determine whether you need to specify a particular Signal Label value, perform the following tasks: 1 Use the show sonet command to display SONET port status information. 2 Look for a Path Payload Label Mismatch (PLM-P) event indicating that the received payload type does not match the expected payload. 3 Compare the contents of the received C2 field (Signal Label value) with the contents of the transmitted C2 field. If no Signal Label value is specified, the command defaults to auto, which causes the value of the Signal Label field to be set automatically based on standard conventions for the given payload type. The following command example sets the Signal Label to the hexadecimal value CF for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
configure sonet signal label CF ports 8:1
You can use the optional portlist parameter to narrow the range of status information the command displays; otherwise, the command displays the status information for all ports. By default, the command displays a summary of status information for the specified ports. You can use the optional detail keyword to display detailed status information for the specified ports. The summary of status information includes the following information for each port:
507
Values of all port configuration parameters Port state Any active events The detailed status information includes the summary information plus any SONET statistics (listed and described in Table 66).
SONET Events
The PoS module can detect and report a variety of error and alarm conditions, some of which also trigger actions on the SONET link. Table 67 describes these events and their associated actions. Syslog messages are output for these events. Table 67: SONET Events
Event Loss of Signal (LOS) Description Loss of Signal is detected by the Section Terminating Equipment (STE) when an all-zeroes pattern on the incoming SONET signal lasts 100 microseconds or longer. This condition can be caused by loss of light. SONET Action: Send RDI-L upon LOS detection. Loss of Frame (LOF) Loss of Frame is detected by the STE when a Severely Errored Framing (SEF) defect on the incoming signal persists for 3 milliseconds. Related SONET Overhead: A1, A2 (framing pattern). SONET Action: Send RDI-L upon LOF detection.
508
509
PPP Overview
The Point-to-Point Protocol (PPP) encompasses a suite of protocols designed to provide standard methods for transporting datagrams over point-to-point links. The use of PPP over SONET links is commonly referred to as Packet over SONET, or PoS. The Extreme Networks implementation of PPP for the PoS module provides support for the following protocols in the PPP suite: Link Control Protocol (LCP) Link Quality Report (LQR) Protocol Challenge Handshake Authentication Protocol (CHAP) Password Authentication Protocol (PAP) IP Control Protocol (IPCP) Bridging Control Protocol (BCP) MultiProtocol Label Switching Control Protocol (MPLSCP)
510
OSI Network Layer Control Protocol (OSINLCP) Extreme Discovery Protocol Control Protocol (EDPCP) Link Control Protocol. The Link Control Protocol (LCP) establishes a logical connection with the peer LCP entity through an exchange of configuration packets. Data traffic cannot flow over the SONET link until LCP has successfully established this connection. LCP is also responsible for negotiating options that are independent of particular network layer protocols, such as the Quality Report, Authentication Protocol, and Maximum Receive Unit options. Quality Protocol Configuration Option. The LCP Quality Protocol configuration option can be used to specify the use of the Link Quality Report (LQR) Protocol to monitor the quality of the SONET link. If the LQR Protocol detects that the quality of the link is less than a configured threshold, all network layer protocols running over the link are brought down. This process of determining data loss and link viability is referred to as Link Quality Monitoring (LQM). Link Maintenance Configuration Option. In addition to the LQR option, the Extreme Networks implementation of PPP also provides a Link Maintenance configuration option. When link maintenance is enabled on a port and that port is not receiving data packets, the link maintenance facility periodically transmits LCP echo-request packets. If an echo-reply is not received within a configured interval, LCP brings the link down. Authentication Protocols. The Extreme Networks implementation of PPP uses the Challenge Handshake Authentication Protocol (CHAP) and the Password Authentication Protocol (PAP) to authenticate peer network elements. PAP is a simple protocol based on a clear-text user name and password pair, while CHAP is a stronger authentication protocol that uses the Message Digest, Version 5 (MD5) one-way hash algorithm. In the use of either protocol, if authentication fails, the connection with the peer is terminated. IP Control Protocol. IPCP is a member of a family of Network Control Protocols (NCPs) defined for use with PPP. IPCP establishes and configures a connection to transport IP datagrams efficiently across a PPP link between two routers. When IPCP is enabled on a PoS port, all data forwarded over the SONET link must be routed by the BlackDiamond 6800 series switch, as illustrated in Figure 103.
511
Figure 103: View of logical connectivity to PoS ports with IPCP enabled
IP Router
192.168.9.1 192.168.10.1 192.168.11.1
VLAN a
VLAN x
VLAN y
Ethernet port 1
Ethernet port n
PoS_021
Generally, when IPCP is enabled on a port, the port must be a member of one and only one VLAN. Furthermore, no other ports may be members of this VLAN, and IP routing is the only protocol supported on the VLAN. The one exception to this rule occurs when APS is enabled. A single VLAN may contain two IPCP-enabled ports if they are members of the same APS group. Bridging Control Protocol. BCP establishes and configures a connection for transporting Ethernet MAC frames across a PPP link. The BCP link must be established successfully before data traffic can flow over the link. Because BCP carries Ethernet MAC frames, any protocol can be transported across a BCP connection. In a simplified sense, BCP allows the PoS link to appear as an Ethernet LAN segment to the rest of the switch, so BCP makes it possible for LAN services to be extended transparently across SONET wide-area networks. Therefore, the port can be a member of multiple VLANs, and frames can be either bridged or routed onto the link, as illustrated in Figure 104.
512
Figure 104: View of logical connectivity to PoS ports with BCP enabled
IP Router
192.168.9.1 192.168.10.1
VLAN x
VLAN y
Ethernet port 1
PoS_022
As Figure 104 shows, PoS ports 1 and 3 are bridged together along with Ethernet port 1 to form VLAN x, PoS port 3 belongs to both VLAN x and VLAN y, and routed connectivity exists between VLAN x and VLAN y. BCP is defined in RFC 2878, which was recently approved by the IETF as an update to RFC 1638. Two features of the updated version are: support for IEEE 802.1Q VLANs, and inline management. The VLAN support enables a BCP entity to advertise its ability to accept frames containing a VLAN tag. Inline management refers to the capability of transporting the Spanning Tree Protocol and other bridge management protocols inline using the Bridged Data PPP Protocol ID (previously, RFC 1638 specified that Spanning Tree Protocol messages be transported using a unique PPP Protocol ID). Extremes implementation supports these features as specified in the new RFC. MultiProtocol Label Switching Control Protocol. MPLSCP establishes and configures a connection for transporting MPLS labeled frames across a PPP link. The MPLSCP connection must be established successfully before data traffic can flow over the link. Only unicast MPLS labeled packets are supported. Multicast MPLS labeled packets are discarded by the PoS port. MPLSCP is not explicitly configured on a PoS port. Rather, MPLSCP is automatically enabled on a PoS port when the port is configured for IPCP, and MPLS is enabled on the VLAN that the PoS port is a member of. When MPLSCP is enabled on a PoS port, the port will transport IP and MPLS labeled packets, and the port must be a member of one and only one VLAN. Furthermore, no other ports may be members of this VLAN, and IP routing is the only protocol supported on the VLAN. The one exception to this rule occurs when APS is enabled. A single VLAN may contain two IPCP-enabled ports if they are members of the same APS group. OSI Network Layer Control Protocol. OSINLCP establishes and configures a connection for transporting OSI network layer packets (NPDUs) across a PPP link. OSI network layer packets may be transported across a PPP link in one of two ways: as bridged data using BCP or as NPDUs over the link negotiated with OSINLCP. When BCP is enabled on a PoS port, OSI NPDUs are sent as bridged data encapsulated in IEEE 802.3 framed packets containing an LLC header. When OSINLCP is enabled on a PoS port, OSI NPDUs are sent using the link negotiated with OSINLCP.
513
OSINLCP is not explicitly configured on a PoS port, it is automatically enabled on a PoS port when the port is configured for IPCP and IS-IS is enabled on the VLAN that the PoS port is a member of. When OSINLCP is enabled on a PoS port, the port will transport IP as well as OSI network layer packets. As with IPCP, the port must be a member of one and only one VLAN. Furthermore, no other ports may be members of this VLAN, and IP routing is the only protocol supported on the VLAN. The one exception to this rule occurs when APS is enabled. A single VLAN may contain two IPCP-enabled ports if they are members of the same APS group. Extreme Discovery Protocol Control Protocol. EDPCP supports the exchange of EDP control packets across PoS links. EDP is used to gather information about neighboring Extreme switches, and to exchange topology information. EDPCP uses PPP protocol ID 0x820D; EDP packets use PPP protocol ID 0x020D. These PPP protocol IDs were assigned by the Internet Assigned Numbers Authority (IANA). When the PPP peer is from a vendor other than Extreme, EDPCP is disabled on the link.
The PPP use of this command is described in Creating an Authentication Database Entry on page 517.
Choose either the 32-bit FCS or the 16-bit FCS. A 32-bit FCS is the default. RFC 2615 recommends the use of the 32-bit FCS.
NOTE For OC-3 applications, RFC 2615 allows the use of a 16-bit FCS, but recommends using a 32-bit FCS. You should limit your use of the 16-bit FCS to supporting interoperability with equipment that does not support the 32-bit FCS. The following command example sets the FCS to 16 for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
configure ppp pos checksum 16 ports 8:1
514
RFC 2615 recommends that the SONET payload be scrambled. The option of disabling scrambling is provided for backward compatibility with an earlier PoS standard. Scrambling was introduced in RFC 2615 to alleviate potential security problems where malicious users might intentionally generate packets with bit patterns that create SONET synchronization problems. The following command example turns off the scrambling function for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
configure ppp pos scrambling off ports 8:1
The seconds parameter is an integer in the range from 1 to 300 that specifies the period between transmissions of echo-request packets. The consecutive_misses parameter is an integer in the range from 1 to 100 that determines how long PPP waits for a reply. If an echo-reply is not received within an interval of duration (consecutive_misses * seconds) seconds, the link is brought down. When APS is enabled on a SONET port, link maintenance should also be enabled on that port. The link maintenance protocol is off by default. If you enable link maintenance, the recommended
seconds value is 3, and the recommended consecutive_misses value is 10.
The following example enables link maintenance on port 1 of a PoS module in slot 8 and sets seconds to 3 and consecutive misses to 10.
configure ppp echo 3 10 ports 8:1
515
The required_percent parameter is an integer in the range from 1 to 99 that is used to determine the drop percentage threshold, where: drop percentage threshold = (100<required_percent>). The optional seconds parameter is an integer in the range from 1 to 300. This parameter value determines how often quality reports should be received from the peer LQR entity. If you do not specify a value for the seconds parameter, the command uses the default value of 30 seconds. It can take up to seven reporting intervals for LCP to bring a link down. If the link quality improves subsequent to being brought down, LCP automatically brings the link back up. This type of service restoration takes a minimum of seven reporting intervals. The following example enables the LQM protocol on port 1 of a PoS module in slot 3 and sets required_percent to 95. Because no value is specified for the optional seconds parameter, the command uses the default of 30 seconds.
configure ppp quality 95 ports 3:1
The default is authentication off, meaning the peer is not authenticated. When you configure authentication using the chap keyword, the peer is authenticated using CHAP. When you configure authentication using the pap keyword, the peer is authenticated using PAP. When you configure authentication using the chap-pap keyword, a request is made to authenticate the peer using CHAP, but PAP may be used if the peer does not support CHAP. The following command example turns on CHAP authentication for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
configure ppp authentication chap ports 8:1
516
The name and password parameters can contain a maximum of 32 alphanumeric characters each. As an option, you can use double quotation characters as delimiters to enclose the name and password parameters. If you do not specify a password parameter in this command, the command prompts you to enter the new password two times: the first time to set the new password; the second time to confirm the password. The factory default value for both the name and password parameters is the word extreme.
NOTE You should not attempt to use the encrypted keyword. It is used by the switch when generating an ASCII configuration.
The following command example sets the name to titus and sets the password to 1Afortune for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
configure ppp user "titus" "1Afortune" ports 8:1
The name and password parameters are both character strings of up to 32 alphanumeric characters. Both strings must start with an alphabetic character, but can be any combination of alphanumerical characters thereafter. As an option, you can use double quotation characters as delimiters to enclose the name and password parameters. If you do not specify a password string in this command, the command prompts you to enter the password two times: the first time to set the string; the second time to confirm it.
NOTE You should not attempt to use the encrypted keyword. It is used by the switch when generating an ASCII configuration. The following command example sets the authentication database name to stretch and sets the password to baserunner for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
create account pppuser "stretch" "baserunner" ports 8:1
517
NOTE For more information about setting up VLANs, see Chapter 5. BCP establishes and configures a connection for transporting Ethernet MAC frames across a PPP link. Because BCP carries Ethernet MAC frames, any protocol can be transported across a BCP connection. In a simplified sense, BCP allows the PoS link to appear as an Ethernet LAN segment to the rest of the switch, so BCP makes it possible for LAN services to be extended transparently across SONET wide-area networks. Therefore, the port can be a member of multiple VLANs, and frames can be either bridged or routed onto the link. Generally, most of the switch capabilities provided for Ethernet ports are also available for PoS ports configured for BCP. One exception is that there are restrictions on which OC-3 PoS module ports can be bridged together (be configured as members of the same VLAN). Ports 1 and 2 on the same OC-3 PoS module cannot be bridged together, and ports 3 and 4 on the same OC-3 PoS module cannot be bridged togetherunless they are members of the same APS group. There are no such restrictions on OC-12 PoS module ports. To configure the Network Control Protocol for a specified PPP port, use the following command:
configure ppp [bcp [on | off] | ipcp [on {peer-ipaddress <ipaddress>} | off]] ports <portlist>
By default, BCP is enabled on all PoS ports. BCP cannot be configured on a port unless IPCP is off; IPCP cannot be configured on a port unless BCP is off. When used with IPCP, the optional peer-ipaddress keyword and parameter value provides a way to configure the IP address of the peer router. This capability is useful with peer routers that do not advertise their IP address through the IPCP IP-Address configuration option. If the peer router does advertise an IP address through IPCP, the configured value for peer-ipaddress is ignored. The following command example turns IPCP off and BCP on for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
configure ppp ipcp off port 8:1 configure ppp bcp on port 8:1
518
NOTE You must have a PoS module and an MPLS module installed in your BlackDiamond switch to use MPLS on a PoS port. To configure MPLSCP on a PoS port, complete the following steps: 1 Create a VLAN for the PoS port using the create vlan <vlan name> command. 2 Add the PoS port to the VLAN using the configure vlan <vlan name> add ports <port> command. 3 Define an IP router port on the VLAN by assigning an IP address to the VLAN using the configure vlan <vlan name> ipaddress <ipaddress> {<mask>} command. 4 Disable BCP on the PoS port using the configure ppp bcp off ports <portlist> command and enable IPCP on the PoS port using the configure ppp ipcp on ports <portlist> command. 5 Configure MPLS on the VLAN using the configure mpls add vlan [<vlan name> | all] command. The following command example creates a VLAN named vlan1 and configures MPLSCP on PoS port 8:1 on VLAN vlan1:
create vlan vlan1 configure vlan vlan1 add ports 8:1 configure vlan vlan1 ipaddress 192.168.100.1 configure ppp bcp off ports 8:1 configure ppp ipcp on ports 8:1 configure mpls add vlan vlan1
For more information about MPLS and configuring MPLS, see Chapter 25.
519
OSINLCP is not explicitly configured on a PoS port, it is automatically enabled on a PoS port when the port is configured for IPCP and IS-IS is enabled on the VLAN that the PoS port is a member of. When OSINLCP is enabled on a PoS port, the port will transport IP as well as OSI network layer packets. As with IPCP, the port must be a member of one and only one VLAN. Furthermore, no other ports may be members of this VLAN, and IP routing is the only protocol supported on the VLAN. The one exception to this rule occurs when APS is enabled. A single VLAN may contain two IPCP-enabled ports if they are members of the same APS group. To configure OSINLCP on a PoS port, complete the following steps: 1 Create a VLAN for the PoS port using the create vlan <name> command. 2 Add the PoS port to the VLAN using the configure vlan <name> add ports <port> command. 3 Define an IP router port on the VLAN by assigning an IP address using the configure vlan <name> ipaddress <ipaddress> {<mask>} command. 4 Disable BCP on the SONET port using the configure ppp bcp off ports <portlist> command, and then enable IPCP with configure ppp ipcp on ports <portlist>. 5 Enable IS-IS on the VLAN using the configure isis add vlan <name> command.
The value of the seconds parameter is an integer number in the range from 0 to 20 seconds. The default is 1 second.
NOTE A delayed-down-time interval of one second is usually sufficient to accommodate APS line switches. The following command example sets the delayed-down-time interval to 2 seconds for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
configure ppp delayed-down-time 2 ports 8:1
If you enter the show ppp command without an argument or keyword, the command displays status information for all PPP ports. Use the optional portlist parameter to display status information for one or more specific ports.
520
By default, the command displays a summary of status information for the specified PPP port. Use the detail keyword to display detailed status information. The summary display includes the following status information for each PPP port: Values of all PPP configuration parameters Physical link status operational down LCP state IPCP/BCP state EDPCP state MPLSCP state OSINLCP state link packet and octet counters The detailed display includes the information reported in the summary display, and adds the following status and management counters: Detailed link status: PPP link phase Detailed LCP status: LCP options negotiated (local and remote) LCP packet counters Number of link-down events due to PPP maintenance Detailed authentication status: Remote username (if applicable) CHAP or PAP packet counters Detailed BCP or IPCP status: Options negotiated (local and remote) Packet counters Detailed LQM status: Statistics from the most recent Link Quality Report (LQR) Time since the most recent LQR LQR packet counters Number of link-down events due to LQM
521
configure vlan <vlan name> protocol [<protocol_name> | any] enable mac-vlan mac-group [any | group_number] ports <portlist> The restrictions are as follows: A PoS port cannot be added to a VLAN if the VLAN is a protocol-based VLAN. A VLAN cannot be configured to be a protocol-based VLAN if the VLAN contains a PoS port. A MAC address VLAN cannot be enabled on a PoS port. The configure vlan <vlan name> protocol any command is supported, because it can be used to configure the default VLAN for PoS ports. In the configure vlan <vlan name> [add | delete] ports <portlist> {tagged | untagged} {nobroadcast} command, PoS ports support the optional tagged and untagged keywords when BCP is enabled, and ignore them when IPCP is enabled. IPCP and BCP are mutually exclusive configuration options for a given PoS port: they cannot both be enabled simultaneously on the same PoS port. Generally, when IPCP is enabled on a port, the port must be a member of one and only one VLAN. Furthermore, no other ports may be members of this VLAN, and IP routing is the only protocol supported on the VLAN. The one exception to this rule occurs when APS is enabled. A single VLAN may contain two IPCP-enabled ports if they are members of the same APS group.
522
NOTE If a PoS port receives a frame with a priority value n that is not mapped to a profile in the range from qp1 through qp8, the frame is assigned to QoS profile qpn+1. The following commands provide PoS module support for managing 802.1Q tags: configure dot1q tagmapping configure dot1q tagnesting
The input_vlanid and output_vlanid parameters are both integers in the range from 1 to 4095 and must be separated by a slash character. The priority parameter is an integer in the range from 0 to 7. Use the egress keyword to apply the mapping of the input VLAN ID to the output VLAN ID to frames received from the switch backplane prior to transmitting them onto the PPP link. Use the ingress keyword to apply the mapping to input frames received from the PPP link. The mappings are applied after they are classified to a QoS profile. Frames containing the VLAN ID specified in input_vlanid are changed so that the VLAN ID is set to the value specified in output_vlanid before the frame is forwarded. If you omit both the egress and the ingress keywords, the command automatically applies the specified mapping to the egress direction, and also applies a symmetrical mapping (with the input_vlanid and output_vlanid values reversed) to the ingress direction. These tables also give you the option of preserving the 802.1p priority or overwriting the priority with a user-configured value. Using the priority keyword in the command indicates that the 802.1p priority field is to be set to the value specified in priority. To preserve the 802.1p priority, do not enter the priority keyword and value when using this command. The default behavior is that the tables are initialized such that VLAN IDs are not altered by the mapping operations, and frame priority is preserved. For example, an input VLAN ID of n is always mapped to an output VLAN ID of n, and the 802.1p priority field is not changed.
523
frame. The command also gives you the option to preserve the 802.1p priority of the frame or set it to a configured value when a new tag is added (pushed) to the frame. VLAN ID (VID) mapping occurs before a new tag is pushed, and after a nested tag is popped. To configure the VLAN tag nesting attributes for a PoS port, use the following command:
configure dot1q tagnesting {<vlanid> | <vlanid_range>} [off | pop | push <new_vlanid> {priority <priority>}] ports <portlist> {egress | ingress}
The vlanid parameter is an integer in the range from 1 to 4095. The vlanid_range parameter is specified in the form start_vlanid-end_vlanid, where the start and end values are both integers in the range from 1 to 4095 and must be separated by a hyphen. The push keyword indicates that a new tag is to be added to frames containing the VID specified in vlanid or to one of the VIDs in the range specified in vlanid_range. The new tag added to frames contains the value specified in new_vlanid. The pop keyword indicates that the top-level tag is to be removed from frames when that tag contains either the VID specified in vlanid or any one of the VIDs in the range specified in vlanid_range. If you do not specify a VID or a range of VIDs, the command settings are applied to all VIDs. Tag operations can be performed in either the egress direction (to the SONET link) or the ingress direction (from the SONET link). If you do not specify a direction, the default behavior is that tag operations are performed in the egress direction. If you do not use either the egress or ingress keyword and tag pushing is configured, a corresponding tag pop operation is automatically configured for the ingress direction. If you do not use either the egress or ingress keyword and tag nesting is disabled using the off keyword, tag nesting is disabled in both directions. The optional priority keyword provides a way to overwrite the 802.1p priority with a user-configured value when a new tag is pushed. Using the priority keyword in the command indicates that the 802.1p priority field is to be set to the value specified in priority, which is an integer in the range from 0 to 7. To preserve the 802.1p priority, do not enter the priority keyword and value when using this command. Default behavior is that tag nesting is disabled (off) for all VLAN IDs. Tag push operations apply to egress frames only when the port is configured to transmit tagged frames for the associated VLAN. Tag nesting operations apply only to ingress frames that contain a VLAN tag. Tag nesting operations are applied after classification to a QoS profile.
NOTE The default PPP MRU is sufficient for a single level of tag nesting (where the frame contains two VLAN tags) between two Extreme Networks switches. If higher levels of VLAN tag nesting are needed, jumbo frame support must be enabled.
NOTE The DiffServ and RED functions are not performed by PoS ports when frames contain nested tags (more than one tag).
524
525
The syntax and description of the enhanced configure qosprofile command are described below. To configure the scheduling parameters for a specified QoS profile, use the following command:
configure qosprofile <qosprofile> {minbw <percent>} {maxbw <percent>} {priority <level>} {minbuf <percent>} {maxbuf <percent>} {<portlist>} {egress | ingress}
The optional egress and ingress keywords apply only to PoS ports. As stated earlier, the PoS modules support eight egress queues and eight ingress queues per port, and the scheduling parameters for these queues are controlled by QoS profiles qp1-qp8, which means queue #0 is controlled by qp1, queue #1 is controlled by qp2, and so on. The optional portlist parameter allows QoS profiles to be customized on a port-by-port basis for the PoS modules. The egress and ingress keywords allow you to fine-tune the customization (down to a particular egress or ingress queue on a given port). If you do not enter either the egress or ingress keyword in the command, the configured parameters apply to the egress queue associated with the specified QoS profile by default. The minbw parameter specifies the minimum percentage of the bandwidth guaranteed to be available to the specified queue for transmissions from the QoS profile. The value is an integer in the range from 0 through 100. The default value is 0. The sum of the minimum bandwidth parameters across all eight QoS profiles cannot exceed 90%. The maxbw parameter specifies the maximum percentage of the bandwidth that the specified queue can use for transmissions from the QoS profile. The value is an integer in the range from 1 through 100. The default value is 100. The optional priority keyword and level parameter specify the service priority for the specified queue. The service priority determines which traffic is scheduled when bandwidth is still available after the minimum requirements of all profiles have been satisfied. Settings for level include: low, lowHi, normal, normalHi, medium, mediumHi, high, or highHi. The default setting is low.
NOTE The minbuf and maxbuf keywords do not apply to PoS ports.
526
When you enable the PPP Bridging Control Protocol (BCP) on a PoS port, non-IP frames that contain a VLAN tag are assigned to an ingress QoS profile based on their 802.1p priority value. You can configure this assignment using the configure dot1p type command, which is used to specify the mappings between 802.1p priority values and QoS profiles. However, if a PoS port receives a frame with a priority value n, for which there is no mapping to one of the eight profiles (qp1-qp8), that frame is assigned to ingress QoS profile qpn+1. If diffserv examination is not enabled, then the preceding 802.1p priority classification rules are applied to tagged IP frames as well. In both cases, untagged frames are assigned to a single ingress QoS profile (provided that the port is an untagged member of a VLAN; if that is not the case, then untagged frames are discarded). This QoS profile defaults to qp1, but you can assign it to another profile using the configure ports <portlist> qosprofile <qosprofile> command or the configure vlan <vlan name> qosprofile <qosprofile> command (where the port-based QoS configuration has higher precedence than VLAN-based QoS). Additionally, if you enable the PPP IP Control Protocol (IPCP) on a PoS port and do not enable
diffserv examination on the port, then all ingress frames (received from the SONET link) are
assigned to a single ingress QoS profile. The profile defaults to qp1, but you can configure it to another profile using the configure ports <portlist> qosprofile <qosprofile> command or the configure vlan <vlan name> qosprofile <qosprofile> command. If you enable diffserv examination on a PoS port, then ingress IP frames are assigned to a QoS profile based on the DiffServ code point (regardless of whether you enabled either BCP or IPCP on the port). The existing configure diffserv examination code-point command maps DiffServ code points to QoS profiles. This command has been enhanced for use with PoS ports. The syntax and description of the enhanced configure diffserv examination code-point command are given below. Also note that, in all cases, the 802.1p priority bits of ingress frames forwarded to the switch backplane are set based on the ingress QoS profile classification. More specifically, the 802.1p priority value is set to qp# 1. For example, if the packet is classified to qp5, then the 802.1p priority value is set to 4. When you enable MPLSCP on a PoS port, classification for MPLS labeled packets is done based only on the EXP bits in the label stack entry of the ingress frame. The EXP bits are used to map an ingress frame to an 802.1p priority and assigned to the corresponding ingress queue. Before the frame is forwarded to the switch backplane, the 802.1p bits in the frame are set based on the exp-to-dot1p mapping. You can use the configure mpls qos-mapping exp-to-dot1p command to configure the EXP to 802.1p mapping. You can use the configure dot1p type dot1p_priority command to configure the 802.1p to QoS mapping. When you configure MPLSCP on a PoS port, other types of ingress commands such as configure diffserv examination code-point, configure ports <portlist> qosprofile, and configure vlan <vlan name> qosprofile are supported only for IPCP data frames and not MPLS labeled frames. Similarly, egress replacement commands such as enable dot1p replacement and enable diffserv replacement are supported only for IPCP data frame and not MPLS labeled frames.
Configuring DiffServ
All of the existing ExtremeWare DiffServ commands are supported by PoS ports with IP frames that are encapsulated in BCP or IPCP, not MPLSCP (including the enhancements to the configure diffserv examination code-point command, described earlier in this chapter). PoS ports also support a DiffServ code point (DSCP) mapping function that you configure using the configure diffserv
527
dscp-mapping command, which is described below. The DSCP is a 6-bit value in the IP-TOS byte of the
IP packet header. For more information on DSCPs, see Configuring DiffServ in Chapter 7.
DiffServ Classification
When a packet arrives at the switch on an ingress port, the switch examines the first six of eight TOS bits, called the code point. The switch can assign the QoS profile used to subsequently transmit the packet based on the code point. The QoS profile controls a hardware queue used when transmitting the packet out of the switch, and determines the forwarding characteristics of a particular code point. The examination of DiffServ information is disabled by default. To enable examination of DiffServ information, use the command:
enable diffserv examination ports [<portlist> | all]
To configure the mapping between a DiffServ code point and a specified QoS profile, use the following command:
configure diffserv examination code-point <code_point> qosprofile <qosprofile> ports <portlist> {low-drop-probability | high-drop-probability}
The mapping is applied in the ingress directionfor IP packets received from the SONET link. The optional low-drop-probability and high-drop-probability keywords apply only to PoS ports. If you do not enter either of these keywords in the command, the command uses low-drop-probability as the default. The low-drop-probability and high-drop-probability keywords are useful in conjunction with the Weighted RED (WRED) implementation provided by PoS ports. This implementation supports two different drop probabilities: one for DiffServ code points designated as having low drop-probability; another for DiffServ code points designated as having high drop-probability. These keywords give you complete flexibility in assigning DiffServ code points to these two drop-probability levels.
528
NOTE This command applies only to PoS ports with IP frames that are encapsulated in BCP or IPCP, not MLSCP. You should also be aware that DSCP mapping is performed even when the diffserv examination function is disabled on the port. To configure the mapping between an input DSCP and an associated output DSCP, use the following command:
configure diffserv dscp-mapping <input_codepoint>/<output_codepoint> ports <portlist> {egress {no-congestion | congestion} | ingress}
where:
input_codepoint output_codepoint egress no-congestion congestion ingress Specifies one of the 64 possible DiffServ code point values as the input code point. Specifies one of the 64 possible DiffServ code point values as the output code point. Applies the DSCP mapping to the egress direction. Applies the DSCP mapping to the egress mapping table for the non-congested state. Applies the DSCP mapping to the egress mapping table for the congested state. Applies the DSCP mapping to the ingress direction.
If you omit the no-congestion and congestion keywords, the command applies the mapping to the tables for both states. If you omit the egress and ingress keywords, the command applies the mapping to the egress direction, and automatically configures a symmetrical mapping (with the input_codepoint and output_codepoint values reversed) in the ingress direction. By default, all the tables are initialized such that DSCPs are not altered by the mapping operations. For example, an input DSCP value of n is always mapped to an output DSCP value of n.
529
You then change the 802.1p priority to DiffServ code point mapping to any code point value using the following command:
configure diffserv replacement priority <vpri> code_point <code_point> ports [<portlist> | all]
By doing so, the hardware queue used to transmit a packet determines the DiffServ value replaced in the IP packet. To verify the DiffServ configuration, use the command:
show ports <portlist> info detail
The optional low-drop-probability, high-drop-probability, and ports keywords are supported only for SONET ports. If you omit the ports keyword, the command applies the setting to all ports. The drop probability is specified as a percentage, where the percent parameter is an integer in the range from 1 to 100.
530
Weighted RED (WRED) functionality is supported through two different drop probabilities: a low-drop-probability and a high-drop-probability. The DiffServ code points of IP packets indicate whether the packet should be dropped with low probability or high probability, and the appropriate percentage is then applied if WRED is active.
NOTE WRED is applied only to IP packets. The configure diffserv examination code-point command gives you complete flexibility in assigning DSCPs to the two different drop-probability levels. This configured mapping of DSCPs to drop-probability levels is used by WRED even if diffserv examination is disabled on the port. The drop-probability keyword indicates that the specified percentage should be used for both the low and high drop-probabilities. This effectively disables WRED and reverts to standard RED operation. For SONET ports, both the low and high drop-probabilities default to 10%. The role of the configured drop probability in RED operation on SONET ports is illustrated in Figure 105A. RED is active when the average queue length is between the minimum and maximum thresholds. In this region, the probability that a given packet is dropped increases in a straight line up to the configured drop probability at the maximum threshold. All packets are dropped when the average queue length exceeds the maximum threshold. The operation of WRED on SONET ports is depicted in Figure 105B. In this case, the drop probability depends not only on the average queue length, but also upon whether the DSCP indicates that the packet should be dropped with a low or high probability, which is to say, the DSCP of the packet controls which curve is used. Figure 105: Comparisons of RED and WRED operation
Configured drop-probability
Minimum threshold
Maximum threshold
531
The optional queue keyword applies only to SONET ports. You can use this keyword to enable or disable the RED function on an individual queue basis. The queue# parameter is an integer in the range from 0 to 7, and identifies one of the eight egress queues. If you omit the queue keyword, the command applies to all of the queues for the PoS port.
To configure the minimum queue length threshold for RED operation on a specified PoS port, use the following command:
configure red min-threshold <percent> ports <portlist>
The threshold value is specified as a percentage in the range from 1 to 100. For SONET ports, the minimum threshold is a percentage of 1000 packet buffers, and the maximum threshold is set to the value calculated by the formula: minimum ((3 * minimum threshold buffers), maximum available buffers) By default, the minimum threshold for SONET ports is 10%, or 100 buffers; thus, the default maximum threshold is 300 buffers. You can use the show ports info detail command to display the settings of the minimum and maximum thresholds, displayed in terms of the number of buffers. Use the ports keyword to configure the threshold parameter on specific SONET ports.
532
In addition, a network element that complies with the DiffServ standards must also provide a recommended default code point, which must be unique for code points in the standard space. The default PHB describes the common, best-effort forwarding behavior offered by existing network elements, as defined in RFC 1812. As an additional differentiation, a set of code points has been allocated for use as the Class Selector code points, which describe the minimum forwarding handling requirements needed to preserve compatibility with existing practices while respecting flexibility for the future.
533
Table 71 and the command examples that follow show how the standard per-hop behaviors (PHBs) might be mapped onto ExtremeWare QoS profiles qp1 through qp8.
The DSCPs associated with a PHB are assigned to the appropriate QoS profile using the configure diffserv examination code-point command. For example, the following command sets up the mapping for the EF PHB:
configure diffserv examination code-point 46 qosprofile qp8 ports 2:1-2:2
Additional configuration steps for SONET ports in this example are as follows: Enable RED for all PHBs except the EF PHB. For example:
enable red ports 2:1-2:2 disable red ports 2:1-2:2 queue 8
534
Configure the drop-probability for the DSCPs assigned to AF1 through AF4. For example, for AF1 (qp4):
configure diffserv examination code-point 10 qosprofile qp4 ports 2:1-2:2 low-drop-probability configure diffserv examination code-point 12 qosprofile qp4 ports 2:1-2:2 high-drop-probability configure diffserv examination code-point 14 qosprofile qp4 ports 2:1-2:2 high-drop-probability
Configure the congested-state mappings for DSCPs 10 (AF11), 18 (AF21), 26 (AF31), and 34 (AF41). For example:
configure configure configure configure diffserv diffserv diffserv diffserv dscp-mapping dscp-mapping dscp-mapping dscp-mapping 10/12 18/20 26/28 34/36 egress egress egress egress congestion congestion congestion congestion
Use the EF PHB to configure bandwidth reservation and rate limiting. For example:
configure diffserv examination code-point 46 qosprofile qp8 ports 2:1-2:2 configure qosprofile qp8 minbw 10 maxbw 20 2:1-2:2 egress configure qosprofile qp8 minbw 10 maxbw 20 2:1-2:2 ingress
535
NOTE For PoS ports, the existing show ports qosmonitor command has also been enhanced to display the number of packet transmissions and discards from each queue (in both egress and ingress directions).
QoS Monitor
The QoS Monitor utility is supported for PoS module ports. The QoS Monitor and its associated ExtremeWare commands are described in Chapter 7.
Intra-Subnet QoS
Intra-Subnet QoS (ISQ) is not supported on switches that use the i chipset; the PoS module is supported only on switches that use the i chipset.
536
output
dPkts dOctets First Last srcport dstport pad prot tos tcp_flags pad
4 4 4 4 2 2 2 1 1 1 11
Flow records are grouped together into UDP datagrams for export to a flow-collector device. A NetFlow Version 1 export datagram can contain up to 25 flow records. Figure 106 shows the format of the export datagram; Table 73 describes the export datagram header. Figure 106: Format of NetFlow export datagram
octets
16 Header
52 Flow record 1
52 Flow record 2 . . .
52 Flow record n
PoS_023
537
The IP addresses (or hostnames) and UDP port numbers of the available flow collectors can be configured on a per-switch basis. The flow collection architecture example in Figure 107 illustrates how multiple BlackDiamond switches might export flow records to flow-collector devices that, in turn, feed records into a central collector-server. Other flow-collector architectures are also possible. For example, each SONET port might export statistics to a dedicated flow-collector device. The ExtremeWare NetFlow implementation for the PoS module also enables a single SONET port to distribute statistics across multiple groups of flow-collector devices. This NetFlow distribution feature enables a scalable collection architecture that is able to accommodate high volumes of exported data. The NetFlow distribution feature is enabled by configuring export distribution groups that contain the addresses of multiple flow-collector devices. The feature uses a distribution algorithm that ensures all of the records for a given flow are exported to the same collector. The algorithm also ensures that the flow records for both the ingress and egress directions of a TCP or UDP connection are exported to the same collector when both flows traverse the SONET link and both filters are configured to export to the same group. For example, a potentially different group can be associated with a filter. The flow records that match the filter are then sent to one of the flow collector devices in that group. You could also establish redundancy by allowing multiple flow collector devices per group so that data is still collected as long as there is one working flow collector device in that group. To implement flow-collector devices, you can choose from commercial software products and public-domain software packages.
538
Accounting/ billing
Profiling
Centralized collector-server
Summarized data
Flow-collector device
UDP NetFlow NetFlow
Flow-collector device
UDP NetFlow NetFlow
Black Diamond
Black Diamond
Black Diamond
Black Diamond
PoS_024
539
Up to 32 export distribution groups can be configured on a Black Diamond 6800 series switch. Each of these groups can contain the addresses of up to eight flow-collector devices. A particular export group can then be specified for each filter, which provides a high-degree of flexibility. A filter-based aggregation capability is also offered to further enhance scalability. Each filter can be configured to be either a per-flow filter or an aggregation filter. When a flow matches a filter that is configured as an aggregation, normal per-flow statistics are not maintained for the flow. Instead, a single set of statistics is maintained for all the flows that match the aggregation filter, which can substantially reduce the volume of exported data. Aggregated flow statistics are also exported in the NetFlow Version 1 format. The nexthop field of the flow record (see Table 72) is set to xFFFF to indicate that the record is associated with a filter-based aggregation. The srcaddr, dstaddr, srcport, dstport, and prot fields of an aggregated flow record are set to the corresponding value components of the associated filter specification.
Export Criteria
TCP flow records are exported when the associated connection is terminated. Flow records are also exported on an age basis. All flow records, including aggregation records, are examined at least once every 30 minutes. If the age of the flow is greater than a configurable time, the record is exported. If the flow is still active, a new flow record will be created when the next packet arrives. The PoS module transmits a NetFlow Export Datagram when 25 flow records are ready for export, or when at least one flow has been awaiting export for one second.
NOTE Flow statistics are collected only on SONET ports that are configured to use the IP Control Protocol (IPCP). No flow statistics are collected on ports that are configured to use the Bridging Control Protocol (BCP). You will not be prevented from enabling the flow statistics function on ports not configured for IPCP, but statistics will not be collected on those ports. To disable the flow statistics function on the specified SONET port, use the following command:
disable flowstats ports <portlist>
540
TCP or UDP connection are exported to the same collector (when both flows traverse the same SONET link and both filters are configured to export to the same group). NetFlow distribution is enabled by configuring export distribution groups that identify the addresses of multiple flow-collector devices. You can configure up to 32 export distribution groups on a BlackDiamond 6800 series switch, and each group can contain as many as eight flow-collector devices. To configure the export groups and flow-collector devices to which NetFlow datagrams are exported, use the following command:
configure flowstats export {<group#>} [add | delete] [<ipaddress> | <hostname>] <udp_port>
The optional group# parameter is an integer in the range from 1 through 32 that identifies the specific group for which the destination is being configured. If you do not specify a value for the group# parameter, the parameter value defaults to 1. You can use the add and delete keywords to add or delete flow-collector destinations. To export NetFlow datagrams to a group, you must configure at least one flow-collector destination. By default, no flow-collector destinations are configured. To configure a flow-collector destination, use either an IP address and UDP port number pair or a hostname and UDP port number pair to identify the flow-collector device to which NetFlow export datagrams are to be transmitted. You can configure up to eight flow-collector destinations for each group. When multiple flow-collectors are configured as members of the same group, the exported NetFlow datagrams are distributed across the available destinations.
No NetFlow datagrams are exported until the source IP address is configured. Depending on how it is configured, a flow-collector device can use the source IP address of received NetFlow datagrams to identify the switch that sent the information.
NOTE The configured IP address should be associated with a VLAN that has loopback-mode enabled. The following command example specifies that the IP address 192.168.100.1 is to be used as the source IP address for exported NetFlow datagrams.
configure flowstats source ipaddress 192.168.100.1
541
To configure the timeout value for flow records on the specified SONET port, use the following command:
configure flowstats timeout <minutes> ports <portlist>
The timeout value is the number of minutes to use in deciding when to export flow records. The number is an integer in the range from 1 to 1440. The default timeout is 5 minutes. The following command example specifies a 10-minute timeout for exported NetFlow datagrams on port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
configure flowstats timeout 10 ports 8:1
where:
filter# The filter# parameter is an integer in the range from 1 to 8 that operates with either the ingress or egress keyword to identify the filter that is being defined. To reduce the volume of exported data, use this optional keyword to maintain a single set of statistics for all the flows that match the specified filter. To specify a particular export distribution group on a per-filter basis, use the optional export keyword with a group number value to identify the set of flow collector devices to which records for flows matching the filter are to be exported. If you do not specify a value for group#, the value defaults to 1. Use this keyword to specify that the filter being defined in the command is one of the eight filters to be applied to ingress flows. Use this keyword to specify that the filter being defined in the command is one of the eight filters to be applied to egress flows.
aggregation
export <group#>
ingress egress
542
filterspec
Each filter is defined using a value/filtermask pair for each of the five components in the following sequence: {destination IP address, source IP address, destination port number, source port number, protocol} in the form: [{dest-ip <ipaddress_value/ipaddress_filtermask>} {source-ip <ipaddress_value/ipaddress_filtermask>} {dest-port <port_value/port_filtermask>} {source-port <port_value/port_filtermask>} {protocol <protocol_value/protocol_filtermask>} | match-all-flows | match-no-flows] The ipaddress_filtermask, port_filtermask, and protocol_filtermask parameters are configured using hexadecimal notation. You can also use either the match-all-flows keyword or the match-no-flows keyword in place of settings for the five components. The match-all-flows keyword adjusts the value/filtermask settings for all the components to 0/0 such that the filter matches any flow. The match-no-flows keyword adjusts the value/filtermask settings for all the components such that the filter does not match any flow. By default, filter #1 is configured to match-all-flows, and the remaining filters are configured to match-no-flows. Conceptually, the filters work by ANDing the contents of each of the five components of a forwarded flow with the associated masks from the first defined filter (filter #1). Statistics are maintained if the results of the AND operations match the configured filter values for all fields of the sequence. If there is no match, then the operation is repeated for filter #2, and so on. If there is no match for any of the filters, then statistics are not maintained for the flow. Filters for any or all of the sequence components can be configured with a single command.
The following command example configures a filter to collect statistics on ingress flows destined for 192.168.1.1 from the 192.169.0.0/16 subnet with a destination port of 80 using protocol 6.
configure flowstats filter 1 export 1 ports all ingress dest-ip 192.168.1.1/FFFFFFFF source-ip 192.169.0.0/FFFF0000 dest-port 80/FFFF source-port 0/0 protocol 6/FF
Likewise, the following command example configures a filter to collect statistics on egress traffic from the 192.168.0.0/16 subnet to 192.169.1.1 with a destination port of 80 using protocol 6.
configure flowstats filter 1 export 1 ports all egress dest-ip 192.169.1.1/FFFFFFFF source-ip 192.168.0.0/FFFF0000 dest-port 80/FFFF source-port 0/0 protocol 6/FF
The following command example configures a filter to collect aggregate statistics for all egress traffic flowing from the 192.170.0.0/16 subnet to the 192.171.255.255 subnet.
configure flowstats filter 2 aggregation export 1 ports all egress dest-ip 192.171.0.0/FFFF0000 source-ip 192.170.0.0/FFFF0000 dest-port 0/0 source-port 0/0 protocol 0/0
Likewise, the following command example configures a filter to collect aggregate statistics for all ingress traffic flowing from the 192.171.0.0/16 subnet to the 192.170.0.0/16 subnet.
543
configure flowstats filter 2 aggregation export 1 ports all ingress dest-ip 192.170.0.0/FFFF0000 source-ip 192.171.0.0/FFFF0000 dest-port 0/0 source-port 0/0 protocol 0/0
Finally, the following command examples configure two filtersan egress filter and an ingress filter to collect statistics on any remaining flows that did not match the ingress and egress filters defined in the four previous command examples.
configure flowstats filter 3 export 1 ports all egress match-all-flows configure flowstats filter 3 export 1 ports all ingress match-all-flows
By default, filter #1 is enabled on all SONET ports for both ingress and egress flows, and all remaining filters are disabled. To disable a specified flow record filter for the specified SONET port, use the following command:
disable flowstats filter <filter#> ports <portlist> [ingress | egress]
where:
filter# The filter# parameter is an integer in the range from 1 to 8 that operates with either the ingress or egress keyword to identify the filter that is being enabled or disabled. Use this keyword to specify that the filter being enabled or disabled is one of the eight filters to be applied to ingress flows. Use this keyword to specify that the filter being enabled or disabled is one of the eight filters to be applied to egress flows.
ingress egress
The following command example enables ingress filter #2 on port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
enable flowstats filter 2 ports 8:1 ingress
The following command example disables ingress filter #2 on port 1 of the PoS module installed in slot 8 of the BlackDiamond switch.
disable flowstats filter 2 ports 8:1 ingress
If you do not specify a value for the group# parameter, the ping-check function is enabled for all collector groups. The ping-check function is enabled by default.
544
When the ping-check function is enabled, each of the flow collector devices is pinged periodically to check its network connectivity. If a flow collector device is repetitively unresponsive, it is temporarily removed from the export distribution list for that group. The flow collector device will be returned to the export distribution list automatically when subsequent ping checks are consistently successful. The following command example enables the ping-check function for export group 2.
enable flowstats ping-check 2
To disable the flow statistics ping-check function for a specified group of collector devices, use the following command:
disable flowstats ping-check <group#>
If you do not specify a value for the group# parameter, the ping-check function is disabled for all collector groups. The following command example disables the ping-check function for export group 2.
disable flowstats ping-check 2
NOTE This command does not affect the enabled or disabled status of flow statistics collection, nor does it affect the configured export destinations. The following command example resets the flow statistics configuration parameters for port 1 of the PoS module installed in slot 8 of the BlackDiamond switch to their default values.
unconfigure flowstats ports 8:1
where:
portlist export group# Use this optional parameter to specify the SONET port for which status information is to be displayed. Use this optional keyword to display status information for export groups, which are configured on a switch-wide basis. Use this optional parameter with the export keyword to display status information for a specific export group. If you do not specify a value for the group# parameter, the export keyword by itself displays status information for all export groups. Use this optional keyword to display detailed export group status information.
detail
545
If you enter the show flowstats command with none of the optional keywords or parameters, the command displays a summary of status information for all ports. The summary status display for a port includes the following information: Values for all flow statistics configuration parameters Count of flow records that have been exported Counts of the number of packets/bytes for which flow statistics were not maintained because of insufficient resources The summary status display for an export group includes the following information: Values for all configuration parameters Status of each export destination device The detailed status display for an export group includes the summary information, plus the following management information: Counts of the flow records that have been exported to each flow collector destination Counts of the number of times each flow collector destination has been taken out of service due to health-check (ping check) failures
546
BlackDiamond
1 2 3 4 A B 5 6 7 8
Working line
ADM
SONET ring
PoS device
Protection line
PoS_011
The APS standards specify both unidirectional and bidirectional-switching modes. In the bidirectional mode, both ends must select, or receive data from, the same line. Thus, switching from one line to another must be coordinated. This synchronization is achieved using APS protocols that are carried in the K1 and K2 bytes of the SONET line overhead. The K1 and K2 bytes must be transmitted on the protection line, and may also be transmitted on the working line; however, receivers cannot assume that the K1 and K2 bytes will be transmitted on the working line. Bidirectional switching is advantageous for data communication applications where the working line and the protection line are terminated in different switches, as depicted in Figure 109. Because the working and protection lines form a single SONET interface with respect to the rest of the network, it is clearly more straightforward and efficient for one switch to handle all the payload transmission and reception responsibilities for the interface. Consequently, the BlackDiamond 6800 series switch supports bidirectional switching, but not unidirectional switching.
547
Virtual router
BlackDiamond 1
1 2 3 4 A B 5 6 7 8
Working line
Ethernet BlackDiamond 2
1 2 3 4 A B 5 6 7 8
ADM
SONET ring
PoS device
Protection line
PoS_012
The 1+1 architecture can also operate in revertive or nonrevertive mode, which allows you to determine what action should be taken when traffic is active on the protection line and the working line becomes operational. The BlackDiamond 6800 series switch supports both revertive and non-revertive modes of operation. In revertive mode, when traffic is active on the protection line and the working line becomes operational, traffic will be switched automatically from the protection line to the working line. Conversely, in nonrevertive mode, when traffic is active on the protection line and the working line becomes operational, traffic will remain on the protection line (until either manual intervention or a failure on the protection line forces a switch back to the working line).
548
Because the two-switch configuration is the most advanced, it is discussed first, followed by the two simpler configurations. In the two-switch configuration (see Figure 110), the two BlackDiamond switches form a virtual APS switch. The PoS interface in BlackDiamond switch #1 is configured to be the working line, while the PoS interface in BlackDiamond switch #2 is configured to be the protection line. The same IP address is configured for both PoS interfaces. In this example, the common IP address is 192.168.10.1. The use of a common IP address enables the neighboring PPP router to view the virtual APS switch as a single router entity; the neighboring router is unaware that its partner is actually two cooperating switches. Figure 111 illustrates the logical PPP connectivity between the virtual APS router and the neighboring PPP router.
NOTE Note: The two-switch configuration is supported only if PPP is configured on the PoS ports. The two-switch configuration is not supported if HDLC tunneling is configured on the PoS ports. Figure 110: Virtual APS router configuration
Virtual router
BlackDiamond 1
1 2 3 4 A B 5 6 7 8
Ethernet BlackDiamond 2
1 2 3 4 A B 5 6 7 8
ADM
SONET ring
PoS device
PoS_013
549
PoS 192.168.10.1
SONET
192.168.10.2 PoS
PoS_014
Another important characteristic of the virtual APS router configuration shown in Figure 110 is the Ethernet link between BlackDiamond #1 and BlackDiamond #2. This Ethernet link provides an out-of-band communications channel that provides a way for the two switches to synchronize their use of the SONET interfaces. For example, if BlackDiamond #1 detects poor signal quality on the working line, it sends a message over the Ethernet link to BlackDiamond #2, which initiates a switch to the protection line. The Ethernet link is also used to carry heartbeat messages that enable the protection switch to take over if the working switch fails. The two-module and single-module configurations are similar to the two-switch configuration, except that there is no out-of-band Ethernet communications link. These configurations are simpler, because a single switch manages both the working line and the protection line. One advantage of the simpler single-switch configurations is faster network-recovery times following a line or module failure. The single-module configuration protects against line failures, while the two-module configuration protects against both line and module failures. The two-switch configuration further expands the protection scope to include line, module, and switch failures.
550
K1
bit # 1
REQUEST
4 5
CHANNEL #
6 8
K2
CHANNEL #
ARCH
MODE / INDICATION
Legend REQUEST
0000 0001 0010 0100 0110 1000 1010 1100 1110 1111 No Request Do Not revert (nonrevertive only) Reverse Request (bidirectional only) Excercise Wait-To-Restore (revertive only) Manual Switch Signal Degrade Signal Fail Forced Switch Lockout of Protection
CHANNEL #
K1 - number of channel issuing request (1=>working, 0=>protection) K2 - 0 if channel # in received K1=0, else channel # bridged to protection line
ARCHITECTURE
0 => provisioned for 1+1 architecture
MODE / INDICATION
100 101 110 111 Provisioned for Unidirectional Switching Mode Provisioned for Bidirectional Switching Mode Line Remote Defect Indication (RDI-L) Line Alarm Indication Signal (AIS-L)
PoS_019
Based on the K1 and K2 definitions, Table 74 shows the detailed APS protocol exchanges for switching from the working line to the protection line. The example assumes the switch occurs because a Signal Degrade condition is detected on the working line. All APS protocol exchanges occur on the protection line, between the protection router and the ADM.
Table 74: APS Protocol for Switch from Working Line to Protection Line
Protect Router ADM K1 Byte 0000 0000 K2 Byte 0000 0 101 ADM Protect Router K1 Byte 0000 0000 K2 Byte 0000 0 101 No failures; working line active. Example is provisioned for 1+1 architecture and bidirectional switching mode. Comments
551
Table 74: APS Protocol for Switch from Working Line to Protection Line (continued)
Protect Router ADM K1 Byte 1010 0001 K2 Byte 0000 0 101 ADM Protect Router K1 Byte 0000 0000 K2 Byte 0000 0 101 Protection router receives Signal Degrade message from working router over Ethernet link, and sends Signal Degrade request for channel 1 (the working line) to the ADM. ADM acknowledges the Signal Degrade request by sending Reverse Request for channel 1 in K1; K2 indicates that the ADM has bridged channel 1 to the protection line. Protection router selects (receives) channel 1 data from the protection line based on received K2, and uses K2 to indicate that channel 1 is bridged to the protection line. ADM selects (receives) channel 1 data from the protection line based on received K2. Comments
1010 0001
0000 0 101
0010 0001
0001 0 101
1010 0001
0001 0 101
0010 0001
0001 0 101
1010 0001
0001 0 101
0010 0001
0001 0 101
After the APS line switch has completed, the protection router sends a message to the working router over the Ethernet link. The message indicates that the line switch has been performed. The working router responds by taking down the SONET interface and initiating a routing topology update. Similarly, the protection router brings the SONET interface up and advertises availability of routes accessible via the SONET interface. The neighboring PPP router will think that its partner (which is now the protection router) has renegotiated the link. On the LAN side, packets with destinations accessible via the SONET interface will be forwarded to the protection router. These packets may be forwarded to the protection router as a result of the routing topology updates or the Extreme Standby Router Protocol (ESRP).
552
APS Benefits
In this section, we examine the benefits provided by APS. A typical redundant switch configuration is illustrated in Figure 113. In this scheme, both BlackDiamond switches have two SONET interfaces that are connected to different ADMs. In this configuration, no switch, PoS interface, SONET line, or ADM represents a single point-of-failure. Compare this with the APS configuration depicted in Figure 114. Figure 113: Typical redundant switch configuration without APS
BlackDiamond 1
1 2 3 4 A B 5 6 7 8
BlackDiamond 2
1 2 3 4 A B 5 6 7 8
192.168.10.3 192.168.20.3
ADM 2
PoS_015
553
192.168.10.1 192.168.20.1
Ethernet BlackDiamond 2
1 2 3 4 A B 5 6 7 8
PoS_016
While these two configurations appear similar, the significant difference between them is that the BlackDiamond switches in Figure 114 appear to the rest of the network as two PoS interfaces (IP addresses 192.168.10.1 and 192.168.20.1), as opposed to the four PoS interfaces shown in Figure 113 (IP addresses 192.168.10.1, 192.168.20.1, 192.168.10.3, and 192.168.20.3). The configuration in Figure 114 enables customers to purchase half the SONET bandwidth without sacrificing resiliency. In fact, the APS configuration offers increased resiliency by virtue of not reducing maximum throughput as a result of a single line or switch failure. Furthermore, if the extra bandwidth is needed, two larger bandwidth interfaces are more efficient than four smaller bandwidth interfaces, due to suboptimal load-balancing. Figure 115 shows an APS configuration that provides faster network recovery from SONET line failures or degradations. Recovery is faster in this case because no routing topology updates are needed. Recovery is isolated to the switch and ADM pair connected to the failed line, and consists of performing an APS line switch operation. The downside of the configuration shown in Figure 115, relative to Figure 114, is that failure of a BlackDiamond switch will reduce the maximum SONET bandwidth by half. Note that failure of an ADM will also halve the maximum available bandwidth in either configuration.
554
Figure 115: APS configuration providing faster recovery from line failure
BlackDiamond 1
1 2 3 4 A B 5 6 7 8
192.168.10.1 192.168.10.1
BlackDiamond 2
1 2 3 4 A B 5 6 7 8
192.168.20.1 192.168.20.1
PoS_017
As mentioned earlier, APS can also be applied to the interconnection of bridges. Figure 116 illustrates a configuration where two PoS ports are members of the same VLAN. Assume that, in this example, both PoS ports are configured to run BCP on the common VLAN and bridge traffic for the VLAN across the SONET link. Assigning the two PoS ports to the same APS group improves the resiliency of the bridged network by enabling faster recovery from SONET line failures relative to that achieved by the Spanning Tree Protocol (STP). This recovery is accomplished by simply performing a local APS line switch. Because APS recovers at layer 1, the Spanning Tree Protocol does not need to be informed of the line failure, and therefore, no time-consuming STP reconvergence is necessary. Figure 116: APS in bridging configuration
Ethernet VLAN X
PoS_018
555
To disable the APS function for the entire switch, use the following command:
disable aps
The group# parameter is an integer in the range from 1 through 65535 that identifies the APS group to be created. The APS group numbers must be unique across all BlackDiamond switches that are cooperating to provide the APS function. The group numbers must also be used in a consistent manner across BlackDiamond switches. For example, if the working line is assigned to group #1 on BlackDiamond #1, and the associated protection line resides on BlackDiamond #2, the protection line must also be assigned to group #1 on BlackDiamond #2. The group# is used to identify the partner line, which can be either the working line or the protection line, in Ethernet messages exchanged by BlackDiamond switches that are cooperating to provide the APS function. The following command example creates APS group 1001 on the BlackDiamond switch:
create aps 1001
The group# parameter is an integer in the range from 1 to 65535 that identifies the APS group to be deleted. The following command example deletes APS group 1001:
delete aps 1001
The group# parameter is an integer in the range from 1 to 65535 that identifies the APS group to which the specified port is to be added. The port parameter identifies the SONET port that is to be added to the APS group. You must also specify whether the port is the APS working or protection line. You can add only one working line and one protection line to an APS group. If you designate the port the protection line, then you must also specify the IP address (ipaddress parameter) of the BlackDiamond switch where the
556
working line resides. This IP address is used to send APS control messages to the BlackDiamond switch containing the working line.
NOTE The configured IP address should be associated with an Ethernet VLAN that has loopback mode enabled to minimize the impact of network outages on APS functionality. Also, when using APS to protect links on different BlackDiamond 6800 series switches, the network connecting the working and protection switches must always have sufficient bandwidth to support APS control transfers. In routing configurations, the working line and the protection line should represent the same IP address from the perspective of the neighboring PPP switch. When the working line and protection line reside in the same BlackDiamond switch, both ports should be members of the same VLAN. The case where both the working line and the protection line for an APS group reside in the same BlackDiamond switch is the only situation where IPCP can be enabled on multiple SONET ports that are members of the same VLAN. In general, if IPCP is enabled on a PoS module port, that port can be a member of only one VLAN and no other ports on that switch can be members of that VLAN. The following command example adds port 1 of the module installed in slot 8 of the BlackDiamond switch to APS group 1001 as the working line.
configure aps 1001 add 8:1 working
The group# parameter is an integer in the range from 1 to 65535 that identifies the APS group from which the specified port is to be deleted. The port parameter identifies the SONET port that is to be deleted from the APS group.
NOTE Deleting the working line from an APS group initiates a switch to the protection line, but deleting the active protection line from an APS group does not initiate a switch to the working line. The following command example deletes port 1 of the module installed in slot 8 of the BlackDiamond switch from APS group 1001.
configure aps 1001 delete 8:1
557
The group# parameter is an integer in the range from 1 to 65535 that identifies the APS group to which the authentication command applies. You must also specify whether authentication is to be turned off or turned on. The default setting is off. If you are enabling authentication, you must also specify a text authentication string of no more than eight alphanumeric characters as part of the command. If the working line and the protection line for an APS group reside in different BlackDiamond switches, the same authentication string must be configured at both BlackDiamond switches; otherwise, authentication will not work. The following command example enables APS authentication for group 1001, with seer5dog as the authentication string.
configure aps 1001 authenticate on seer5dog
NOTE A longer WTR period provides more protection against frequent switching by waiting to assure that the working line is fully operational, but prolongs the time it takes to restore traffic to the working line after it is fully operational. To configure APS operation in either nonrevertive or revertive switching mode, use the following command:
configure aps <group#> [nonrevert | revert <minutes>]
The group# parameter is an integer in the range from 1 to 65535 that identifies the APS group to which the configuration command applies. The minutes parameter is an integer in the range from 0 to 12. If you select revertive switching mode, you must enter a value for minutes.
NOTE This command applies only to SONET ports performing the protection line function.
558
The following command example configures APS group 1001 to operate in revertive switching mode, with a WTR of 5 minutes.
configure aps 1001 revert 5
The group# parameter is an integer in the range from 1 to 65535 that identifies the APS group to which this configuration command applies. The seconds parameter is an integer in the range from 1 to 300 that specifies the amount of time the protection switch waits between transmissions of hello packets to the working switch. The default value is 1. The consecutive_misses parameter is an integer in the range from 1 to 100 that controls the time interval the protection switch waits before assuming that the working switch has failed. If the working switch does not respond within consecutive_misses hello intervals, or (consecutive_misses * seconds) seconds, the protection switch assumes that the working switch has failed and initiates a line switch. The default value is 5.
NOTE In some cases, even if the working switch and working line are both operational, congestion might temporarily slow the response time of the working switch to the point that the protection switch assumes the working switch has failed, causing premature or unnecessary line switches. While setting larger values for seconds and consecutive_misses will protect against premature or unnecessary line switches, they can also delay a line switch when an actual switch failure occurs.
NOTE This command applies only to SONET ports performing the protection line function. The following command example configures the timers for APS group 1001 to 1 second and 3 consecutive misses.
configure aps 1001 timers 1 3
559
The group# parameter is an integer in the range from 1 to 65535 that identifies the APS group to which the lockout command applies. By default, lockout mode is off.
NOTE This command applies only to SONET ports performing the protection line function. Also, the settings from this command are not preserved when the switch reboots. The following command example turns on lockout mode for APS group 1001.
configure aps 1001 lockout on
The group# parameter is an integer in the range from 1 to 65535 that identifies the APS group to which the force command applies. The off keyword turns off forced switch mode. By default, force switch mode is off. The working keyword forces the specified APS group to use the working line as the active line. The protection keyword forces the specified APS group to use the protection line as the active line. A forced switch is a high priority request. Only three events can override a forced switch request: A configure aps force off command A configure aps lockout on command (that was either in effect before the force command or issued after the force command) A Signal Fail condition detected on the protection line NOTE This command applies only to SONET ports performing the protection line function. Also, the settings from this command are not preserved when the switch reboots. The following command example forces APS group 1001 to use the protection line as the active line:
configure aps 1001 force protection
560
The group# parameter is an integer in the range from 1 to 65535 that identifies the APS group to which the command applies. The off keyword turns off manual switch mode. By default, manual switch mode is off. The working keyword causes the specified APS group to use the working line as the active line. The protection keyword causes the specified APS group to use the protection line as the active line. A manual switch is a lower priority request than a forced switch. The following events can override a manual switch: A configure aps manual off command A configure aps force working or a configure aps force protection command A configure aps lockout on command A detected Signal Fail or Signal Degrade line condition NOTE This command applies only to SONET ports performing the protection line function. Also, the settings from this command are not preserved when the switch reboots. The following command example configures APS group 1001 to use its working line as the active line:
configure aps 1001 manual working
The group# parameter is an integer in the range from 1 to 65535 that identifies a particular APS group.
NOTE This command does not affect the ports that have been added to the APS group, but does cancel any outstanding lockout, force, or switch requests.
The following command example resets the configuration parameters of APS group 1001 to their default values:
561
The optional group# parameter is an integer in the range from 1 to 65535 that identifies a particular APS group for which status is to be shown. If you enter the show aps command without an argument or keyword, the command displays a summary of status information for all configured APS groups. You can use the detail keyword to display more detailed status information. Summary status includes the following information for each APS group: Provisioned values of all APS configuration parameters, including SONET port numbers and whether the ports are performing the working or protection line function. An indication of whether the line associated with each configured port is active or inactive from an APS perspective, along with a timestamp indicating when the last APS state change occurred. An indication of whether an error condition currently exists on the line associated with each configured port, along with a timestamp indicating when the last error occurred (errors include Signal Fail and Signal Degrade Events). An indication of whether a Signal Fail (SF) or Signal Degrade (SD) Event due to an excessive Bit Error Rate (BER) currently exists on the line associated with each configured port. The BER thresholds that cause SF and SD Events can be specified as part of configuring a SONET port. Counts of the number of SF and SD Events initiated by each configured port due to an excessive BER. A count of the number of APS Authentication Failures, which is a count of the number of received APS control packets that have been discarded due to authentication failures. Detailed status includes the information reported in the summary status along with additional status and management counters. Detailed status only applies to ports performing the protection line function. Detailed management counters reported for each protection-line port include: Automatic line switches initiated by the working-line switch, by the protection-line switch, and by the ADM Line switches initiated due to external commands, such as through either the configure aps <group#> force command or the configure aps <group#> manual command) Line switches completed successfully Hello Protocol failures (this count is included as a component of the counter for automatic line switches initiated by the protection-line switch) APS mode mismatch failures, which occur when the ADM indicates that it is provisioned for the 1:n APS architecture, or when the ADM indicates that it is provisioned for unidirectional-switching mode Protection switching byte failures, which occur when the received K1 byte is either inconsistent or contains an invalid request code
562
Channel mismatch failures, which occur when the channel number in the transmitted K1 byte does not match the channel number in the received K2 byte Far-end protection line failures, which occur when a Signal Fail request code is received on the protection line Additional detailed status information reported for each protection-line port includes: Current contents of received K1 and K2 bytes Contents of K1 and K2 bytes that are currently being transmitted Indication of whether an APS Mode Mismatch Failure is currently active Indication of whether a Protection Switching Byte Failure is currently active Indication of whether a Channel Mismatch Failure is currently active Indication of whether a Far-End Protection Line Failure is currently active
After you configure the PoS port, you can tunnel HDLC encapsulated frames from a PoS port across a SONET or Ethernet based MPLS network. The ingress PoS port encapsulates the entire HDLC frame, including the HDLC header and FCS, inside an Ethernet/MPLS header. HDLC control bytes are de-stuffed on the ingress PoS port. The egress PoS port strips the Ethernet/MPLS header and forwards the HDLC frame. HDLC control bytes are stuffed on the egress PoS ports. HDLC idle bytes, x7E, are not tunneled, but runts and aborted frames are tunneled. Figure 117 displays port tunneling between PoS port 1:4 on BlackDiamond switch 1 and PoS port 8:4 on BlackDiamond switch 2 with a PPP link between Customer switch 1 and Customer switch 2. PPP is not terminated on either BlackDiamond switch 1 or BlackDiamond switch 2.
563
BlackDiamond 1 10.1.1.1
1 2 3 4 A B 5 6 7 8
BlackDiamond 2 10.1.1.2
1 2 3 4 A B 5 6 7 8
Customer switch 1
SONET
Customer switch 2
PoS_029
When you configure a PoS port for HDLC tunneling, make sure PPP is not configured and BCP and IPCP are off. Furthermore, the PoS port should be the only port in the VLAN, and an MPLS tls-tunnel should be configured for this VLAN. For more information about MPLS and MPLS commands, see the MPLS Installation and User Guide. The payload inside the HDLC can be PPP or another HDLC encapsulated protocol. SONET Automatic Protection Switching (APS) is supported between tunneled PoS ports on the same module or different modules in the same switch. APS is not supported for tunneled PoS ports on different switches. By default, HDLC tunneling is turned off on PoS ports. The following sections describe how to configure a port tunnel.
The following configuration commands apply to the PoS module installed in slot 8 of BlackDiamond switch 2, as shown in Figure 117.
configure ppp ipcp off port 8:4 configure ppp bcp off port 8:4 create vlan customerx configure vlan customerx add port 8:4 configure ports 8:4 tunnel hdlc mpls
564
NOTE The PoS port should be the only port in the VLAN.
The following configuration commands apply to the Ethernet/MPLS module installed in slot 1 of BlackDiamond switch 2, as shown in Figure 117.
create vlan mplsCloud configure vlan mplsCloud add port 1:1 configure vlan mplsCloud ipaddress 10.1.1.2/24 enable ipforwarding mplsCloud configure ospf routerid automatic configure ospf add vlan mplsCloud area 0.0.0.0 enable ospf
The following configuration commands create an MPLS tls-tunnel between BlackDiamond switch 2 and BlackDiamond switch 1, as shown in Figure 117.
configure mpls add vlan mplsCloud configure mpls add tls-tunnel BD1 10.1.1.1 customerX tls-labels 8F200 8F100 enable mpls
565
Configuring Access List Attributes on page 568 Configuring Access List Attributes on page 568 Configuring Access List Attributes on page 568 Changing Image and Configuration Attributes on page 568
enable mirroring to <port> disable learning ports <portlist> configure mirroring add [vlan <vlan name> | port <port> | vlan <vlan
name> ports <portlist>]
566
If IPCP is configured on the port and jumbo frame support is not enabled, the Extreme Networks implementation of PPP advertises an MRU of 1500 octets and requires that the peer have an MRU of at least 1500 octets. If BCP is configured on the port and jumbo frame support is not enabled, the advertised MRU is 24 octets larger than in the corresponding IPCP case. The additional octets are needed to accommodate the larger frame size associated with the bridged format, which includes the MAC header. If VLAN tags are to be transmitted, the peer s MRU must be at least 1520 octets; otherwise, the peer s MRU must be a minimum of 1516 octets. If IPCP is configured on the port and jumbo frame support is enabled on the port, the advertised MRU size in octets is calculated using the following formula: (configured jumbo frame MTU 22) and the peer is also required to have an MRU at least this large. If BCP is configured on the port and jumbo frame support is enabled on the port, the peer s MRU must be (configured jumbo frame MTU 6) octets at a minimum, and at least (configured jumbo frame MTU 2) octets if VLAN tags are to be transmitted. Consider these factors when configuring jumbo frame support on a PoS port: Because the jumbo frame MTU setting affects the PPP MRU setting of the PoS port and the peer, changing the jumbo frame MTU setting can have the following results: Temporary disruption of the logical connection because the Link Control Protocol might need to terminate the logical connection and then re-establish it with larger MRU sizes. Longer term disruption of the logical connection because of the requirement that the logical connection can only be established when (a) jumbo frame support is enabled on the peer PoS port, and (b) the same jumbo frame MTU size must be configured on both ends of the logical connection when the peer is also a BlackDiamond switch. When the jumbo frame size is changed from a value of 8191 or less to a value greater than 8192, any PoS modules that have ports with jumbo frame support enabled must be rebooted for the change to take effect. The peer MRU is always allowed to be greater than or equal to the MRU size of the local port. Fragmentation and path MTU discovery is performed, but is based on checking the peer s MRU in conjunction with the IP MTU configured for the egress VLAN (which can be set using the configure ip-mtu <number> vlan <vlan name> command), rather than the jumbo frame MTU setting. For more information on the ExtremeWare jumbo frame commands, see Chapter 4.
567
568
This chapter describes the T1, E1, and T3 features that can be configured in the ExtremeWare. It covers the following topics: Overview on page 569 Configuring WAN Physical Links on page 570 Monitoring WAN Physical Links on page 574 Configuring PPP and MLPPP on page 578 WAN Multilink Configuration Examples on page 581 VLAN Tunneling (VMANs) on page 583
Overview
In this document, WAN refers to either T1, E1, or T3 technologies. T1 is a mature technology originally developed for voice telephone transmission. It was used to aggregate a number of voice lines into a single connection to the telephone network. Today, T1 is also used to transmit digital data using widely available equipment and established wiring commonly available in diverse locations. A similar technology standard is in use in Europe, namely E1. T1 and E1 are similar, but not identical. Higher bandwidth characterizes T3 connections. Essentially, a T3 connection is equivalent to a bundle of 28 T1 connections. Extreme Networks support unchannelized T3 only. The T1 and E1 modules maintain a subset of the switchs FDB entries. The SMMi and WAN module FDBs are synchronized via occasional SMMi flooding of dynamic entries. Static entries are synchronized as you enter them. This allows you to configure multiple T1 and E1 ports on the same module in the same VLAN when using BCP. Layer 2 multicast traffic is treated as broadcast traffic by the T1 and E1 modules. The following features are not supported on T1 or E1 modules: T1 port mirroring Static Load sharing Software-Controlled Redundant Ports ACLs on a per port basis
569
Per port egress QoS Traffic Grouping for source ports BiDirectional Rate Shaping DLCS MAC address and protocol-based VLANs that include T1 ports VLAN aggregation
570
Cable Length
Longer cable lengths cause greater losses for signals, so transmitter hardware must transmit at a higher level to transmit data successfully. However, too high a signal level can cause crosstalk from one cable to another. The cablelength parameter allows you to control the transmitter signal level for your conditions. Typically, your service provider will suggest the correct level. The parameter values available differ for T1 and T3 links. For E1, the parameter value is not changeable, but is always set to 120 Ohms. However, for E1 links you can configure the receiver gain to meet your conditions. See Receiver Gain on page 572. For short haul connections (less than 1000 feet) the typical equipment uses less sensitive receivers. The transmitter level for T1 is set by selecting a cable length in feet, from the following values: 133, 266, 399, 533 or 655. For T3, select from the following values: 249 or 900. Choose the next higher value if the cable length provided by your service provider does not match one of these values. For example, choose 133 for a 50 foot cable and 533 for a 450 foot cable. The default value is 133, which corresponds to cables in the range of 0-133 feet. For longer distances (up to 6000 feet) T1 equipment uses more sensitive receivers, and crosstalk is more likely to occur. Under these conditions, the transmitter level is set by selecting a transmitter attenuation level in dB from the following values: -22.5, -15, -7.5, or 0. From lowest to highest transmitter level, use the following values for the configure port t1 cablelength command: -22.5 db, -15 db, -7.5 db, 0 db, 133 feet, 266 feet, 399 feet, 533 feet, and 655 feet. To configure the cable length, use one of the following commands:
configure ports <portlist> t1 cablelength [0 | -7.5 | -15 | -22.5] db configure ports <portlist> t1 cablelength [133 | 266 | 399 | 533 | 655] feet configure ports <portlist> t3 cablelength [249 | 900] feet
Clock Source
A clock is used to synchronize data transmission on the line. Generally, one end of the link provides the master clock, and the other end of the link recovers the clock from the signal on the line. By default the clock source is derived from the line. If needed, an internal clock is available. To configure the clock source, use the following command:
configure ports <portlist> [t1 | e1 | t3] clocksource [internal | line]
NOTE If the clock source is configured as line, but the clock cannot be recovered from the signal on the line, the hardware will use the internal clock instead.
571
Framing
Framing is used to synchronize data transmission on the line. Framing allows the hardware to determine when each packet starts and ends. The two choices for T1 framing are Super Frame (SF), also known as D4, and Extended Super Frame (ESF). The ESF scheme is a newer standard and is enabled by default. To choose the T1 framing scheme, use the following command:
configure ports <portlist> t1 framing [esf | sf]
If you choose to use SF framing, you should disable yellow alarm detection for the T1 line. SF framing may generate false yellow alarms. See Yellow Alarms on page 574 for more details. The framing choices for E1 are CRC4 or no-CRC4. To choose the E1 framing scheme, use the following command:
configure ports <portlist> e1 framing [crc4 | no-crc4]
The framing choices for T3 are C-bit and M13. To choose the T3 framing scheme, use the following command:
configure ports <portlist> t3 framing [c-bit | m13]
Linecoding
Linecoding is the convention used to encode signals for transmission over the line. For T1 connections you can choose from two linecoding standards, bipolar eight zero suppression (B8ZS) or alternate mark inversion (AMI). The default value is B8ZS. To configure linecoding, use the following command:
configure ports <portlist> t1 linecoding [b8zs | ami]
Receiver Gain
The receiver gain for E1 links can be configured to improve performance of the link. Changing the receiver gain can help to receive the E1 signal or to reduce crosstalk. Receiver gain is only configurable for E1 links. To configure receiver gain, use the following command:
configure ports <portlist> e1 receivergain [-12 | -43] db
572
SNMP Alerts
If the WAN module hardware detects a red, yellow, or blue alarm, the alarms are displayed by using a show command. Additionally, the module can be configured to send an SNMP alert to the SMMi in the switch when red, yellow, or blue alarms are detected. If the module is configured to send SNMP alerts, and the switch is configured to send SNMP trap messages, then the switch will send a message to any SNMP trap receivers that have been configured. To configure SNMP trap receivers, and for more information about configuring SNMP in ExtremeWare, see the ExtremeWare Software User Guide. The module can also be configured not to send an SNMP alert to the SMMi. Any red, yellow, or blue alarms will not be reported to the SNMP trap receivers. The default value for SNMP alerts is enabled. To configure whether SNMP alerts are generated from WAN alarms, use the following command:
configure ports <portlist> [t1 | e1 | t3] snmp alert [enable | disable]
573
Timeslots
The E1 signal is divided into thirty-two timeslots, numbered 0 through 31. The first timeslot (0) is reserved and cannot be used to transmit data. The timeslot numbered 16 is often used for voice phone calls in installations that combine voice and data. For installations that use the full E1 bandwith for data communications, you will not need to configure which timeslots are used. For installations that do not use the total E1 bandwith, your E1 provider will tell you which timeslots to use. To configure which timeslots to use for your E1 link, use the following command:
configure ports <portlist> e1 timeslots <timeslots>
A timeslot list uses a dash to represent a range of numbers and a comma to separate single numbers or ranges. Valid timeslots range from 1 to 31. For example, to specify timeslots 1 through 15 and 17 through 31 for the E1 port 1 on slot 4, use the following command:
configure ports 4:1 e1 timeslots 1-15,17-31
Yellow Alarms
A yellow alarm occurs on a device when its signal is not received at the remote end. It is also called a Remote Alarm Indication (RAI). You can disable detection and generation of yellow alarms for a T1 port. When SF framing is used, yellow alarm detection and generation should be set to off, because detection of yellow alarms is not reliable when data traffic is transmitted with SF framing (data traffic often contains bit combinations that do not occur for encoded voice traffic). The default value for yellow alarm generation and detection is both. To configure yellow alarms, use the following command:
configure ports <portlist> t1 yellow [detection | generation | both | off]
Loopback
The WAN device can be set up to loopback, that is, return a transmitted signal back to the sender so it can be compared with the original. There are several different types of loopback available to test different parts of the device and the line, as specified in the T1, E1, and T3 standards.
574
Data in
XM_010
During normal operation of a link, as the local data stream enters the framer, the appropriate framing bits are inserted into the data, and the framed signal is transmitted to the remote end. At the remote end, the process is reversed as the framing bits are discarded and the data stream is passed to the remote system. Loopback can be enabled on the near-end of a WAN link, but only the T1 and T3 modules can enable loopback on the far-end of a link. The near-end loopback modes are controlled directly by the hardware on the near-end. Far-end loopback modes require the cooperation of the far-end hardware. A message is sent to the far-end to cause it to enter a far-end loopback mode. When loopback is enabled on a WAN port, the green port LED will blink.
Data in
XM_011
575
Local Loopback Mode. When the local port is enabled for local loopback, the local data stream goes into the framer and the framing bits are inserted into the data, but the data is not transmitted to the remote end. Instead, it is sent back through the local framer, the framing bits are discarded, and the original data is returned. This mode tests the local end. Figure 120: Network line loopback mode
Data in
XM_012
Network Line Loopback Mode. When the local port is enabled for network line loopback mode, the received signal is sent back to the remote end without reframing the data. This mode primarily tests the integrity of the line from the remote side. Figure 121: Network payload loopback mode
Data in
XM_013
Network Payload Loopback Mode. When the local port is enabled for network payload mode, the framer removes the framing bits from the received signal and recovers the transmitted data. This same data is then reframed and transmitted back to the remote end. This mode tests the line and the local circuitry from the remote side.
576
The remote line mode reflects the received signal back to the near-end. The remote payload mode reflects the data and regenerates the framing information back to the near-end. Figure 122: Remote line loopback mode
Data in
XM_014
Remote Line Loopback Mode. When the local port is enabled for remote line loopback mode, it sends a request to the remote end to enter the equivalent of network line loopback mode. The signal transmitted to the remote end will be retransmitted as received back to the local end.
NOTE If the T1 line is configured to use the ATT FDL standard, the remote end must be configured to detect inband loopback requests for the remote end to enter remote line loopback mode. Figure 123: Remote payload loopback mode
Data in
XM_015
Remote Payload Loopback Mode. When the local port is enabled for remote payload loopback mode, it sends a request to the remote end to enter the equivalent of network payload loopback mode. When the remote end enters loopback mode, the framer at the remote end removes the framing bits from the received signal and recovers the transmitted data. This same data is then reframed and transmitted back to the local end.
577
You can also use the following command to return the remote T1 or T3 port to normal function from loopback mode:
enable ports <portlist> [t1 | t3] loopback remote loopdown
578
Once the multilink group is created, assign ports to it. All T1/E1 ports must be added as tagged ports. If the ports are configured as IPCP ports, then the tags will be stripped as traffic passes over the link. BCP-configured ports will pass the tag across the link. See the section Encapsulation for more information. Add ports by using the following command:
configure multilink <groupname> add ports <portlist> tag
If the first port added to a multilink group is already configured for PPP, the multilink group will inherit the configuration of the first port. Any other ports added to the link will be configured to match the multilink configuration. The next section lists the configuration commands for multilink groups and single PPP links. Once the multilink group has been configured, it is added to a VLAN so that it can pass traffic from the VLAN across the link. To add a multilink group to a VLAN, use the following command:
configure vlan <vlan name> add multilink <groupname>
Typically the last step in configuring a multilink group is to use the following command to enable it:
enable multilink <groupname>
Any changes to an enabled multilink group will not take effect until the multilink group is restarted. To restart a multilink group, use the following command:
restart multilink <groupname>
579
Authentication
By default, no authentication is configured on PPP links since the WM-4T1i module will typically be used with leased lineswhere both sides of the link are controlled and authentication is not required. If authentication is needed, the WM-4T1i module supports either PAP or CHAP. Password authentication protocol (PAP) authenticates a user as the connection is established by sending a username and password. Challenge Handshake Authentication Protocol (CHAP) authenticates a user by sending a challenge across the link. The remote end calculates a response based on the user password and sends the response back across the link. CHAP is a more secure authentication protocol than PAP. The link can also be configured to attempt to use CHAP first, followed by PAP, if CHAP fails. To configure authentication on a PPP link, use the following command:
configure ppp authentication [off | chap | pap | chap-pap] [ports <portlist> | multilink <groupname>]
PPP Link Username. When the local end of a link initiates a PPP connection, the local end must send the appropriate authentication information. For PAP it sends the username and password, for CHAP it sends the username and must respond correctly to the challenge, and for no authentication it sends nothing. To configure the username and password used to initiate the link, use the following command:
configure ppp user <username> {encrypted} <password> [ports <portlist> | multilink <groupname>]
The encrypted keyword is used to hide the password when the switch configuration is displayed; it does not control whether the password is encrypted across the link during authentication. PPP User Accounts. When the remote end initiates the link, the local end must verify the authentication information. The local end maintains a list of authorized user accounts and passwords. To add a user to the list, use the following command:
create account pppuser <name> {encrypted} {<password>}
Encapsulation
The packets passed over the PPP/MLPPP link can use either bridged or routed encapsulation. You would use bridged packets if you plan to have VLANs span the link. You would use routed packets if the link connects two different routed networks or separate VLANs. Using bridged packets allows the VLAN tags to be carried across the PPP/MLPPP link. Bridged packets are transported using the PPP Bridging Control Protocol (BCP), described in RFC 2878, except in the case of Legacy BCP, described below. When the encapsulation is set to BCP, 802.1Q and 802.1p information is preserved and transported across the link. Routed packets are transported across a PPP/MLPPP link using IP Control Protocol (IPCP), described in RFC 1332. This is the encapsulation that is familiar to most users of PPP. The routed packets do not contain Ethernet headers so cannot preserve VLAN tags. However, the WAN ports still must be added as tagged ports to the VLAN that contains them. The module uses the tags internally and strips them off before the packets are transmitted. The IP addresses used for the PPP/MLPPP link are taken from the IP address assigned to the VLAN at each end of the link. The VLAN that contains the IPCP encapsulated PPP/MLPPP ports cannot contain other ports. In other words, the only ports allowed in the VLAN are those that make up the IPCP encapsulated link. There can only be one VLAN spanning an IPCP-encapsulated link.
580
You must have one and only one encapsulation type configured on a PPP/MLPPP link. Setting BCP encapsulation off implies that IPCP encapsulation is on. The default setting is BCP encapsulation on and IPCP encapsulation off. To configure encapsulation, use the following command:
configure ppp [bcp [on | off] | ipcp [on | off]] [ports <portlist> | multilink <groupname>]
Legacy BCP. Some routers supported by other vendors implemented BCP using an older standard, RFC 1638. For interoperability, the Extreme Networks implementation supports both standards. The limitation with RFC 1638-based BCP is that 802.1Q tags are not supported. So Legacy BCP cannot support multiple VLANs or preserve 802.1p priority across the PPP link. Both types of BCP can operate over single and multilink PPP. When BCP is negotiated over a link, RFC 2878 BCP is initially proposed. If the peer only supports Legacy BCP (RFC 1638), then the link is made using Legacy BCP. Since the WAN module ports are always configured as tagged ports, the VLAN tag is removed in the egress direction and inserted in the egress direction when BCP is operating in Legacy mode. There is no Legacy BCP specific configuration, and the display for the command show ppp info is identical for BCP and Legacy BCP. To determine if the link is using Legacy BCP, use the following command:
show log warning
581
VLAN alpha tag = 1001 Multilink bcp_example encapsulation = BCP PPP PPP PPP T1 port 4:1 T1 port 4:2 T1 port 4:3
To switch #2
Switch #1
create vlan alpha configure alpha tag 1001 create multilink bcp_example configure ports 4:1-4:3 t1 clocksource internal configure bcp_example add ports 4:1-4:3 tag configure alpha add multilink bcp_example enable bcp_example
XM_007
582
VLAN beta tag = 1001 IP address = 10.10.10.1/24 Multilink ipcp_example encapsulation = IPCP PPP PPP PPP T1 port 4:1 T1 port 4:2 T1 port 4:3
To switch #2
Switch #1
XM_008
create vlan beta configure beta tag 1001 configure beta ipaddress 10.10.10.1/24 create multilink ipcp_example configure ipcp_example add ports 4:1-4:3 tag configure ppp ipcp on ports 4:1-4:3 configure beta add multilink ipcp_example enable ipcp_example
583
The PPP type must be set to BCP, not IPCP, but this is not shown in the examples since BCP is the default. PPP also adds some overhead to the packets, therefore the PPP MRU size is set to a higher value than the Ethernet jumbo frame size. For multilink groups, the overhead is six bytes. For single PPP links, the overhead is two bytes. There are two cases to consider: VMAN tunnels transported switch-to-switch across a WAN link and WAN ports as ingress/egress ports of a tunnel.
NOTE When you modify the 802.1Q Ethertype, you must reboot the switch for the change to take effect.
584
configure jumbo-frame size configure ppp mru 1532 1:1 create vlan tunnel1 configure vlan tunnel1 tag configure vlan tunnel1 add create vlan tunnel2 configure vlan tunnel2 tag configure vlan tunnel2 add
1530
configure vlan tunnel1 add port 2:1-2:2 untag configure vlan tunnel2 add port 2:3-2:4 untag
585
586
The MPLS module is a self-contained module for the BlackDiamond 6800 series chassis-based system. Unlike other BlackDiamond modules, there are no external network interfaces on the MPLS module. Instead, the MPLS module provides advanced IP services for the other input/output (I/O) modules installed in the chassis. The MPLS module contains a powerful set of packet processing resources that operate in a one-armed fashion: receiving frames from the switch fabric, processing the frames, and transmitting the frames back into the switch fabric. This chapter covers the following topics: About MPLS on page 587 About the MPLS Module on page 597 Configuring the MPLS Module on page 598 Configuring the Label Distribution Protocol (LDP) on page 603 MPLS and IP Routing on page 608 Configuration Example on page 612
About MPLS
MPLS is a technology that allows routers to make protocol-independent forwarding decisions based on fixed-length labels. The use of MPLS labels enables routers to avoid the processing overhead of delving deeply into each packet and performing complex route lookup operations based upon destination IP addresses. In an MPLS environment, incoming packets are initially assigned labels by a Label Edge Router (LER). The labels allow the packets to be more efficiently handled by MPLS-capable routers at each point along the forwarding path. An MPLS label essentially consists of a short fixed-length value carried within each packet header and that identifies a Forwarding Equivalence Class (FEC). The FEC tells the router how to handle the packet. An FEC is defined to be a group of packets that are forwarded in the same manner. Examples of FECs include an IP prefix, a host address, or a VLAN ID. The label concept in MPLS is analogous to other connection identifiers, such as an ATM VPI/VCI or a Frame Relay DLCI.
587
By mapping to a specific FEC, the MPLS label efficiently provides the router with all of the local link information needed for immediate forwarding to the next hop. MPLS creates a Label Switched Path (LSP) along which each Label Switch Router (LSR) can make forwarding decisions based solely upon the content of the labels. At each hop, the LSR simply strips off the existing label and applies a new one that tells the next LSR how to forward the packet.
Overview of MPLS
MPLS encompasses a growing set of protocols defined by the IETF. True to its name, MPLS is based on a label-switching forwarding algorithm. ATM and Frame Relay are examples of other protocols that use label-switching forwarding algorithms. Conceptually, label switching is straightforward. A label is a relatively short, fixed-length identifier that is used to forward packets received from a given link. The label value is locally significant to a particular link and is assigned by the receiving entity. Because labels are relatively short (for example, 20 bits in a MPLS shim header), the label of a received packet can be used as an index into a linear array containing the forwarding database. Forwarding database entries indicate the outgoing port and any label(s) to be applied to forwarded frames. Thus, forwarding may consist of a simple lookup and replacement of the incoming label with the appropriate outgoing label (otherwise known as label swapping). Figure 126 illustrates an MPLS network. Figure 126: MPLS network
Egress LER Ingress LER Source IP network LSR LSR LSP Destination IP network
MPLS cloud
MPLS Module Limitations
The following limitations apply to the MPLS module: The only applicable QoS commands are dot1p-to-exp and exp-to-dot1p SLB and Flow Redirection are mutually exclusive functions with MPLS
MPLS_05
Port state changes on TLS VLANs as a result of EAPS, VRRP, and STP state changes are not supported MPLS does not advertise a label mapping for a default route There is no support for indirect LSPs across ISIS networks No native MPLS RIP support is provided (labels can be advertised for RIP routes exported into OSPF) MPLS does not advertise label mappings for BGP routes exported into OSPF
588
About MPLS
IP multicast MPLS is not supported IPX MPLS is not supported GVRP is not supported over MPLS LSPs PoS/ATM bridging is not compatible with MPLS when two MSMs installed ARM and MPLS modules cannot be installed in the same switch Commands with port parameters are not directly applicable to the MPLS module
589
VPLS
that has the property that all VC tunnels within a VPN are signaled with the same vcid, where the vcid represents the VPN identifier.
VPN Virtual Private Network. A logical private network domain that spans a public or service provider network infrastructure.
590
About MPLS
routing database. In either case, an LSR only uses a label binding to switch traffic if the binding was received from the current next hop for the associated FEC. Both label advertisement modes can be concurrently deployed in the same network. However, for a given adjacency, the two LSRs must agree on the discipline. Negotiation procedures specify that DU mode be used when a conflict exists. Label request messages can still be used when MPLS is operating in unsolicited mode. The Extreme LDP implementation supports DU mode only. RSVP-TE, by definition, is DoD. Label Retention Modes. MPLS provides two modes for label retention: Conservative Liberal Using conservative label retention mode, an LSR retains only the label-to-FEC mappings that it currently needs (mappings received from the current next hop for the FEC). Using liberal retention mode, LSRs keep all the mappings that have been advertised to them. The trade-off is memory resources saved by conservative mode versus the potential of quicker response to routing changes made possible by liberal retention (for example, when the label binding for a new next hop is already resident in memory). The Extreme MPLS implementation supports liberal label retention, only. LSP Control Modes. MPLS provides two LSP control modes: Independent Ordered Using independent LSP control, each LSR makes independent decisions to bind labels to FECs. By contrast, using ordered LSP control, the initial label for an LSP is always assigned by the egress LSR for the associated FEC (either in response to a label request message or by virtue of sending an unsolicited label mapping message). More specifically, using ordered LSP control, an LSR only binds a label to a particular FEC if it is the egress LSR for the FEC, or if it has already received a label binding for the FEC from its next hop for the FEC. True to its name, the mode provides a more controlled environment that yields benefits such as preventing loops and ensuring use of consistent FECs throughout the network. The Extreme MPLS implementation supports ordered LSP control, only.
591
Figure 127 illustrates the three types of LSRs. Figure 127: LSR types
LSR for LSP A LSP A Ingress LER Source IP network LSR LSP B Egress LER for LSP B
MPLS cloud
MPLS Layer
MPLS can be thought of as a shim-layer between layer 2 and layer 3 of the protocol stack. MPLS provides connection services to layer-3 functions while making use of link-layer services from layer-2. To achieve this, MPLS defines a shim header that is inserted between the link layer header and the network layer header of transmitted frames. The format of a 32-bit MPLS shim header is illustrated in Figure 128. Figure 128: MPLS shim header
EXP (3 bits)
bottom-of-stack (1 bits)
TTL (8 bits)
MPLS_01
592
About MPLS
Label 1
EXP
bottom-of-stack =0
TTL
Label 2
EXP
bottom-of-stack =1
TTL
MPLS_02
Figure 130 illustrates the format of a unicast MPLS frame on an Ethernet link. The MAC addresses are those of the adjacent MPLS router interfaces. The x8847 Ethertype value indicates that the frame contains a MPLS unicast packet. A different Ethertype value (x8848) is used to identify MPLS multicast packets. Figure 130: MPLS unicast frame on Ethernet
MAC DA
MAC SA
Ethertype x8847
remainder of frame
MPLS_03
Figure 131 shows the format of a unicast MPLS frame that contains an 802.1Q VLAN tag. In both cases, the Ethertype values no longer identify the network layer protocol type. This implies that, generally, the protocol type must be inferable from the MPLS label value(s). For example, when only one type of protocol is carried on a given LSP. Figure 131: MPLS unicast frame on tagged Ethernet VLAN
MAC DA
MAC SA
Ethertype x8100
VLAN tag
Ethertype x8847
remainder of frame
MPLS_04
The approach of the shim header encapsulation is similar for Packet over SONET (PoS) interfaces running PPP. For PoS interfaces running PPP, the MPLS shim header follows the PPP Protocol ID (PID) field. A PID of x0281 is used to indicate MPLS unicast, while a PID of x0283 identifies MPLS multicast.
593
MPLS can also take advantage of technologies that can carry labels in the link layer header. For example, MPLS labels can be carried in the VPI/VCI fields of ATM cell headers. Frame Relay provides another example; an MPLS label can be carried in the DLCI field.
NOTE For more detailed information on MPLS encapsulations, see RFC 3032, MPLS Label Stack Encoding.
Label Binding
Label binding is the process of, and the rules used to, associate labels with FECs. LSRs construct label mappings and forwarding tables that comprise two types of labels: labels that are locally assigned and labels that are remotely assigned. Locally assigned labels are labels that are chosen and assigned locally by the LSR. For example, when the LSR assigns a label for an advertised direct interface. This binding information is communicated to neighboring LSRs. Neighbor LSRs view this binding information as remotely assigned. Remotely assigned labels are labels that are assigned based on binding information received from another LSR.
594
About MPLS
The partitioning described in Table 77 maximizes forwarding performance, and supports efficient load sharing of MPLS traffic across the Gigabit Ethernet backplane links of high-speed input/output modules. The data path uses the least significant 16 bits of the label (bits 0-15) as an index when a label lookup is required. The next 2 bits of the label (bits 16-17) are currently not used by the data path. The most significant 2 bits of the label (bits 18-19) are used to identify the partition. The data path uses the label partition bits in conjunction with the bottom-of-stack flag to efficiently determine how a label should be processed, as described in Table 78.
The MPLS module does not limit the number of labels that can be popped by the egress LSR function, as indicated in Table 78. When the switch performs label swapping as a transit or intermediate LSR, no hard limits are imposed on the maximum size of the label stack, other than the constraint of not exceeding the maximum frame size supported by the physical links comprising the LSP. You should enable jumbo frame support on the ports that are members of an MPLS VLAN. The jumbo frame size should be set to accommodate the addition of a maximally-sized label stack. For example, a jumbo frame size of at least 1530 bytes is needed to support a two-level label stack on a tagged Ethernet port and a jumbo frame size of at least 1548 bytes is needed to support a TLS encapsulated MPLS frame.
595
cached. Within a VPN, once a MAC address has been learned, unicast traffic destined to the cached MAC address is transmitted over a single tunnel. Integrated VPN MAC caching enhancement increases network performance and improves VPN scalability. For information about configuring MPLS Layer-2 VPNs, see Chapter 27.
596
Summary of Features
The MPLS module includes the following features: MultiProtocol label switching (MPLS)MultiProtocol Label Switching (MPLS) is a forwarding algorithm that uses short, fixed-length labels to make next-hop forwarding decisions for each packet in a stream. Selective Longest Prefix MatchIP unicast packets are routed in the ARM hardware using a longest prefix match (LPM) algorithm. This differs from the BlackDiamond switch fabric, which uses an exact match algorithm. The BlackDiamond switch fabric has great forwarding capacity, but the ARM module has better handling of large numbers (hundreds of thousands) of destination IP addresses to match each packets destination IP address. To take advantage of the BlackDiamond switch fabric forwarding capacity and the ARM modules scalability, the ARM module can be configured to use the BlackDiamond switch fabric for some routes and the ARMs LPM for others. This feature is called Selective Longest Prefix Match (Selective-LPM). Destination-sensitive accountingCounts of IP packets and bytes are maintained based on the IP routes used to forward packets. Destination-sensitive accounting gives you the flexibility to bill your customers at predetermined and different rates. The rates are based on the customers IP unicast packet destinations. The accounting feature categorizes IP unicast packets using two parameters, input VLAN ID and accounting bin number. The VLAN ID is used to identify from which customer the packet is received. The accounting bin number is associated with the route used to forward the packet. External billing application servers can correlate the accounting bin number to a specific billing rate.
597
NOTE Documentation for Extreme Networks products is available at the Extreme Networks home page at http://www.extremenetworks.com/. This section describes how to configure: MPLS interfaces LDP OSPF support QoS support Filter support
Next, enable MPLS on a specific VLAN or on all VLANs, using the following command:
configure mpls add vlan [<vlan name> | all] {ldp | rsvp-te}
MPLS must be enabled on all VLANs that transmit or receive MPLS-encapsulated frames. Using the configure mpls add vlan command causes the LDP neighbor discovery process to begin on the specified VLAN.
NOTE The specified VLAN must be configured with an IP address, and have IP forwarding enabled. IGMP snooping must also be enabled on the switch. If all VLANs are selected, MPLS is enabled on all VLANs that have an IP address and IP forwarding enabled. This command optionally enables LDP or RSVP-TE for the specified VLAN. If not specified, both LDP and RSVP-TE are enabled on the specified VLAN. If you have enabled MPLS on an OSPF interface that is used to reach a particular destination, make sure that you enable MPLS on all additional OSPF interfaces that can reach that same destination (for example, enable MPLS on all VLANs that are connected to the backbone network).
598
This command configures the IP MTU for frames transmitted onto MPLS LSPs via the specified egress VLAN. The default settings is 1496 bytes. If all is selected, the configuring MTU applies to all MPLS-enabled VLANs. This command applies to the ingress LSR only when a received IP packet is destined for an MPLS LSP. In this case, if the length of the IP packet exceeds the configured MTU size for the egress VLAN and the Dont Fragment (DF) bit is not set in the IP header of the packet, the packet is fragmented before it is forwarded onto an MPLS LSP. If the DF bit is set in the packet header, Path MTU Discovery starts. Fragmentation is based on either the minimum value of the configured MPLS IP MTU size or the configured IP MTU size for the egress VLAN. (The IP MTU size is configured using the configure ip-mtu <number> vlan <vlan name> command.) You should configure the MPLS IP MTU so that the addition of the MPLS label stack the link layer header does not cause the packet to be too large to be transmitted on the egress ports. To avoid potential problems, you should enable jumbo frame support on all ports that are members of an MPLS VLAN.
This command enables and disables the propagation of the IP TTL value for routed IP packets. The default setting is enabled.
NOTE You must maintain identical propagate-ip-ttl settings on all LERs in the MPLS domain. Not doing so may cause packets to loop endlessly and not be purged from the network if a routing loop is inadvertently introduced. When propagate-ip-ttl is disabled, the LSP is viewed as a point-to-point link between the ingress LSR and the egress LSR. Intermediate LSRs in the MPLS network are not viewed as router hops (from an IP TTL perspective). In this case, the IP TTL is decremented once by the ingress LSR and once by the egress LSR. When disabled, the MPLS TTL is set to 255 by the ingress LSR and is independent of the IP TTL. When propagate-ip-ttl is enabled, each LSR is viewed as a router hop (from an IP TTL perspective). When a packet traverses an LSP, it emerges with the same TTL value that it would have had if it had traversed the same sequence of routers without being label-switched. When enabled, the MPLS TTL field is initially set by the IP TTL field at the ingress LSR, and the IP TTL field is set to the MPLS TTL by the egress LSR.
This command enables or disables whether PHP is requested by the egress LER. When PHP is enabled, PHP is requested on all LSPs for which the switch is the egress LER.
599
PHP is requested by assigning the Implicit Null Label in an advertised mapping. PHP is always performed when requested by an egress LSR (for example, when the switch is acting as an intermediate LSR). The Implicit Null Label is always used in conjunction with routes exported by OSPF, regardless of the PHP configuration. This command can only be executed when MPLS is disabled. The default setting is disabled.
This command configures MPLS QoS mappings. If all is specified, all input values are mapped to the specified <output_value>. The valid range of integers for the <input_value> and the <output_value> is 0 to 7. By default, the mapping tables are initialized such than an <input_value> of n is mapped to an <output_value> of n. Two mappings are supported: dot1p-to-exp exp-to-dot1p
Dot1p-to-exp Mappings
The dot1p-to-exp mappings are used by the ingress LSR. When a non-MPLS ingress frame arrives at the MPLS module, the frame always contains an IEEE 802.1p priority field. The value of the priority field is set based on the QoS classification performed by the ingress I/O module. The ingress I/O modules assign each packet to a hardware queue, based on the configured ExtremeWare QoS policies. There is a one-to-one mapping between the hardware queue and the 802.1p priority values that are inserted into frames forwarded to the MPLS module. For example, the 802.1p priority value is set to 0 for frames forwarded from hardware queue 0, set to 1 for frames forwarded from hardware queue 1, and so on. The dot1p-to-exp table maps 802.1 priority values to MPLS EXP values. The table is completely flexible, such that any 802.1p priority <input_value> can be mapped to any EXP <output_value>. The EXP output_value is set in the MPLS header of the packet as it is forwarded to the MPLS network.
Exp-to-dot1p Mappings
The exp-to-dot1p mappings are used when the switch performs label swapping as an intermediate LSR and when the switch is the egress LSR. In both of these cases, the MPLS module receives an MPLS-encapsulated frame. The EXP field in the frame is used as an <input_value> to the exp-to-dot1p table. The corresponding <output_value> is an 802.1p priority value. The 802.1p priority value is inserted into the frame before the frame is forwarded by the MPLS module. The exp-to-dot1p table is completely flexible, such that any EXP <input_value> can be mapped to any 802.1p priority <output_value>.
600
The exp-to-dot1p table is also used by Packet over SONET (PoS) ports when classifying MPLS-encapsulated packets received from the SONET link. When a PoS port receives an MPLS-encapsulated packet from the SONET link, the packet is classified based on the EXP value in the MPLS shim header. The EXP value from the received frame is used as an index into the exp-to-dot1p mapping table to retrieve and 802.1p priority value. The frame is then assigned to a QoS profile, based on the retrieved 802.1p priority value. The mappings between 802.1p priority values and QoS profiles are configured using the following command:
configure dot1p type
NOTE For more information on QoS, see Chapter 7. For more information on the PoS module, see Chapter 23.
This command resets the following configuration parameters: IP-MTU LDP propagation filter settings on all VLANs LDP advertisement filter settings LDP session timers RSVP-TE interface parameters RSVP-TE profile parameters Settings for propagate-ip-ttl QoS mapping tables To restore the default values for the QoS mapping tables, use the following command:
unconfigure mpls qos-mapping [dot1p-to-exp | exp-to-dot1p]
The default contents of either QoS mapping table maps an input value of n to an output value of n.
601
When the vlan parameter is omitted, this command displays the values of all MPLS configuration parameters that apply to the entire switch, the current status of peer LSRs, and a list of the VLANs for which MPLS is enabled. When the vlan parameter is specified, this command displays the current values of the MPLS configuration parameters that are specific to the VLAN. If the optional detail keyword is specified, additional detailed VLAN information is displayed.
When the optional parameters are omitted, this command displays information for all of the configured MPLS VLAN interfaces. When the ldp, rsvp-te, or targeted-ldp parameters are supplied, this command will display only those interfaces of that type. When the vlan parameter is specified, this command displays the current values of the MPLS interface parameters that are specific to the VLAN.
This command displays information from the Forwarding Equivalence Class (FEC)-to-Next Hop Label Forwarding Entry (NHLFE) database. This command also displays information for RSVP-TE LSPs. If the host or prefix keywords are specified, summary information is displayed for a single FEC. Use the summary keyword to display summary route information associated with labeled paths. By default, the information displayed includes: Next hop IP address Outgoing label Interface number of the outgoing VLAN If the detail keyword is specified, the following additional information is displayed: Outgoing port number Counts of packets and bytes that have been transmitted using the database entry By default, information is displayed for active mappings. To display information for liberally-retained inactive mappings, use the inactive keyword. An inactive mapping is a mapping that was received from an LDP peer, but is not being used to reach the associated FEC. Using the inactive keyword causes inactive mappings to be displayed. The inactive keyword does not apply to RSVP-TE LSPs, because RSVP-TE operates in downstream-on-demand mode.
602
This command displays information from the Incoming Label Map (ILM), which is used when forwarding packets that arrive labeled as MPLS packets. When the label_number parameter is omitted, summary information is displayed for all incoming label assignments that have been made by the switch. When the label_number is specified, summary information is displayed for the label. Use the fec keyword to display the label associated with an FEC. You can specify both host and prefix FEC types. The summary keyword displays the number of labels allocated from each label range partition. By default, the information displayed includes: Next hop IP address Outgoing and incoming labels Interface number of the outgoing VLAN FEC associated with the incoming label If the detail keyword is specified, the following additional information is displayed: Outgoing port number Counts of packets and bytes that have been received with the incoming label Counts of packets and bytes that have been transmitted with the outgoing label LSP type This command also displays information from the Incoming Label Map (ILM) for RSVP-TE LSPs.
603
Overview of LDP
The Label Distribution Protocol (LDP) is a protocol defined by the IETF for the purpose of establishing an MPLS LSP. Using LDP, peer LSRs exchange label binding information to create the LSP.
Advertising Labels
You can control whether labels are advertised for: Direct routes RIP routes exported by OSPF Static routes exported by OSPF To conserve label space, the Implicit NULL Label is advertised for RIP and static routes exported by OSPF. The Implicit NULL Label is advertised for direct routes when PHP is enabled.
Propagating Labels
LDP propagates labels for FECs that exactly match a routing table entry, with the exception of mappings for 32-bit prefixes corresponding to OSPF router IDs (where the router ID IP addresses are dynamically learned from the advertising router field of received OSPF router and AS external LSAs).
Configuring LDP
This section describes the following tasks: Configuring LDP on a VLAN on page 605 Configuring LDP Filters on page 605 Configuring LDP Session Timers on page 606
604
Restoring LDP Session Timers on page 607 Displaying LDP Peer Information on page 607
This command enables LDP on one of all VLAN. If not specified, both LDP and RSVP-TE are enabled on the specified VLAN. To disable LDP on a VLAN, use the following command:
configure mpls delete vlan [<vlan name> | all] {ldp}
This command disables LDP on one or all VLANs. This command terminates all LDP sessions and all established LDP LSPs.
This command configures a filter to be used by LDP when propagating unsolicited label mappings to all LDP neighbors on the specified VLAN. If all VLANs are selected, the settings of this command apply to all MPLS-enabled VLANs. You can configure the propagation filter, as follows: allUnsolicited label mappings are propagated to the VLAN. This is the default setting. noneNo unsolicited label mappings are propagated to the VLAN. route-map <route_map>The specified route map is used to permit or deny the propagation of unsolicited label mappings to the VLAN. The only supported route map match operation keyword is nlri-list. If selected, the access_profile parameter of the nlri-list keyword is compared to the FEC that is associated with each label mapping. NOTE For more information on route maps, see the ExtremeWare Software Users Guide.
605
Configuring an LDP Label Advertisement Filter. To configure an LDP label advertisement filter, use the following command:
configure mpls ldp advertise [direct | rip | static] [all | none | route-map <route_map>]
This command configures a filter to be used by LDP when originating unsolicited label mapping advertisements to LDP neighbors. You can configure how the advertisement filter is applied, as follows: directThe advertisement filter is applied to the FECs associated with direct routes exported by OSPF. ripThe advertisement filter is applied to the FECs associated with RIP routes exported by OSPF. staticThe advertisement filter is applied to the FECs associated with static routes exported by OSPF. You can configure the advertisement filter, as follows: allAll unsolicited label mappings are originated for all routes of the specified type (direct, RIP, or static). This is the default setting for direct routes. noneNo unsolicited label mappings are originated for all routes of the specified type. This is the default setting for RIP and static routes. route-map <route_map>The specified route map is used to permit or deny the origination of unsolicited label mappings for all routes of the specified type. The only supported route map match operation keyword is nlri-list. If selected, the access_profile parameter of the nlri-list keyword is compared to the FEC that is associated with each route. RIP and static routes are advertised with the Implicit NULL label and direct routes are advertised with an MPLS label, unless PHP is enabled. You can control the number of labels advertised using the configure mpls ldp advertise command. Advertising labels for a large number of routes may increase the required number of labels that must be allocated by LSRs. Take care to insure that the number of labels advertised by LERs does not overwhelm the label capacity of the LSRs.
LDP session timers are separately configurable for LDP and targeted LDP sessions. The hello <hold_time> <interval_time> parameter specifies the amount of time (in seconds) that a hello message received from a neighboring LSR remains valid. If a hello message is not received from a particular neighboring LSR within the specified hello <hold_time>, the hello-adjacency is not maintained with that neighboring LSR. The session keep-alive <hold_time> <interval_time> parameter specifies the time (in seconds) during which an LDP message must be received for the LDP session with a particular peer LSR to be maintained. If an LDP PDU is not received within the specified session keep-alive <interval_time>, the corresponding LDP session is torn down.
606
The minimum and maximum values for both the hello <hold_time> <interval_time> and keep-alive <hold_time> <interval_time> are 6 and 65,534, respectively. The default values are as follows: ldp hello <hold_time> 15 targeted-ldp hello <hold_time> 45 ldp hello <interval_time> 5 targeted-ldp hello <interval_time> 15 ldp keep-alive <hold_time> 40 targeted-ldp keep-alive <hold_time> 60 ldp keep-alive <interval_time> 13 targeted-ldp keep-alive <interval_time> 20 This command can only be executed when MPLS is disabled.
This command displays information about the status of LDP peers. Summary information is displayed for all known LDP peers and LDP peer sessions. If you specify the <ipaddress> of the LDP peer, information for a single LDP peer is displayed. To display additional information in the comprehensive detailed format, use the detail keyword. By default the information displayed includes: Peer type (targeted or not targeted) Peer sessions Peer state Uptime If you specify the detail keyword, the following additional information is displayed: Discontinuity time Negotiated label distribution Next hop address
607
NOTE Multicast routing is not supported. An MPLS domain is generally defined to be an OSPF or IS-IS autonomous system (AS). You can use MPLS to reach destinations inside one of these AS types. You can also use MPLS to reach destinations outside of an OSPF AS.
608
Figure 132 illustrates the concept of direct and indirect LSPs. Figure 132: Direct and indirect LSPs
Subnet
30 31 32 33 34
Subnet
10.0.1.0/24
Direct LSPs
10.0.2.0/24
10.0.3.0/24
MPLS_17
Table 79 describes the label bindings in the MPLS forwarding table for LSR A that are maintained for FECs reachable via LSR A to LSR C, shown in Figure 132.
A direct LSP is always preferred over an indirect LSP. When a route table entry is added or updated, MPLS first checks for the existence of a direct LSP. If a direct LSP exists, the information is simply added to the route table entry at that time. Managing indirect LSP entries is more involved. The OSPF Shortest Path First (SPF) algorithm determines the availability of indirect LSPs through an egress router. The intra-area SPF algorithm begins with the calculating router as the root of a graph. The graph is expanded by examining the networks connected to the root and then the routers connected to those networks. Continuing in this manner, the graph is built as a series of parent and child nodes. A check is made for a direct LSP as each entry is added. A check is also made for an indirect LSP that can be inherited from the parent node. Thus, for each route table entry, the modified SPF algorithm determines whether a direct LSP is available and whether an indirect LSP is available for use whenever a direct LSP is not present. This design allows label mapping changes for direct LSPs to be managed without requiring an SPF recalculation. An SPF recalculation is performed when advertisements and withdrawals of label mappings for /32 FECs are received, which is analogous to the situation where an OSPF link changes state. The modification to the SPF algorithm described above is important, because it enables the capabilities provided by LDP or RVSP-TE LSPs to be fully utilized, while minimizing the resources devoted to label management.
609
For example, in a network where all the LSRs implement this feature (such as an all-Extreme MPLS network), labels only need to be advertised for the router IDs of the LSRs. Yet, LSPs can still be used to route traffic destined for any OSPF route. More specifically, LSPs can be used for all routes advertised by OSPF, with the possible exception of LDP LSPs to routes summarized by OSPF area border routers (ABRs). The problem with using routes summarized by OSPF ABRs is that route summarization can prevent label mappings from being propagated for the links internal to the area being summarized, since a LSR will typically only propagate labels for FECs that exactly match a routing table entry.
610
611
Configuration Example
The network configuration, shown in Figure 133, illustrates how to configure a BlackDiamond switch to support a routed MPLS network. Figure 133: MPLS configuration example
24 0/ 1. 1 . .0 n 11 vla
11
LSR 3
Router ID =11.0.3.11
vl
.3 an .0/2 4 3
.0
9.9.9.0/24 unc
12.12.12.0/24
LSR 1
Router ID =11.0.1.11
duke
.4 4 n vla
LSR 4
Router ID =11.0.4.11
LSR 2
Router ID =11.0.2.11
MPLS_18
The four switches, labeled LSR 1, LSR 2, LSR 3, and LSR 4, have the same physical hardware configuration. Each switch contains an F48ti module, a G8xi module, an MPLS module, and an MSMi module. The switches are all interconnected via Gigabit Ethernet to form the OSPF backbone area and the MPLS domain. In this example, two directly connected OSPF-disabled VLANs are shown: unc and duke. Traffic between unc and duke follows routed paths over indirect LSPs established between LSR 1 and LSR 4. The commands used to configure LSR 1 are described below. The remaining LSRs are configured similarly. The following commands configure the module types for the specific BlackDiamond slots:
configure slot 2 module f48t configure slot 3 module g8x configure slot 7 module mpls
The following command sets the maximum jumbo frame size for the switch chassis to 1600:
configure jumbo-frame size 1600
612
Configuration Example
The following commands configure the VLAN IP address and assign ports participating in each VLAN:
configure configure configure configure configure configure vlan vlan vlan vlan vlan vlan vlan1 ipaddress 11.0.1.1/24 vlan1 add port 3:2 untagged vlan2 ipaddress 11.0.2.1/24 vlan2 add port 3:3 untagged unc ipaddress 9.9.9.0/24 unc add port 2:24 untagged
The following commands enable IP packet forwarding for the specified VLANs:
enable ipforwarding vlan1 enable ipforwarding vlan2 enable ipforwarding unc
The following commands enable IP forwarding on the configured VLANs. The MTU size is increased on the MPLS VLANs to accommodate the MPLS shim header:
enable ipforwarding vlan vlan1 configure ip-mtu 1550 vlan vlan1 enable ipforwarding vlan vlan2 configure ip-mtu 1550 vlan vlan2 enable ipforwarding vlan unc
The following commands add vlan1 and vlan2 to the backbone area, each with a cost of 10. The 0.0.0.0 (backbone) area does not need to be created because it exists by default:
configure configure configure configure ospf ospf ospf ospf add vlan vlan2 area 0.0.0.0 vlan vlan2 cost 10 add vlan vlan1 area 0.0.0.0 vlan vlan1 cost 10
The following command enables distribution of local (direct) interfaces into the OSPF area:
enable ospf export direct cost 10 ase-type-1
The following commands configure the OSPF router ID on the switch and enable the distribution of a route for the OSPF router ID in the router LSA. Originating the router ID as a host route allows other routers in the same OSPF area to establish indirect LSPs for external routes to this router:
configure ospf routerid 11.0.1.11 enable ospf originate-router-id
613
614
26 Configuring RSVP-TE
This chapter describes the Resource Reservation Protocol (RSVP), traffic engineering (TE) extensions to RSVP, and how you configure RSVP-TE using ExtremeWare. This chapter covers the following topics: RSVP Elements on page 616 Traffic Engineering on page 620 RSVP Features on page 621 Configuring RSVP-TE on page 624 Configuration Example on page 630 RSVP is a protocol that defines procedures for signaling QoS requirements and reserving the necessary resources for a router to provide a requested service to all nodes along a data path. RSVP is not a routing protocol. It works in conjunction with unicast and multicast routing protocols. An RSVP process consults a local routing database to obtain routing information. Routing protocols determine where packets get forwarded; RSVP is concerned with the QoS of those packets that are forwarded in accordance with the routing protocol. Reservation requests for a flow follow the same path through the network as the data comprising the flow. RSVP reservations are unidirectional in nature, and the source initiates the reservation procedure by transmitting a path message containing a traffic specification (Tspec) object. The Tspec describes the source traffic characteristics in terms of peak data rate, average data rate, burst size, and minimum/maximum packet sizes. RSVP-TE is a set of traffic engineering extensions to RSVP. RSVP-TE extensions enable RSVP to be used for traffic engineering in MPLS environments. The primary extensions add support for assigning MPLS labels and specifying explicit paths as a sequence of loose and strict routes. These extensions are supported by including label request and explicit route objects in the path message. A destination responds to a label request by including a label object in its reserve message. Labels are then subsequently assigned at each node the reserve message traverses. Thus, RSVP-TE operates in downstream-on-demand label advertisement mode with ordered LSP control.
NOTE ExtremeWare does not support native RSVP. RSVP is supported only on TE LSPs.
615
Configuring RSVP-TE
RSVP Elements
This section describes the following elements of the RSVP protocol: Message Types on page 616 Reservation Styles on page 618 Bandwidth Reservation on page 618
Message Types
RSVP has two basic message types, path message and reserve message, as shown in Figure 134. Figure 134: RSVP Messages
Previous hops Data Path Resv Incoming interfaces Outgoing interfaces Data Path Resv Next hops
a Router
B'
D'
MPLS_27
In addition to the path and reserve messages, RSVP has the following additional message types: Path error message Reservation error message Path tear message Reserve tear message Reservation confirm message
Path Message
The RSVP path message is used to store state information about each node in the path. Each RSVP sender periodically transmits a path message downstream along the route for each data path. The path state includes, at minimum, the IP address of the previous hop node. This IP address is used to route the reserve message on a hop-by-hop basis, in the reverse direction. In addition to the previous hop address, the path message contains the sender Tspec and Adspec. The reservation message carries the flowspec.
616
RSVP Elements
Reservation Message
Each receiver host transmits an RSVP reservation request to its upstream neighbor. Reservation messages follow the reverse path that the data packets use. The reservation message creates and maintains a reservation state in each node on the path. Reservation messages are eventually delivered to the sender, so that the sender can configure appropriate traffic control parameters for the first hop node.
617
Configuring RSVP-TE
Reservation Styles
A reservation style is a set of options that is included in the reservation request. One reservation style concerns how reservations requested by different senders within the same session are handled. This type of reservation style is handled in one of two ways: either create a distinct reservation for each sender in the session, or use a single reservation that is shared among all packets of the selected senders. Another reservation style concerns how senders are selected. Again, there are two choices: an explicit list of all selected senders or a wildcard that implies all senders in the session. Table 80 describes the relationship between reservation attributes and styles
.
The following sections describe the three reservation styles: Fixed filter Shared explicit Wildcard
Fixed Filter
The fixed filter (FF) reservation style uses a distinct reservation and an explicit sender selection. A fixed filter reservation creates a distinct reservation for data packets for a particular sender.
Shared Explicit
The shared explicit (SE) reservation style uses a shared reservation and an explicit sender selection. A shared explicit reservation creates a single reservation that is shared by selected upstream senders. This style permits a receiver to specify the set of senders to be included. The Extreme MPLS implementation does not support SE reservation style.
Wildcard
The wildcard (WF) reservation style uses the shared reservation and wildcard sender options. A wildcard reservation creates a single reservation that is shared by data flows from all upstream senders. The Extreme MPLS implementation does not support WF reservation style.
Bandwidth Reservation
As mentioned previously, RSVP reservations are unidirectional in nature. The source initiates the reservation procedure by transmitting a path message containing a Sender Tspec object. The Tspec describes the source traffic characteristics in terms of peak data rate, average data rate, burst size, and minimum/maximum packet sizes. The path message can also contain an optional AdSpec object that is
618
RSVP Elements
updated by network elements along the path to indicate information such as the availability of particular QoS services, the maximum bandwidth available along the path, the minimum path latency, and the path maximum transmission unit (MTU). LSRs make a bandwidth reservation on a per-LSP basis. Only Controlled-Load1 service requests are supported. When bandwidth is requested, it is possible for the the LSP to be established, even when the requested bandwidth is not reserved. You must verify that the requested bandwidth was actually reserved. In cases when the bandwidth reserved is less than the amount requested, you can manually tear down the LSP and resignal it using a different path. CSPF is not supported. To specify a best effort LSP, configure the reserved bandwidth as zero.
Bandwidth Accounting
ExtremeWare RSVP-TE supports the accounting of bandwidth reserved. The available bandwidth specified in the Adspec object is not modified when the path message is forwarded to the LSP endpoint. As reserve messages are processed, the reserved bandwidth specified in the Flowspec is added to the total reserved bandwidth for the appropriate VLANs. LSP path message setup and hold priorities are not used to preempt previously established LSPs established through an Extreme LSR. ExtremeWare does not support SE style labels. Therefore, increasing the reserved bandwidth parameter for an LSP will force the LSP to be torn down. If the LSP is torn down, the LSP is resignaled with the new reserved bandwidth value. There are no guarantees that the LSRs along the path will be able to accommodate the increased bandwidth reservation request.
RSVP State
State is installed at each device traversed by the path message, but no resources are reserved. Among other things, the state identifies the adjacent RSVP nodes, which describes the path for the reservation. Resources are not actually reserved until the receiver responds to the path message with a reserve message. Upon receiving a path message, a destination may examine the Tspec and the AdSpec from the sender, in conjunction with local status/policy information, to determine the actual QoS specification that is to be included in the reserve message. The reserve message follows the reverse of the path established by the path message and the appropriate resources are reserved at each node. The state maintained by RSVP is temporary, or soft. Consequently, path and reserve messages must be periodically retransmitted to maintain an active reservation. Soft state is advantageous because it naturally adapts to changing network conditions, such as topology changes that alter the routed path for a flow. However, the increased control traffic load can be a scalability concern. For this reason, considerable work has been done towards reducing RSVP refresh overhead through the implementation of RFC 2961, RSVP Overhead Refresh Reduction Extensions. One aspect of RSVP refresh reduction enables a very long refresh timer by adding support for reliable delivery of RSVP control messages. Prior to refresh reduction, the refresh timer had to be relatively short to ensure timely reservation establishment in the event of a dropped packet. Further reductions are achieved through a mechanism called summary refresh, which involves transmitting only the message identifiers associated with the RSVP messages to be refreshed, instead of transmitting the entire unchanged contents of the RSVP messages, and bundling the message identifiers for multiple refresh operations into a single packet.
1.
619
Configuring RSVP-TE
Traffic Engineering
This section describes RSVP traffic engineering and the following topics: RSVP Tunneling on page 620 RSVP Objects on page 620
RSVP Tunneling
An RSVP tunnel sends traffic from an ingress node through an LSP. The traffic that flows through the LSP is opaque (or tunneled) to the intermediate nodes along the path. Traffic flowing through the tunnel to an intermediate node along the path is identified by the previous hop and is forwarded, based on the label value(s), to the downstream node. RSVP tunnels can: Establish tunnels with or without QoS requirements. Dynamically reroute an established tunnel. Observe the actual route traversed by a tunnel. Identify and diagnose tunnels. Use administrative policy control to preempt an established tunnel. Perform downstream-on-demand label allocation, distribution, and binding.
RSVP Objects
This section describes the RSVP objects that are used to establish RSVP-TE LSPs: Label Label request Explicit route Record route Session attribute
Label
The label object is carried in the reservation message and is used to communicate a next hop label for the requested tunnel endpoint IP address upstream to towards the sender.
Label Request
A label request object specifies that a label binding for the tunneled path is requested. It also provides information about the network layer protocol that is carried by the tunnel. The network layer protocol sent through a tunnel is not assumed to be IP and cannot be deduced from the layer-2 protocol header, which simply identifies the higher layer protocol as MPLS. Therefore, the layer-3 Protocol ID (PID) value must be set in the Label Request Object, so that the egress node can properly handle the tunneled data. Extreme switches only support the IP PID value (0x0800). To create an RSVP-TE LSP, the sender on the MPLS path creates an RSVP path message and inserts the label request object into the path message.
620
RSVP Features
Explicit Route
The explicit route object specifies the route of the traffic as a sequence of nodes. Nodes may be loosely or strictly specified. The explicit route object is used by the MPLS sender if the sender knows about a route that: Has a high likelihood of meeting the QoS requirements of the tunnel Uses the network resources efficiently Satisfies policy criteria If any of the above criteria are met, the sender can decide to use the explicit route for some or all of its sessions. To do this, the sender node adds an explicit route object to the path message. After the session has been established, the sender node can dynamically reroute the session (if, for example, if discovers a better route) by changing the explicit route object.
Record Route
The record route object is used by the sender to receive information about the actual route traversed by the RSVP-TE LSP. It is also used by the sender to request notification if there are changes to the routing path. Intermediate or transit nodes can optionally use the RRO to provide loop detection. To use the object, the sender adds the record route object to the path message.
Session Attribute
The session attribute object can also be added to the path message. It is used for identifying and diagnosing the session. The session attribute includes the following information: Setup and hold priorities Resource affinities Local protection
RSVP Features
This section covers the following features of RSVP: Route recording Explicit route path LSPs Redundant LSPs Improving LSP scaling
Route Recording
The route a path takes can be recorded. Recording the path allows the ingress LER to know, on a hop-by-hop basis, which LSRs the path traverses. Knowing the actual path of an LSP can be especially useful for diagnosing various network issues.
621
Configuring RSVP-TE
Network path recording is configurable per LSP. If enabled, the record route object (RRO) is inserted into the path message using a single RRO subobject, representing the ingress LER. When a path message is received by an Extreme LSR that contains an RRO, an RRO IPv4 subobject representing the /32 address of the outgoing interface of the path message is pushed onto the top1 of the first RRO. If the setup of an LSP originates from an Extreme LER for which route recording is enabled, the path message is originated with an RRO containing a single RRO subobject specifying the outgoing interface address of the path message. A similar RRO is constructed as the RESV message goes from egress node to ingress node. The label recording flag is not supported by Extreme LSRs. This flag instructs all LSRs along the LSP to include the advertised downstream label in a label object as part of the RRO. If an Extreme LSR receives a path message with the label recording flag set in the RRO, the LSR does not push a label subobject onto the RRO. If a path message is received that contains an RRO, the Extreme LSR uses the RRO to perform loop detection. The RRO is scanned to verify that the path message has not already traversed this LSR. If the RRO contains an IPv4 subobject that represents a local LSR interface, the path message is dropped and a Routing Problem error message is sent to the originating LER with an error value of Loop detected.
Redundant LSPs
Two methods are available for provisioning redundant RSVP-TE LSPs at the ingress LER. The first uses the concept of secondary or backup LSPs and the second relies on equal-cost LSP route metrics. Redundant RSVP-TE LSPs can be configured to provide alternate paths in the event that the primary path fails. Secondary paths are fully provisioned preestablished RSVP-TE LSPs that are maintained as inactive TE /32 routes to the path endpoint. If the primary path is torn down, the primary path TE /32 route is removed from the routing table, and a TE /32 route representing one of the active secondary
1. RRO is organized as a LIFO stack.
622
RSVP Features
paths is installed as the preferred path for the LSP. If multiple secondary are paths available, the secondary path is randomly selected. If the primary path is reestablished, the primary path TE /32 route is reinstalled as the preferred path. Stateful failovers can be managed by configuring only secondary paths for an LSP. When no primary paths are configured for an LSP, a TE /32 route representing one of the secondary paths is installed in the route table. If the secondary path fails, for which a TE /32 route has been installed in the route table, another secondary TE /32 route representing separate path is installed in the route table (provided one is configured and active). Secondary path TE /32 routes remain the preferred route unless a primary path is configured for the LSP, the active secondary path fails, or the active secondary path is deleted. Thus, no switch-back to the original secondary path is performed if the original secondary path fails and is later reestablished. Parallel RSVP-TE LSPs can exist to the same endpoint. Parallel LSPs exist when multiple paths are configured to the same egress LSR, with each LSP having a configured metric that is less than, or equal to, the interior gateway protocol (IGP) metric. In both cases, a TE /32 route to the egress LER is installed in the route table of the ingress LER for all of the best equal-cost RSVP-TE paths. Traffic is distributed across up to four TE /32 routes based on a MAC and IP address hash algorithms. If one of the LSPs fail, the traffic is redistributed across the remaining active LSPs. In this example, no LSP secondary paths are required.
623
Configuring RSVP-TE
Configuring RSVP-TE
This section describes the following tasks: Configuring RSVP-TE on a VLAN on page 624 Configuring RSVP-TE Protocol Parameters on page 624 Configuring an RSVP-TE Path on page 625 Configuring an Explicit Route on page 626 Configuring an RSVP-TE Profile on page 627 Configuring an Existing RSVP-TE Profile on page 628 Configuring an RSVP-TE LSP on page 628 Adding a Path to an RSVP-TE LSP on page 629 Displaying RSVP-TE LSP Configuration Information on page 629 Displaying the RSVP-TE Routed Path on page 630 Displaying the RSVP-TE Path Profile on page 630 Displaying the RSVP-TE LSP on page 630
This command disables RSVP-TE on one or all VLANs. Deleting RSVP-TE causes all TE LSPs to be released, and prevents TE LSPs from being established or accepted on the specified VLAN.
This command configures the RSVP-TE protocol parameters for the specified VLAN. The RSVP-TE keyword all indicates that the configuration changes apply to all RSVP-TE enabled VLANs. The hello-interval time specifies the RSVP hello packet transmission interval. The RSVP hello packet is used by the switch to detect when a RSVP-TE peer is no longer reachable. If an RSVP hello packet is not received from a peer with [hello-interval * keep-multiplier] seconds, the peer is declared down and all RSVP sessions to and from that peer are torn down. The default hello-interval time is zero, indicating that RSVP hellos are not enabled. The hello-interval may be set to any value between zero and 60 seconds. The refresh-time parameter specifies the interval for sending refresh path messages. RSVP refresh messages provide soft state link-level keep-alive information for previously established paths and
624
Configuring RSVP-TE
enables the switch to detect when an LSP is no longer active. RSVP sessions are torn down if an RSVP refresh message is not received from a neighbor within [(keep-multiplier + 0.5) * 1.5 * refresh-time] seconds. The default refresh-time is 30 seconds and the default keep-multiplier value is three. The minimum and maximum refresh-time values are one and 36,000 seconds (or ten hours) respectively. The minimum and maximum keep-multiplier values are one and 255 respectively. The bundle-time, specified in tenths of a second, indicates the maximum amount of time a transmit buffer is held so that multiple RSVP messages can be bundled into a single PDU. The default bundle-time is zero, indicating that RSVP message bundling is not enabled. The bundle-time value may be set to any value between zero and 30 (or 3 seconds). The summary-refresh-time, specified in tenths of a second, indicates the time interval for sending summary refresh RSVP messages. The summary-refresh-time must be less than the configured refresh-time. The default summary-refresh-time is zero, indicating that no summary refresh RSVP messages are sent. The summary-refresh-time value may be set to any value between zero to 100 (or 10 seconds). If configured, the bundled and summary refresh RSVP messages are only sent to RSVP-TE peers supporting RSVP refresh reduction.
The <path_name> and <ipaddress> or <host_name> must be specified for the path. The <path_name> parameter is a character string that is to used to identify the path within the switch. The <path_name> string must begin with an alphabetic character, and may contain up to 31 additional alphanumeric characters. Each <path_name> represents a routed path to a single IP destination. If the <host_name> is specified, the DNS client on the switch must be configured so that the <host_name> can first be resolved to an IP address. Alternate routed paths to the same IP destination may be configured by adding additional <path_names> and specifying the same <ipaddress> or <host_name> as the path endpoint. The RSVP-TE path is not signaled until an LSP is added with the specified <path_name>. If no explicit route objects are configured, the path will follow the best-routed path to the configured <ipaddress> (or IP address obtained from DNS name resolution). Optionally, the from keyword can be used to specify the <local_endpoint_vlan> from which the path is signaled. The maximum number of configurable paths is 255. To delete an RSVP-TE path, use the following command:
configure mpls rsvp-te delete path [<path_name> | all]
This command deletes a configured MPLS RSVP-TE routed path with the specified <path_name>. All associated configuration information for <path_name> is deleted. A path cannot be deleted as long as the <path_name> is associated with an LSP. If the all keyword is specified, all paths not associated with an LSP are deleted.
625
Configuring RSVP-TE
This command adds an IP address to the explicit route object (ERO) for the specified path name. The RSVP-TE routed path may be described by a configured sequence of the LSRs and/or subnets traversed by the path. Each defined LSR or subnet represents an ERO subobject. Up to 64 subobjects can be added to each path name. When specifying an LSR using the <host_name> parameter, the DNS client on the switch must be configured so that the <host_name> can first be resolved to an IP address. The ipaddress keyword identifies an LSR using either a /32 address, which may represent an LSR router ID, loopback address, or direct router interface, or an IP prefix, which represents a directly connected subnet. Each IP address or prefix is included in the ERO as an IPv4 subobject. If the IP address is specified as strict, the strict subobject must be topologically1 adjacent to the previous subobject as listed in the ERO. If the IP address is specified as loose, the loose subobject is not required to be topologically adjacent to the previous subobject as listed in the ERO. If omitted, the default subobject attribute is loose. Each IP address or prefix is included in the ERO as an IPv4 subobject. If the subobject matches a direct router interface or a directly attached subnet, the switch verifies that the path message is received on the matching router interface. If the LSR specified matches the OSPF router ID or a configured loopback IP address, the router interface which the packet is received is ignored. The LSR path order is optionally specified using the order keyword. The order number parameter is an integer value from 1 to 65535. IP prefixes with a lower number are sequenced before IP prefixes with a higher number. You can specify multiple paths and assign them an order number. The order number determines the path that the LSP follows. Thus, the LSP path follows the configured path of the IP prefix with the order value from low to high. If the order keyword is not specified, the number value for the LSR defaults to a value 100 higher than the current highest number value. If the list of IP prefixes, added to the path, does not reflect an actual path through the network topology, the path message is returned with an error from a downstream LSR and the LSP is not established. The order of a configured subobject can not be changed. The ERO subobject must be deleted and re-added using a different order. If a subobject is added to or deleted from the ERO while the associated LSP is established, the path is torn down and is resignaled using the new ERO. Duplicate ERO subobjects are not allowed. Defining an ERO for the path is optional. If you do not configure an ERO, the path is signaled along the best-routed path and the ERO is not included in the path message. When the last subobject in the ERO of the path message is reached and the egress IP node of the path has not been reached, the remaining path to the egress node is signaled along the best-routed path. Specification of an ERO could lead to undesirable routed paths, so you should be careful when terminating the ERO routed-path definition prior to the configured path egress node.
1.
The LSP next hop matches either the interface IP address or the OSPF router-id of the immediate neighbor LSR.
626
Configuring RSVP-TE
This command deletes an LSR or subnet from the ERO for the specified path name. The LSR is specified using the ipaddress, <host_name>, or order parameter. If an LSR is deleted from an ERO while the associated LSP is established, the path is torn down and is resignaled using a new ERO. Use the all keyword to delete the entire ERO from the path name. When there is no configured ERO, the path is no longer required to take an explicit routed path. The path is then signaled along the best-routed path and no ERO is included in the path message.
A profile is a set of attributes that are applied to the LSP when the LSP is configured using the configure mpls rsvp-te add lsp command. A default profile is provided which cannot be deleted, but can be applied to any configured LSP. The profile name for the default profile is default. The default profile parameter values are initially set to their respective default values. The maximum number of configurable profiles is 255 (one of which is reserved for the default profile). The bandwidth parameter specifies the desired reserved bandwidth for the LSP. Any positive integer bps value is valid. Optionally, you can append the characters, k for kilobits, m for megabits, or g for gigabits, to the bps value to specify the unit of measure. If the k, m, or g, character is omitted, the unit of measure is assumed to be kilobits. The default bandwidth bps value is zero, which indicates that the QoS for the LSP is best effort. ExtremeWare does not support bandwidth reservation. The setup-priority and hold-priority are optional parameters indicating the LSP priority. During path set up, if the requested bandwidth cannot be reserved through the LSR, the setup-priority parameter is compared to the hold-priority of existing LSPs to determine if any of the existing LSPs need to be preempted to allow a higher priority LSP to be established. Lower numerical values represent higher priorities. The setup-priority range is 0 to 7 and the default value is 7. The hold-priority range is also 0 to 7 and is set equal to the setup-priority by default. ExtremeWare does not support LSP preemption. The retry-timeout keyword specifies the maximum number of seconds the switch allows for LSP setup. If the LSP cannot be established within retry-timeout seconds, the LSP is resignaled. The default value for retry-timeout is 30 seconds with a configurable range of 5 to 600 seconds. The hop-count parameter limits the number of LSRs the path can traverse, including the ingress and egress router. The default hop-count value is 255 with a configurable range of two to 255. After an LSP has established, the egress LSR may be optionally pinged to determine end-to-end path connectivity. If a ping response is not received within [2 * ping-interval 1] seconds, the LSP is considered unavailable. The ping-interval keyword specifies how frequently an ICMP echo request is transmitted to the egress LSR IP address on the established LSP. The default ping-interval is zero, which indicates no end-to-end LSP health checking is performed. You can set the ping-interval value to any interval between 0 and 60 seconds.
627
Configuring RSVP-TE
The route metric is used to determine if an established RSVP-TE LSP will actually be used to send data. Whenever the configured metric is less than, or equal, to the calculated IGP metric, the LSP is used for sending routed IP traffic. In this case, the LSP is also used to send TLS data when the TLS tunnel is configured by specifying the tunnel LSP endpoint IP address. Traffic is distributed across up to four equal-cost LSPs. The valid metric values range from 1 to 65535. Specifying the igp-tracking keyword forces the route metric to track the underlying IGP metrics. If no IGP metric exists for the LSP (for example, the LSP traverses a RIP network), the metric is ignored. Tracking IGP metrics is the default behavior. The record keyword is used to enable hop-by-hop path recording. The enabled keyword causes the record route object (RRO) to be inserted into the path message. The RRO is returned in the reserve message and contains a list of IPv4 subobjects that describe the RSVP-TE path. Path recording by default is disabled. When disabled, no RRO is inserted into the path message. To delete an RSVP-TE path profile, use the following command:
configure mpls rsvp-te delete profile [<profile_name> | all]
This command deletes a configured RSVP-TE profile with the specified profile name. The default profile cannot be deleted. If a profile is associated with a configured LSP, the profile cannot be deleted. If you specify the all keyword, all profiles not associated with an LSP are deleted (except for the default profile).
This command configures RSVP-TE attributes for the specified profile. The <profile_name> must have been previously added. All of the LSP profile values are updated dynamically. For LSPs configured with this profile, the LSP parameters are updated automatically with the sending of the next refresh path message. If the metric is changed, all LSPs using this profile are rechecked against the calculated IGP metric. In some cases, the LSP may be torn down because of a profile configuration change. For example, if the bandwidth value is increased, the LSRs along the existing path may not be able to accommodate the additional reserved bandwidth. In this scenario, the LSP is torn down and resignaled.
Both the <lsp_name> and <path_name> must be specified. The <lsp_name> parameter is a character string that is to be used to identify the LSP within the switch. The <lsp_name> string must begin with an alphabetic character and can contain up to 31 additional alphanumeric characters. The <profile_name> is optional. If omitted, the default profile is applied to the LSP. The LSP is immediately signaled as soon as it is configured. The maximum number of configurable LSPs is 1024. To delete an RSVP-TE LSP, use the following command:
configure mpls rsvp-te delete lsp [<lsp_name> | all]
628
Configuring RSVP-TE
Deleting an LSP name disassociates all configured paths with this LSP and all configuration information for the LSP name is deleted. LSPs cannot be deleted if the specified <lsp_name> has been configured as the LSP for a TLS tunnel. If you specify the all keyword, all LSPs not associated with a TLS tunnel are deleted.
The <lsp_name> must represent a configured LSP. Only one primary path and up to two secondary paths can be added per <lsp_name>. The <path_name> specified defaults to primary when no primary path has been configured for <lsp_name> and defaults to secondary if the primary path has been previously configured for <lsp_name>. You do not need to configure the primary path for an LSP. Each <path_name> added to an <lsp_name> must be unique, but a <path_name> can be associated with multiple LSP names. All configured primary and secondary paths for the <lsp_name> must have the same endpoint IP address. For example, three paths can be configured for the <lsp_name>, but all paths should represent different topological paths through the network to the same LSP endpoint. Adding a secondary <path_name> designates a path as a hot-standby redundant path, used in the event that the primary or secondary path cannot be established or fails. Provided the <path_name> has not already been established, all path names are signaled as soon as they are associated with an <lsp_name>. If the primary <path_name> fails, is not configured, or cannot be established after the specified LSP retry-timeout, one of the configured secondary paths may become the active path for <lsp_name>. All of the secondary paths have equal preference; the first one available is chosen. If at any time the primary path is established, <lsp_name> immediately switches to using the primary path. If a secondary path fails while in use, the remaining configured secondary paths can become the active path for <lsp_name>. To delete a path from an RSVP-TE LSP, use the following command:
configure mpls rsvp-te lsp <lsp_name> delete path <path_name>
When you issue this command, the LSP associated with the path is immediately torn down. If the deleted path represents the in-use LSP for <lsp_name> and another secondary path is configured, the LSP immediately fails over to an alternate LSP. Because at least one path must be defined for each LSP, the last configured path cannot be deleted from the LSP.
This command displays information about the status of RSVP-TE enabled interfaces. Summary information is displayed for all known RSVP-TE peers including the peer IP address and peer status. If you specify the ipaddress of the RSVP-TE interface, the information for a single RSVP-TE interface is displayed. Additional information is displayed in the detailed format if you specify the optional detail keyword. The more detailed RSVP-TE information includes the number and type of RSVP messages transmitted through the local RSVP-TE interface.
629
Configuring RSVP-TE
This command displays the configuration and status information for MPLS RSVP-TE routed paths. Information is listed in tabular format and includes the path name, path endpoint LSR IP address, and local VLAN (if configured). If the path endpoint is specified as a host name, the host name and the DNS resolved IP address are both displayed. If a specific path name is specified, only information for the specified path is displayed. If you specify the optional detail keyword, the list of subobjects specified for the explicit route object and any LSPs that are configured to use the path are displayed.
By default, this command displays all configured profile parameters for the specified profile. If the profile name is omitted, the profile parameter values for all configured LSP profiles are displayed.
This command displays the configuration and status information for RSVP-TE LSPs. Information is listed in tabular format and includes the LSP name, LSP state, active path name, bandwidth requested, bandwidth actually reserved, ERO flag, egress LSR, LSP up-time, and RSVP error codes (if LSP setup failed). If you specify a specific LSP name, only information for the specified LSP is displayed. If you specify the optional detail keyword, additional information is displayed for each LSP. The detailed information includes a list of all configured paths, including the path state, error codes for the LSP associated with each path, up-time for each LSP, the RRO (if enabled) for each LSP, the bound profile name, and a list of TLS tunnels configured to use the LSP.
Configuration Example
RSVP-TE LSPs comprise profiles, paths, and the actual LSP. This section describes how to configure an RSVP-TE LSP. Configuring RSVP LSPs is a multi-step process with some optional steps, depending on the specific requirements of the LSP. Conceptually, a number of mandatory elements must be configured to create an RSVP-TE LSP. In addition, you can also configure optional elements. In certain configurations, there are also order dependencies. The profile contains constraints that you wish to apply to the LSP. These constraints may affect the path selected across the MPLS domain in order to meet. Examples of profile parameters include bandwidth, setup, and hold priority relative to other configured LSPs. The path can be used to specify the local and remote endpoints for the LSP and, optionally, the explicit path across the MPLS domain that the LSP should follow.
630
Configuration Example
The ERO is an object, sent as part of the LSP setup request (path message), explicitly specifies the path across the MPLS domain the setup request should follow. You can configure a loose or strict path. Certain elements of configuration are order dependent. For example if you specify a profile or path when creating an LSP, those path or profile definitions must already exist. Similarly a path must exist before an ERO is created, as the ERO is added explicitly to the path. The typical steps used to configure and verify an RSVP-TE LSP are as follows: 1 Configure a path (mandatory). 2 Configure a profile (optional). 3 Configure an ERO for a path (optional). 4 Configure a primary/secondary LSP (mandatory). 5 Add a secondary LSP (optional). 6 Verify LSP status (recommended). Figure 135: RSVP-TE Configuration Example
Pr
SP
im
yL
17
ar
0/3
yL
2.2
ar im
3.2
SP
5.2
Pr
5.2
3.3
2.2
6/3
17
172.25.23.8/30
17
17
2. 25
.2 3
Oxford University
Oxford University
.2 8
0 /3 32
/3
Se co nd a ry
0
3.
The configuration example, shown in Figure 135, creates primary and secondary LSP between the node Glasgow and and the node Birmingham. The steps specifically create an LSP between Glasgow and Birmingham based on an explicitly routed path via London with bandwidth, and setup and hold priority profile requirements. A secondary path is also created which, in the event of failure of a link or
.2 25 2.
ar y LS P
MPLS_24
631
Configuring RSVP-TE
node on the primary path, activates the secondary path for the LSP. This path is Glasgow, Birmingham via Liverpool.
NOTE An initial step of adding RSVP-TE to a VLAN must be carried out for all VLANs over which the user wishes RSVP-TE LSPs to be signaled. This is a one-time operation. The following commands add RSVP signaling capabilities to the specified VLANs:
configure mpls add vlan gla-lon rsvp-te configure mpls add vlan gla-liv rsvp-te
The following commands create an LSP profile named Glasgow-Birmingham-pro. LSPs that use the Glasgow-Birmingham-pro profile are signaled with a reserved bandwidth of 10 Mbps and an LSP setup and hold priority of 5.
configure mpls rsvp-te add profile Glasgow-Birmingham-pro bandwidth 10m setup-priority 5 hold-priority 5
The following commands define the primary and secondary paths between Glasgow and Birmingham. The paths are defined such that they originate from a loopback VLAN called loop and terminate at the endpoint 4.0.0.0.
configure mpls rsvp-te add path Glasgow-Birmingham-pri-path 4.0.0.0 from loop configure mpls rsvp-te add path Glasgow-Birmingham-sec-path 4.0.0.0 from loop
The following commands strictly pin each path to an LSR, such that each path takes a different route to the endpoint 4.0.0.0. Path Glasgow-Birmingham-pri-path is routed through LSR 1.0.0.0 and path Glasgow-Birmingham-sec-path is routed through LSR 5.0.0.0.
configure mpls rsvp-te path Glasgow-Birmingham-pri-path add ero ipaddress 1.0.0.0 strict configure mpls rsvp-te path Glasgow-Birmingham-sec-path add ero ipaddress 5.0.0.0 strict
The following commands configure two RSVP-TE LSPs; one is the primary and the other is a secondary or backup LSP. Each LSP uses the same profile but different paths.
configure mpls rsvp add lsp Glasgow-Birmingham-lsp path Glasgow-Birmingham-pri-path Glasgow-Birmingham-pro primary configure mpls rsvp lsp Glasgow-Birmingham-lsp add path Glasgow-Birmingham-sec-path Glasgow-Birmingham-pro secondary
NOTE The secondary LSP is signaled, however it remains in a standby state unless the primary path becomes unavailable. By default, a TLS tunnel flows over any available LSP. However, a TLS tunnel can be specifically directed to use a configured RSVP-TE based LSP. Configuration is no different from configuring an LDP-based TLS tunnel, except that the RSVP-TE LSP is explicitly specified. The following command specifically directs the TLS tunnel to use a previously configured RSVP-TE:
632
Configuration Example
configure mpls add tls-tunnel Glasgow-Birmingham-cust1 lsp Glasgow-Birmingham-lsp oxford-university vcid 50 from 2.0.0.0
633
Configuring RSVP-TE
634
This chapter describes Layer-2 VPN services and the following topics: Overview of MPLS Layer-2 VPNs on page 635 TLS VPN Characteristics on page 638 Configuring MPLS Layer-2 VPNs on page 638 TLS VPN Configuration Examples on page 642 Using ESRP with MPLS TLS on page 646
635
MPLS VC Tunnels
MPLS virtual circuit (VC) tunnels are logical connections between two LERs over an LSP. Like ATM VCs, these connections can be signaled ( dynamic) or statically configured. Dynamic TLS tunnel connections are commonly referred to as VC tunnels, because the TLS tunnel label is signaled based on the configured VC identifier (vcid). The signaled VC label is used to create a two-label stack LSP. The outer label is the LSP label obtained from LDP or RSVP-TE and the inner label is the signaled VC label. LERs also signal the VC type when attempting to establish a VC tunnel. Extremeware only supports the VLAN VC type and reject all other VC types, including the Ethernet VC type used to signal Ethernet port service. VLAN type VC tunnels are also referred to as TLS tunnels. Static TLS tunnels are not signaled. The ingress and egress VC label for each TLS tunnel must be configured at each end of the tunnel. Both static and dynamic TLS tunnels can be configured simultaneously, but both share the same 16K TLS LER label space partition.
LSP Selection
By default, a TLS tunnel will use any available LSP to the TLS tunnel endpoint IP address. If there are multiple equal cost LSPs, the TLS tunnel is load shared across up to four LSPs. Optionally, a TLS tunnel can be configured to use a specific RSVP-TE LSP. If the RSVP-TE LSP metric is set higher than its
636
underlying IGP metric, the LSP is not used to forward normal routed IP and is only used to forward TLS VLAN traffic.
MAC Learning
Learned MAC addresses are associated with the TLS tunnel from which the packet was received. The learned MAC address is always inserted into the FDB as though it was learned on the local VLAN (and not the VLAN identified in the dot1q tag in the received TLS tunnel packet). MAC addresses learned from TLS tunnels use the same FDB aging timers as those MAC addresses learned on Ethernet interfaces. Any MAC address associated with a TLS tunnel is automatically cleared from the FDB when the VC label for the TLS tunnel is withdrawn. MAC addresses may appear to move between TLS tunnels. This can occur for various legitimate reasons. The FDB aging timers will clear stale MAC entries, but in certain redundant configurations, it is possible for MAC addresses to become associated with an incorrect TLS tunnel. To prevent these scenarios from causing lengthy connectivity interruptions, the Extreme switch relearns source MAC addresses on all received packets and withdraws VC labels for the associated TLS tunnels when a local TLS VLAN goes down. By always relearning MAC addresses, MAC addresses are more likely to be associated with the correct TLS tunnel. Withdrawing a VC label when a local TLS VLAN goes down forces the remote LSR to remove stale MAC addresses from its FDB associated with the TLS tunnel of the withdrawn VC label. Thus, all egress LERs are assured of relearning the new location of any MAC address that may have been previously associated with the down VLAN. If the VC label was withdrawn due to a down local TLS VLAN, the VC label is readvertised when at least one other local TLS VLAN port becomes active.
637
is using an LDP established LSP, provided there are parallel routed paths to the TLS tunnel endpoint, the TLS tunnel will automatically shift from a withdrawn or failed LSP to the next best available LSP. For tunnel LSPs established using RSVP-TE, secondary LSPs can be configured that can be hot-swapped in the event of a primary LSP failure. Thus, even though the underlying tunnel LSP may have changed, the Layer-2 VPN data plane remains unaffected.
To add a dynamic labeled TLS tunnel (martini-draft compliant), use the following command:
638
configure mpls add tls-tunnel <tunnel_name> [lsp <lsp_name> | <ipaddress> | <host_name>] <local_vlan_name> vcid <vcid> {<groupid>} {from [<local_endpoint_ipaddress> | <local_endpoint_vlan>]} {mode [core | spoke]}
The <tunnel_name> parameter is a character string that is to be used to identify the TLS tunnel within the switch. It must begin with an alphabetic character and can contain up to 31 additional alphanumeric characters. The <ipaddress> parameter identifies the peer LSR that is the endpoint of the tunnel. This IP address should be configured with a 32-bit prefix on the peer LSR. When the peer LSR is also an Extreme switch, either OSPF must also be enabled on the VLAN to which the IP address is assigned (using the configure ospf add vlan command on the peer switch), or the peer switch must be configured to distribute direct routes into the OSPF domain (using the enable ospf export direct command). The ospf export command should be used when the tunnel LSP needs to cross OSPF area boundaries or when ESRP is enabled on the VLAN to which the IP address is assigned. The TLS tunnel peer may also be specified with the host_name parameter. If the tunnel peer LSR is specified using this parameter, the DNS client must be configured so that the host name can first be resolved to an IP address. TLS tunnel endpoints that begin with an alphabetic character are assumed to be host names and DNS resolution is attempted. The <lsp_name> parameter can be used to explicitly identify the RSVP-TE LSP path to the egress TLS LSR. When an LSP name is specified, a targeted LDP session is established across the specified RSVP-TE LSP. The LSP endpoint specified by the associated path is used as the endpoint for the targeted LDP session. The <local_vlan_name> parameter identifies the Layer-2 traffic that is to be transported. All of the local traffic received by the switch for this VLAN is transported across the tunnel. The tls-labels parameters specify the innermost labels of the tunnel label stack and are used to configure static TLS label tunnels. The <egress_label> is inserted into the MPLS header of Layer-2 frames forwarded onto the tunnel LSP by this switch, and must be meaningful to the peer TLS node. All traffic received from the tunnel LSP that contains the <ingress_label> is forwarded to the local VLAN identified by the <local_vlan_name> parameter. When ingress traffic is forwarded to the local VLAN, the VLAN ID is set to the VLAN ID of the local VLAN, without regard to the VLAN ID in the MAC header of the frame received from the tunnel LSP. Thus, there is no requirement that all sites of an extended VLAN be configured to use the same VLAN ID. This can simplify network management in some situations. The tls-labels parameters are specified using hexadecimal notation. The value of the ingress_label parameter must be unique within the switch (the same <ingress_label> value cannot be used for two different tunnels). The valid range of the ingress label parameter is [8C000..8FFFF]. The valid range of the <egress_label> parameter is [00010..FFFFF]. If the peer LSR is also an Extreme switch, then the <egress_label> must be in the range [8C000..8FFFF]. Because LSPs are unidirectional in nature, coordinated configuration is required at both tunnel endpoint switches. The <egress_label> at one tunnel endpoint switch must match the <ingress_label> at the other tunnel endpoint switch, and vice versa. The <vcid> and <groupid> parameters are used to configure dynamic TLS tunnels when full martini-draft TLS tunnel compliance is desired. The vcid and groupid values are advertised on a targeted LDP session to the specified tunnel endpoint IP address in a martini-draft defined FEC-TLV. Each LER advertises the vcid, groupid, and VLAN label in the Label Mapping message across an LDP
639
session. This three-tuple TLS tunnel information allows each egress LER to dynamically bind the TLS tunnel to a local VLAN. The vcid is a non-zero 32-bit ID that defines the tunnel connection and the optionally specified groupid is a 32-bit value that defines logical virtual tunnel connection group. The groupid value defaults to zero if not explicitly configured. The optional from parameter defines the <local_endpoint_ipaddress> from which the dynamic TLS tunnel is established. Since dynamic TLS tunnels must first establish an LDP session to the endpoint prior to exchanging tunnel vcid parameters, the TLS endpoint switch must be capable of accepting LDP Targeted Hello messages for the configured TLS tunnels targeted ipaddress. By default, the local_endpoint_ipaddress is the configured OSPF Router ID. The from parameter must be specified when dynamic TLS tunnels are used in conjunction with ESRP. The local_endpoint_ipaddress should be configured to match the local ESRP VLANs interface IP address. This allows dynamic TLS tunnels to properly fail over to the slave switch when both the master and the slave switch are configured with the same local_endpoint_ipaddress. Optionally, the local_endpoint_vlan may be specified in place of the local_endpoint_ipaddress. There is no TLS tunnel functional difference between these two configuration parameters. If the local_endpoint_vlan parameter is specified, the local endpoint IP address used for the TLS tunnel is the IP interface address of the specified local_endpoint_vlan. The optional mode parameter configures the broadcast and unknown packet-forwarding behavior for the TLS tunnel. The flood mode options are core and spoke. When two or more TLS tunnels are configured for the same TLS VLAN, each configured TLS tunnel and the local TLS VLAN are treated as separate bridge ports within a single L2 broadcast domain. When the mode is configured as spoke, all received flood traffic (for example, broadcast, multicast, and unknown unicast packets) is retransmitted out every TLS tunnel and the local TLS VLAN, except for the interface that the packet was received. When the mode is configured as core, flood traffic received from a TLS tunnel is forwarded to the local TLS VLAN and is flooded to all spoke TLS tunnels. Flood traffic received from the local TLS VLAN is retransmitted onto every TLS tunnel regardless of its configured mode. The default mode is core.
This command deletes the TLS tunnel with the specified tunnel name. Specify the <groupid> if you want to delete all TLS tunnels belonging to a specific group. Use the all keyword to delete all TLS tunnels.
This command displays configuration and status information for one or all TLS tunnels. The information displayed for each tunnel includes: The values of all configuration parameters for the tunnel. The current status of the tunnel LSP.
640
If the optional detail keyword is specified, TLS tunnel information is displayed using the comprehensive detail format. This format includes transmit and receive counts in terms of packets and bytes. If the optional summary keyword is specified, summary TLS tunnel counts are displayed. The summary counters displayed include the total number of active static and dynamic TLS tunnels. If the vlan <vlan name> keyword is specified, only information about TLS tunnels associated with this local VLAN are displayed If the sorted vcid keyword is specified, the dynamic TLS tunnels are displayed in ascending order based on their vcid. The example MPLS TLS network configuration provided is based on the routed MPLS network configuration shown in Figure 136.
641
24 0/ 1. 1 . .0 n 11 vla
11
LSR 3
Router ID =11.0.3.11
vl
.3 an .0/2 4 3
.0
9.9.9.0/24 unc
9.9.9.0/24 uncwilmington
TL
LSR 1
Router ID =11.0.1.11
.0 .4 vla .0/ n4 24
ST un
ne
LSR 4
Router ID =11.0.4.11
LSR 2
Router ID =11.0.2.11
MPLS_19
In this configuration example, a new VLAN, unc-wilmington, is configured on LSR 4, with a router interface of 9.9.9.1/24. Because TLS provides Layer-2 transport capabilities over MPLS, both TLS VLANs are part of the same IP subnet. Exporting of direct interfaces is disabled so that external OSPF routes are not exported into the backbone area. The commands used to create a TLS Tunnel between LSR 1 and LSR 4 follow. The following command creates a TLS tunnel to LSR 4 (11.0.4.11) for traffic originating from VLAN unc:
configure mpls add tls-tunnel rt40 11.0.4.11 unc tls-labels 8f001 8f004
The following command creates a TLS tunnel to LSR 1 (11.0.1.11) for traffic originating from VLAN unc-wilmington:
> configure mpls add tls-tunnel rt40 11.0.1.11 unc-wilmington tls-labels 8f004 8f001
642
11
11 4 /2 .0 .2 .0 an2 vl
ncsu
MPLS 1 RTR ID= 11.100.100.1
VC 13
MPLS 3 RTR ID= 11.100.100.3
VC 12
MPLS 2 RTR ID= 11.100.100.2
VC 14 VC 23
ncsu VC 34
MPLS 4 RTR ID= 11.100.100.4
ncsu VC 24
ncsu
MPLS_26 EW_093
Each of the following commands configure a TLS tunnel to an LER for which the VLAN ncsu has a PoP. In order for each TLS tunnel to become active, a matching TLS tunnel definition with the same VC ID must be configured on the target LER.
mpls1
configure mpls add tls t12 11.100.100.2 ncsu vcid 1 mode core configure mpls add tls t13 11.100.100.3 ncsu vcid 1 mode core configure mpls add tls t14 11.100.100.4 ncsu vcid 1 mode core
mpls2
configure mpls add tls t12 11.100.100.1 ncsu vcid 1 mode core configure mpls add tls t23 11.100.100.3 ncsu vcid 1 mode core configure mpls add tls t24 11.100.100.4 ncsu vcid 1 mode core
mpls3
configure mpls add tls t13 11.100.100.1 ncsu vcid 1 mode core configure mpls add tls t23 11.100.100.2 ncsu vcid 1 mode core configure mpls add tls t34 11.100.100.4 ncsu vcid 1 mode core
643
mpls4
configure mpls add tls t14 11.100.100.1 ncsu vcid 1 mode core configure mpls add tls t24 11.100.100.2 ncsu vcid 1 mode core configure mpls add tls t34 11.100.100.3 ncsu vcid 1 mode core
ncsu
MPLS 1 RTR ID= 11.100.100.1
VC 13
MPLS 3 RTR ID= 11.100.100.3
VC 12
MPLS 2 RTR ID= 11.100.100.2
VC 14
ncsu
MPLS 4 RTR ID= 11.100.100.4
ncsu
ncsu
MPLS_26
Each of the following commands configure a TLS tunnel to an LER for which the VLAN ncsu has a PoP. In order for each TLS tunnel to become active, a matching TLS tunnel definition with the same VC ID must be configured on the target LER.
mpls1
configure mpls add tls t12 11.100.100.2 ncsu vcid 1 mode spoke configure mpls add tls t13 11.100.100.3 ncsu vcid 1 mode spoke configure mpls add tls t14 11.100.100.4 ncsu vcid 1 mode spoke
mpls2
configure mpls add tls t12 11.100.100.1 ncsu vcid 1 mode spoke
644
mpls3
configure mpls add tls t13 11.100.100.1 ncsu vcid 1 mode spoke
mpls4
configure mpls add tls t14 11.100.100.1 ncsu vcid 1 mode spoke
OC-3 SONET
LSR 2
Router ID =11.0.2.11
MPLS_21
The configuration commands for this example follow. The following command configures the OC-3 module for slot 1:
configure slot 1 module oc3
The following command creates the VLAN that is used to configure the TLS tunnel for transparently transporting PPP traffic:
create vlan sonet
The following command adds port 1 of the OC-3 module in slot 1 to the sonet VLAN. There is a one-to-one mapping between SONET ports and SONET TLS VLANs, so each SONET TLS VLAN can have only a single SONET port, and no other port, as a member:
11
Router ID = 11.0.1.11
LSR 1
11 .0
4 /2 .0 .3 3 n vla
OC-3 SONET
LSR 4
Router ID = 11.0.4.11
11 vla
645
The following commands disable BCP mode and enable POS transparent mode on the OC-3 interface that is a member of the TLS VLAN:
configure ppp bcp off port 1:1 configure ppp pos transparent-mode on port 1:1
The following command creates the TLS tunnel to LSR 4 for SONET PPP traffic received on VLAN sonet:
configure mpls add tls-tunnel sonet 11.0.4.11 tls-vlan 8f002 8f005
The SONET configuration for LSR 4 is exactly the same as the configuration for LSR 1, but the TLS tunnel is targeted towards LSR 1, as follows:
configure mpls add tls-tunnel sonet 11.0.1.11 tls-vlan 8f005 8f002
SITE 1 (Hub)
LSR A (VLAN router) master LSR A1 (VLAN router) slave
LSP VLAN 3
. . .
SITE 2 (Spoke)
. . .
SITE 3 (Spoke)
. . .
SITE 4 (Spoke)
MPLS_09
ESRP is run over the Ethernet VLAN connecting the two hub-LSRs, and the redundant IP address configured for ESRP is also being used as the tunnel endpoint address. Using this configuration, the LSRs at the spoke sites automatically connect to the active hub-LSR and rapidly adapt to failures. If the master hub-LSR fails, ESRP activates the standby hub-LSR, which then responds by advertising a route and label mapping for the tunnel endpoint IP address.
646
The LSRs at the spoke sites receive the label mapping and begin using the new tunnel LSP. Loopback mode should not be enabled when ESRP is being used to provide redundancy and ESRP should not be enabled on a VLAN that is expected to exchange routes with other non-ESRP routers (for example, routers using RIP or OSPF).
CUSTOMER SITE 1
TLS command issued on LSR A & LSR B: config mpls add tls-tunnel tls1 IPT2 user tls-labels 8f002 81001
MPLS NETWORK
LSR C ESRP master IPU2 IPT2 Tunnel Endpoint VLAN (ESRP enabled)
In Figure 141, redundant LSRs are installed at both ends of a TLS tunnel. This example takes advantage of the IP multinetting feature in ExtremeWare by creating an overlay tunnel endpoint VLAN that shares the same Ethernet ports as the user VLAN that is extended across the MPLS backbone network. A tunnel endpoint VLAN is created at both sites. ESRP is enabled on the tunnel endpoint VLANs and the user VLANs. To ensure that the same LSR is selected as the ESRP master for both VLANs, the ESRP configuration of the user VLAN and the associated tunnel endpoint VLAN must be identical. Enabling ESRP on the user VLAN ensures that only one LSR (the ESRP master) forwards traffic for the VLAN at each site. The redundant IP address configured on the tunnel endpoint VLAN (IPT1) is also used as the tunnel endpoint address in the same manner as described for the preceding example. Therefore, it is the ESRP
647
master for the user VLAN that forwards traffic onto the tunnel LSP, and it is the ESRP master for the tunnel endpoint VLAN that forwards traffic received from the tunnel LSP (as a consequence of being the LSR with which the tunnel LSP is established). The tunnel endpoint VLANs are created specifically to provide fault-tolerant tunnel endpoint IP addresses in a manner that is totally transparent to the user VLAN. ESRP is used to provide the fault-tolerant IP addresses. The tunnel endpoint IP addresses could be defined on the user VLAN instead. However, an OSPF route must be advertised for a tunnel endpoint IP address to ensure that the underlying LSP is established by LDP. By creating the tunnel endpoint VLAN the IP address defined on the user VLAN does not need to be exported into the MPLS backbone (which would expose information about the user VLAN to the MPLS backbone). IP addresses are defined on the user VLAN (IPU1) for ESRP purposes, but these addresses are only used locally at each site. In this example, IP addresses would have to be defined on a different set of VLANs to provide the connectivity to the MPLS backbone. These MPLS VLANs are not depicted in Figure 141. The MPLS VLANs contain a different set of physical ports than the user VLAN, and MPLS must be enabled on the MPLS VLANs. ESRP standby LSRs preestablish tunnel LSPs to the ESRP master LSR at the other site. The pre-established tunnel LSPs are inactive as long as the LSR is in standby mode, but can expedite recovery from a failure. For example, if LSR A were to fail, LSR B would become the ESRP master at Site 1, and LSR B would already have an LSP established to LSR C. Upon becoming ESRP master, LSR B would advertise an OSPF route and a MPLS label mapping for IPT1, and LSR C would then begin using the new tunnel LSP to LSR B. The ESRP route table tracking feature is also useful in conjunction with TLS. ESRP route table tracking can be configured to initiate an ESRP failover when no route is available to the tunnel endpoint IP address. For example, LSR A can be configured to initiate a failover to LSR B when its route table does not have an entry for IPT2. Each of the LSRs would be configured to use ESRP route table tracking in a similar manner.
LSP Tracking
LSP tracking provides MPLS with specific ESRP selection criteria for determining the ESRP status of a VLAN. LSP tracking is similar to route tracking and ping tracking in ESRP. As shown in Figure 141, ESRP can be configured to protect the user VLAN from disruptions in the MPLS network core. For example, LSR A and LSR B can be configured to track an established LSP to IPT2. If a network disruption causes the LSP from LSR A to LSR C to fail, ESRP detects the condition and fails over to LSR B (provided LSR B has an established LSP to LSR C). This type of LSP protection is especially useful when providing ESRP redundant TLS L2 VPN services using Traffic Engineered LSPs that take completely different paths (for example, LSP from LSR A to LSR C and LSP from LSR B to LSR C). Using ESRP domains, LSP tracking can be easily scaled to support several TLS VLANs that are tunneled across an L2 VPN using a single LSP. Instead of each TLS VLAN tracking the same LSP, all of the TLS VLANs are placed into an ESRP domain for which there is one non-TLS VLAN, configured to track the state of the LSP. When ESRP detects that the LSP has failed, all of the VLANs in the configured ESRP domain transition to neutral state and the backup LSR becomes the master switch for all of the TLS VLANs. To configure LSP tracking, use the following commands:
configure vlan <vlan name> add track-lsp [<lsp_name> | ipaddress <ipaddress/masklength>]
648
configure vlan <vlan name> delete track-lsp [<lsp_name> | ipaddress <ipaddress/masklength> | all]
This command configures the LSPs tracked by ESRP in order to determine the ESRP state of the specified VLAN. The add track-lsp command configures ESRP to track up to eight LSPs. Fail over to the slave switch is based on the total number of established tracked LSPs. The switch with the greatest number of established tracked LSPs is elected the master switch for the specified VLAN. Specifying the parameter <lsp_name> instructs ESRP to track the status of an RSVP-TE LSP. Specifying the ipaddress keyword instructs ESRP to track the LSP status for the IP prefix as defined by the <ipaddress/masklength> parameter. Both types of LSPs can be tracked simultaneously. The delete track-lsp command removes an LSP from ESRP tracking for the specified VLAN. If you specify the all keyword, all configured LSPs are removed from ESRP tracking for the specified VLAN.
Configuration Example
The MPLS TLS ESRP configuration example, shown in Figure 142, illustrates how to configure a pair of BlackDiamond switches to provide redundant Layer-2 VPN services over an MPLS domain. Two additional switches have been added to the TLS MPLS network configuration example shown in Figure 136, LSR 5 and LSR 6. LSR 5 and LSR 6 provide redundant connectivity for TLS VLANs into the MPLS domain. Figure 142: TLS configuration example using ERSP
LSR 1
.0 vla .1.0 n1 /24
Router ID = 11.0.1.11 master 9.9.9.0/24 mplsesrp tagged=1234 10.10.10.1/32
LSR 4
LSR 3
Router ID = 11.0.3.11
11
10.10.10.2/32 unc-wilmington
unc
TL un ST
9.9.9.0/24 10.10.10.1/32
9.9.9.0/24
LSR 5
Router ID = 11.0.5.11 slave
ne l
11
10.10.10.2/32
LSR 6
Router ID = 11.0.6.11 slave
LSR 2
Router ID =11.0.2.11
649
The following commands create a tagged ESRP VLAN over which ESRP control packets flow. Tagging the VLAN separates the customers local traffic from the ESRP control packets and prevents OSPF routes from the MPLS service provider domain from leaking into the customers VLAN:
create vlan mplsesrp configure vlan mplsesrp tag 1234 configure vlan mplsesrp ipaddress 10.10.10.1/32 configure vlan mplsesrp add port 2:24 tagged
The ESRP VLAN must be OSPF-enabled so that the router interface is advertised into the MPLS domain. The ESRP router interface is used as the LSP destination for the TLS tunnel. By configuring a TLS tunnel using the ESRP VLAN router interface, the TLS tunnel can migrate between switches as switches change ESRP state:
configure ospf add vlan mplsesrp area 0.0.0.0 configure ospf vlan mplsesrp cost 10
The following command enables ESRP on VLAN mplsesrp. The ESRP VLAN and the TLS VLAN must have the same port membership. In this example, port 2:24 is a member of both VLANs:
enable esrp vlan mplsesrp
The following command creates a TLS tunnel from VLAN unc to the master switch providing connectivity for VLAN unc-wilmington:
configure mpls add tls-tunnel rt40 10.10.10.2 unc vcid 1 from mplsesrp
From an ESRP perspective, LSR 5 is configured identically as LSR 1. LSR 4 and LSR 6 are configured in a very similar manner to LSR 1 and LSR 5. A tagged ESRP control VLAN is created between them and given an IP address. The ESRP VLAN is also OSPF-enabled so that the router interface is advertised into the MPLS domain.
create vlan mplsesrp configure vlan mplsesrp tag 1234 configure vlan mplsesrp ipaddress 10.10.10.2/32 configure vlan mplsesrp add port 2:24 tagged configure ospf add vlan mplsesrp area 0.0.0.0 configure ospf vlan mplsesrp cost 10 enable esrp vlan mplsesrp
And finally, a TLS tunnel is created from VLAN unc-wilmington to the master switch providing connectivity for VLAN unc. This configuration command is issued on both LSR 4 and LSR 6.
configure mpls add tls-tunnel rt40 10.10.10.1 unc-wilmington vcid 1 from mplsesrp
650
The High Density Gigabit Ethernet modules (also known as 3 series modules and Triumph modules) are I/O modules for both the Alpine 3800 series and the BlackDiamond 6800 series chassis-based systems. These modules support bi-directional traffic management to control the rate of information that flows into (ingress) or out of (egress) a switched network from one individual network port. The 3 series modules are designed for metro service providers and enterprise environments. In a service provider environment, service providers can control the flow of data on a per customer basis. In an enterprise environment, businesses can use these modules to control user access or where desktop or server interfaces require high-density Gigabit Ethernet capability. The 3 series modules also support the QoS functions, commands, and configurations described in Chapter 7. This chapter covers the following topics: About the High Density Gigabit Ethernet Module on page 651 Configuring the High Density Gigabit Ethernet Module on page 655 Configuration Examples on page 662
651
Table 81:
Chassis Alpine
Each port group provides fully independent backplane connectivity. To define the maximum amount of over-subscription, you can activate one, two, three, or all four ports within a port group. For example, if you activate two ports in group one, only those two ports share a gigabit link to the backplane.
NOTE If congestion is detected on a port with flow control enabled, a flow control PAUSE frame is sent out that port. The PAUSE frame is not sent out on the other ports in the group. For more information about these and other Alpine modules, see the Extreme Networks Consolidated Hardware Guide.
652
eight groups of two ports each, and the G24T3 has six groups of four ports each. Each group multiplexes traffic into a single full duplex gigabit link to the switch fabric. To take advantage of this architecture, use a single port in each group before using all of the ports in any particular group. Table 83 lists the groups for the G16X3 module, and Table 84 lists the groups for the G24T3 module.
NOTE If congestion is detected on a port with flow control enabled, a flow control PAUSE frame is sent out that port. The PAUSE frame is not sent out on the other port in the group. For more information about these and other BlackDiamond modules, see the Extreme Networks Consolidated Hardware Guide.
Summary of Features
The
3
T-ControlGuarantees any level of bandwidth (from 1 kbps to 1 Gbps) to any port on the module, configures ingress rate limiting and shaping for oversubscription and traffic management Access Control Lists (ACL)Accommodates up to 10,000 hardware-based wire-speed ACLs
653
Ingress Quality of Service (IQoS) and Differentiated Services (DiffServ) Eight ingress and eight egress queues per interface Ingress rate shaping and limiting for prioritizing different levels of traffic coming into or going out of the module Random Early Discard (RED) congestion avoidance algorithm Two-tier rate limiting Committed Information Rate (CIR)Tiered rate shaping for guaranteed traffic Peak Rate (PR)Burst services to ensure bandwidth efficiency Wire-speed IP/IPX routing using RIP v1/v2, OSPF, BGP4, PIM, and DVMRP Finer granularity (1 kbps precision) egress rate-limiting per port
Summary of Functions
The following sections provide descriptions of the key functions provided by the
3
series modules.
T-Control
Triumph-based T-Control enables per-application traffic classification and tagging to deliver bi-directional traffic management. T-Control supports eight ingress queues, eight egress queues, and a hierarchical egress queue for managing aggregate output traffic on each port. Each queue runs at wire-speed and individually configured to rate-shape traffic. Rate-shaping allows you to control over how much bandwidth each port, user, and application will receive. With T-Control you can maintain detailed statistics for all in-profile, out-profile, and dropped traffic on each queue. Use this data to track and control port utilization, application behavior, and for service providers, usage-based billing.
series module also provides flexible support for the RED congestion avoidance algorithm.
The 3 series modules also support the QoS functions and configurations described in Chapter 7. Since the High Density Gigabit Ethernet modules have their own commands to implement ingress rate limiting, you do not need to configure the internal loopback port.
654
Committed Information Rate (CIR) Peak Rate (PR) The CIR (specified in either bps or a percentage of the link speed) is the rate of traffic guaranteed to reach the backplane (also considered high priority traffic). Depending on conditions, traffic that exceeds the CIR may be dropped. The PR is a rate equal to or greater than the CIR but less than or equal to the link speed that sets the maximum burst rate that the queue can reach (also considered low priority traffic).
Use the all keyword to specify all configured 3 series ports. To see the flow control configuration, use the show ports configuration command. DSBL indicates that flow control is disabled on that port. ENBL indicates that flow control is enabled while auto-negotiation is off for that port. If flow control and auto-negotiation are both enabled, the negotiated flow control value is displayed.
Configuring VLANs
To configure a VLAN to use a particular ingress QoS profile, use the following command:
configure vlan <vlan name> qosprofile ingress [<Ingress QOS profile> | none]
655
where the following is true: vlan name specifies a VLAN name. Ingress QOS profile specifies an ingress QoS profile, such as IQP1. none specifies that traffic from this VLAN is not associated with any ingress queue based on VLAN ID. This is the default setting. All VLANs are set to the default ingress QoS profile none.
where the following is true: diffserv specifies the ingress priority based on DiffServ information. The default is 3. dot1p specifies the ingress priority based on dot1p information. The default is 1. vlan specifies the ingress priority of VLAN ID-based input queue selection. The default is 2. priority range is 0-15 (15 is the highest priority). Each queue selection criteria must have a unique priority (no ties). Ingress QoS types with a greater value take higher precedence. The queue selection criteria with the highest priority, if enabled in the received packet, is used first, followed by the remaining criteria in descending order. To restore the default ingress QoS settings, use the following command:
unconfigure qostype ingress priority
656
where the following is true: Ingress QoS profile specifies an ingress QoS profile. Ingress QoS profiles are IQP1 through IQP8. minbw specifies the minimum percentage of the bandwidth guaranteed to be available to the specified queue for transmissions from the ingress QoS profile. NOTE The sum of the committed rate and the equivalent rate for the configured minbw percent for all ingress queues on a port must not exceed 250 mpbs for 4:1 oversubscribed platforms (GM-16T3, GM-16X3, and G24T3) and 500 mbps for 2:1 oversubscribed platforms (G16X3). maxbw specifies the maximum percentage of the bandwidth that the specified queue can use for transmissions from the ingress QoS profile. The range is 0-100. The default is 100. committed-rate specifies the minimum bandwidth for the specified queue in either kbps or mbps. NOTE The sum of the committed rate and the equivalent rate for the configured minbw percent for all ingress queues on a port must not exceed 250 mpbs for 4:1 oversubscribed platforms (GM-16T3, GM-16X3, and G24T3) and 500 mbps for 2:1 oversubscribed platforms (G16X3). peak-rate specifies the maximum bandwidth for the specified queue in either kbps or mbps. The range is: kbps: 0 to 1000000 mbps: 0 to 1000 red-threshold specifies the ingress queue fill percentage when the 3 series module begins to randomly discard packets as the queue fill percentage approaches the maximum queue size. The range is 0-100. The default is 100. maxbuf specifies the ingress queue size as a percentage of the maximum size available. The range is 0-100. The default is 100. portlist allows ingress QoS profiles to be customized on a port-by-port basis for the module. If you select the all keyword, all 3 series ports are selected.
3
series
657
where the following is true: Ingress QOS profile specifies an optional ingress QoS profile. Ingress QoS profiles are IQP1 through IQP8. If you do not specify an ingress QoS profile, all ingress QoS profiles for the specified ports are displayed. portlist specifies one or more slots and ports. The units displayed are the same units that you used when you configured the ingress QoS profile. Following is sample output from this command:
MinBw %/ MaxBw %/ Port Queue Committed-Rate Peak-Rate RED % MaxBuf % ============================================================= 1:1 IQP1 1000 k 1000 m 100 % 100 % IQP2 0 % 100 % 100 % 100 % IQP3 0 % 100 % 100 % 100 % IQP4 0 % 100 % 100 % 100 % IQP5 0 % 100 % 100 % 100 % IQP6 0 % 100 % 100 % 100 % IQP7 0 % 100 % 100 % 100 % IQP8 0 % 100 % 100 % 100 % 1:2 IQP1 0 % 100 % 100 % 100 % IQP2 0 % 100 % 100 % 100 % IQP3 0 % 100 % 100 % 100 % IQP4 0 % 100 % 100 % 100 % IQP5 0 % 100 % 100 % 100 % IQP6 0 % 100 % 100 % 100 %
Configuring DiffServ
This section describes the DiffServ commands used and supported for configuring rate limiting on the 3 series modules. Rate limiting allows you to control the rate of information and the amount of bandwidth used for incoming and outgoing traffic in your network. When a packet arrives on a 3 series ingress port, the switch examines the first six of eight TOS bits, called the code point. Based on the code point, the switch can assign the ingress QoS profile used for ingress rate limiting and ingress rate shaping. The examination of DiffServ information is enabled by default on 3 series modules but disabled by default for ports on all other I/O modules.
658
Table 85: Default code point to ingress QoS profile mapping (continued)
Code Point 16-23 24-31 32-39 40-47 48-55 56-63 Ingress QoS Profile IQP3 IQP4 IQP5 IQP6 IQP7 IQP8
where the following is true: low-priority code-point specifies the low-priority DiffServ code point (IP TOS) value to use to overwrite low-priority ingress traffic. The default is 0. The range is 0 to 63. high-priority code-point specifies the high-priority DiffServ code point (IP TOS) value to use to overwrite high-priority ingress traffic. The default is 0. The range is 0 to 63. portlist specifies one or more are selected.
3
series ports
Ingress QOS profile specifies an optional ingress QoS profile. If you do not specify an ingress QoS profile, all ingress QoS profiles for the indicated ports will be affected. To enable the replacement of ingress DiffServ code points, use the following command:
enable diffserv ingress replacement [high-priority | low-priority | low-and-high-priority] ports [<portlist> | all] {<Ingress QOS profile>}
where the following is true: high-priority enables DiffServ for high-priority traffic (traffic received below the committed rate configured for the ingress QoS profile). low-priority enables DiffServ for low-priority traffic (traffic received above the committed rate configured for the ingress QoS profile). low-and-high-priority enables DiffServ for both low-priority and high-priority traffic. portlist specifies one or more are selected.
3
series ports
Ingress QOS profile specifies an optional ingress QoS profile. If you do not specify an ingress QoS profile, all ingress QoS profiles for the indicated ports will be affected.
659
When you specify the detail keyword, the output displays the flow control state and the ingress QoS profile, ingress IPTOS replacement, and egress rate limiting configurations. To disable the replacement of Ingress DiffServ code points, use the following command:
disable diffserv ingress replacement [high-priority | low-priority | low-and-high-priority] ports [<portlist> | all] {<Ingress QOS profile>}
series ports.
percent specifies the maximum percentage of bandwidth allowed for all egress traffic for each selected port. The range is 0 to 100. The default is 100. bps specifies the maximum bandwidth for all egress traffic for each selected ports in either kbps or mbps. The range is: kbps: 0 to 1000000 mbps: 0 to 1000 k specifies kilobits per second. m specifies megabits per second. To display the maximum egress rate limit on the specified 3 series ports, use the following command:
show ports {<portlist>} egress-rate-limit.
660
To verify and display the egress rate limit on the specified 3 series ports, use the following command:
show ports 4:2 egress-rate-limit
Displaying Statistics
To display real-time ingress statistics for one or more
3
If you do not specify the detail keyword, the output indicates the following: Port Number Link StatusThe current status of the link. Options are: Ready (R): The port is ready to accept a link. Active (A): The link is present at this port. Disabled (D): The link is disabled at this port. Not Present (NP): The link is not present at this port. High Priority BytesSum, per port, of the bytes forwarded for received high-priority packets (traffic received below the committed rate configured for the ingress QoS profile). Low Priority BytesSum, per port, of the bytes forwarded for received low-priority packets (traffic received above the committed rate configured for the ingress QoS profile).
661
Received Total BytesThe total number of bytes that were received by the port. Receive Bytes DroppedTotal number of bytes dropped for this port. Total Percent DroppedPercentage of incoming bytes dropped due to oversubscription congestion or ingress rate limiting. Displayed with a precision of 1/100 of a percent. Transmit XOFFTotal number of XOFF flow control packets sent from this port. If you specify the detail keyword, the following additional information is displayed per ingress queue: QueueOne of eight ingress queue names for this port. High Priority BytesSum, per ingress queue, of the bytes forwarded for received high-priority packets. Low Priority BytesSum, per ingress queue, of the bytes forwarded for received low-priority packets. Total Percent DroppedPercentage of incoming bytes on this queue dropped due to oversubscription congestion. This is determined using cumulative counters, so is not a rate. This will be displayed with a precision of 1%. Byte RatesThe following three rate values will always either add up to 0% or 100%: High Priority PercentageThe ratio of high priority traffic forwarded on this queue to the total bytes received on this queue. Low Priority PercentageThe ratio of low priority traffic forwarded on this queue to the total bytes received on this queue. Dropped PercentagePercentage of receive bytes dropped by this queue relative to the total number of bytes input to this queue.
Configuration Examples
This section provides configuration examples for the High Density Gigabit Ethernet module.
Next change the DiffServ code point from 23 to 60 to allocate the financial services traffic to ingress QoS profile IQP8 on a second BlackDiamond switch.
configure diffserv ingress replacement low-priority code-point 60 high-priority code-point 60 ports 4:1 iqp3 enable diffserv replacement low-and-high-priority ports 4:1 iqp3
662
Configuration Examples
To display the ingress QoS profile statistics, use the following command:
show ports 4:1 ingress stats detail
3 Configure the QoS type ingress priority for VLAN to the highest level.
configure qostype ingress priority vlan 10
4 Configure the bandwidth requirements for each type of traffic: Web10 - 20% AdministrativeGuaranteed at least 5%
configure iqp6 minbw 10 % maxbw 20 % red-threshold 100 % maxbuf 100 % ports 3:1 configure iqp7 minbw 5 % maxbw 100% red-threshold 100 % maxbuf 100% ports 3:1
663
664
Part 4
Appendixes
This appendix describes the following topics: Downloading a New Image on page 667 Saving Configuration Changes on page 671 Using TFTP to Download the Configuration on page 673 Synchronizing MSMs on page 674 Upgrading and Accessing BootROM on page 675
667
If you have modules that run a software image in the Alpine or BlackDiamond chassis, and you want to download an image to all installed modules, use the following command:
download image [<hostname> | <ipaddress>] [<filename> | all-images <filename_prefix> {image-type [non-ssh | ssh]}] {primary | secondary}
Use the all-images <filename_prefix> parameter to download the operational images for all installed modules. filename_prefixSpecifies the filename prefix (the filename without the image extension) of the new image. All of the operational images files must be located in the same directory on the TFTP server and they must have the same filename prefix. Enter the filename prefix, not the filename, to successfully download the software. For example, if you enter v700b68.xtr, the command fails because the file extension (.xtr) is included, and v700b68.xtr.xtr is not found. If you enter v700b68, without the file extension, the command executes. By default, if the ExtremeWare version currently running contains security features that are subject to export restrictions (for example, SSH2), the image downloaded contains the security features. To download an image type different from the type currently running, specify the optional
image-type keyword followed by either non-ssh or ssh.
non-sshSpecifies an ExtremeWare image without export-restricted security features sshSpecifies an ExtremeWare image containing export-restricted security features The main ExtremeWare image always downloads first. The download image process proceeds with each slot starting at slot 1. If the main ExtremeWare image cannot be found, the download image process is discontinued. If a specific image file is not found for a specific module, an error is displayed and the download process continues to the next module. Slots with modules that do not support separate operational images (for example, the G8Xi or the GM-4Ti module) are skipped.
668
669
Table 88 displays sample show version and show switch output for various ExtremeWare versions.
Version 7.0.0 (Build 61) patch.030131-01-r1 7.0.0b61 patch.030131-01-r1 Version 7.0.0 (Build 68) tech2.ipv6-r4 Version 7.0.1 (Build 3) beta1.triumph-r4 Version 7.0.0 (Build 67) branch.triumph-r5 7.0.0b68 tech2.ipv6-r4 7.0.1b3 beta1.triumph-r4 7.0.0b67 branch.triumph-r5
Software Signatures
Each ExtremeWare image contains a unique signature. The BootROM checks for signature compatibility and denies an incompatible software upgrade. In addition, the software checks both the installed BootROM and software and also denies an incompatible upgrade. ExtremeWare 6.2.2 build 56 is the first ExtremeWare release to incorporate software signatures. You must upgrade to ExtremeWare 6.2.2 build 56 before upgrading to later ExtremeWare builds.
where date is the date and time is the time (using a 24-hour clock format) when the switch will be rebooted. The values use the following format:
mm/dd/yyyy hh:mm:ss
If you do not specify a reboot time, the reboot occurs immediately following the command, and any previously schedule reboots are cancelled. To cancel a previously scheduled reboot, use the cancel option. To reboot the Alpine 3802, use the following command:
reboot {time <date> <time> | cancel | slot <slot number>}
670
Rebooting a Module
To reboot a module in a specific slot, rather than rebooting the switch, use the following command:
reboot {time <date> <time> | cancel} {slot <slot number> | msm-a | msm-b}
with the additional options available: slot number Specifies the slot where the module is installed msm-aSpecifies a BlackDiamond MSM module installed in slot A msm-bSpecifies a BlackDiamond MSM module installed in slot B In general, the modules that can be rebooted have separate images from the ExtremeWare image for the switch. The following modules can be rebooted: E1 T1 T3 ARM ATM MPLS PoS Slave or switch fabric MSM modules NOTE When you configure a timed reboot of an MSM, there is no show output in the CLI to view the configuration. The E1, T1, and T3 reboot slot command does not support the time or cancel keywords, so this command can only be executed immediately.
671
NOTE If the switch is rebooted while in the middle of a configuration save, the switch boots to factory default settings. The configuration that is not in the process of being saved is unaffected.
This command resets the entire configuration, with the exception of user accounts and passwords that have been configured, and the date and time. To erase the currently selected configuration image and reset all switch parameters, use the following command:
unconfigure switch all
where the following is true: ipaddressIs the IP address of the TFTP server. hostnameIs the hostname of the TFTP server. (You must enable DNS to use this option.) filenameIs the name of the ASCII file. The filename can be up to 255 characters long, and cannot include any spaces, commas, quotation marks, or special characters. every <time>Specifies the time of day you want the configuration automatically uploaded on a daily basis. If not specified, the current configuration is immediately uploaded to the TFTP server.
672
After the ASCII configuration is downloaded by way of TFTP, you are prompted to reboot the switch. The downloaded configuration file is stored in current switch memory during the rebooting process, and is not retained if the switch has a power failure. When the switch completes booting, it treats the downloaded configuration file as a script of CLI commands, and automatically executes the commands. If your CLI connection is through a Telnet connection (and not the console port), your connection is terminated when the switch reboots, but the command executes normally.
673
Do not download an incremental configuration when you have time-critical applications running. When you download an incremental configuration, the switch immediately processes the changes, which can affect the processing of other tasks. We recommend that you either download small incremental configurations, or schedule downloads during maintenance windows.
Remember to Save
Regardless of which download option is used, configurations are downloaded into switch runtime memory, only. The configuration is saved only when the save command is issued, or if the configuration file, itself, contains the save command. If the configuration currently running in the switch does not match the configuration that the switch used when it originally booted, an asterisk (*) appears before the command line prompt when using the CLI.
Synchronizing MSMs
On the BlackDiamond switch, you can take the master MSM64i configurations and images and replicate them on the slave MSM64i using the following command:
synchronize
In addition to replicating the configuration settings and images, this command also replicates which configuration or image the MSM64i should use on subsequent reboots. This command does not replicate the run-time configuration. You must use the save configuration command to store the run-time configuration first.
674
Upgrading BootROM
Upgrading BootROM is done using TFTP (from the CLI), after the switch has booted. Upgrade the BootROM only when asked to do so by an Extreme Networks technical representative. To upgrade the BootROM, use the following command:
download bootrom [<host_name> | <ip_addr>]
NOTE Doing a serial download does not store an image into flash, it only allows the switch to boot an operational image so that a normal TFTP upgrade from the CLI can then be performed.
675
676
B Troubleshooting
If you encounter problems when using the switch, this appendix may be helpful. If you have a problem not listed here or in the release notes, contact your local technical support representative.
LEDs
Power LED does not light: Check that the power cable is firmly connected to the device and to the supply outlet. On powering-up, the MGMT LED lights yellow: The device has failed its Power On Self Test (POST) and you should contact your supplier for advice. A link is connected, but the Status LED does not light: Check that: All connections are secure. Cables are free from damage. The devices at both ends of the link are powered-up. Both ends of the Gigabit link are set to the same autonegotiation state. The Gigabit link must be enabled or disabled on both sides. If the two sides are different, typically the side with autonegotiation disabled will have the link LED lit, and the side with autonegotiation enabled will not be lit. The default configuration for a Gigabit port is autonegotiation enabled. This can be verified by entering the following command:
show port configuration
On power-on, some I/O modules do not boot: Check if you are using 110V power input. The BlackDiamond switch powers only up to four modules if it is connected to a 110V outlet. Error LED on the MSM64i turns amber: Check the syslog message for a critical software errors.
677
Troubleshooting
Status LED on the I/O module turns amber: Check the syslog message for a related I/O module error. If the error is an inserted an I/O module that conflicts with the software configuration, use one of the following commands to reset the slot configuration:
clear slot
configure slot <slot> module [f32t | f32f | f48t | g4x | g6x | g8x | g12x] Otherwise, contact Extreme Networks for further assistance. ENV LED on the MSM64i turns amber: Check each of the power supplies and all of the fans. Additionally, the status of these is indicated in the show switch display. Look for the Temperature and Power Supply entries in the display. Switch does not power up: All products manufactured by Extreme Networks use digital power supplies with surge protection. In the event of a power surge, the protection circuits shut down the power supply. To reset, unplug the switch for 1 minute, plug it back in, and attempt to power up the switch. If this does not work, try using a different power source (different power strip/outlet) and power cord.
678
The Telnet workstation cannot access the device: Check that the device IP address, subnet mask and default router are correctly configured, and that the device has been reset. Ensure that you enter the IP address of the switch correctly when invoking the Telnet facility. Check that Telnet access was not disabled for the switch. If you attempt to log in and the maximum number of Telnet sessions are being used, you should receive an error message indicating so. Traps are not received by the SNMP Network Manager: Check that the SNMP Network Managers IP address and community string are correctly configured, and that the IP address of the Trap Receiver is configured properly on the system. The SNMP Network Manager or Telnet workstation can no longer access the device: Check that Telnet access or SNMP access is enabled. Check that the port through which you are trying to access the device has not been disabled. If it is enabled, check the connections and network cabling at the port. Check that the port through which you are trying to access the device is in a correctly configured VLAN. Try accessing the device through a different port. If you can now access the device, a problem with the original port is indicated. Re-examine the connections and cabling. A network problem may be preventing you accessing the device over the network. Try accessing the device through the console port. Check that the community strings configured for the device and the Network Manager are the same. Check that SNMP access was not disabled for the system. Permanent entries remain in the FDB: If you have made a permanent entry in the FDB (which requires you to specify the VLAN to which it belongs and then delete the VLAN), the FDB entry will remain. Though causing no harm, you must manually delete the entry from the FDB if you want to remove it. Default and Static Routes: If you have defined static or default routes, those routes will remain in the configuration independent of whether the VLAN and VLAN IP address that used them remains. You should manually delete the routes if no VLAN IP address is capable of using them. You forget your password and cannot log in: If you are not an administrator, another user having administrator access level can log in, delete your user name, and create a new user name for you, with a new password. Alternatively, another user having administrator access level can log in and initialize the device. This will return all configuration information (including passwords) to the initial values. In the case where no one knows a password for an administrator level user, contact your supplier.
679
Troubleshooting
Port Configuration
No link light on 10/100 Base port: If patching from a hub or switch to another hub or switch, ensure that you are using a CAT5 cross-over cable. This is a CAT5 cable that has pins 1&2 on one end connected to pins 3&6 on the other end. Excessive RX CRC errors: When a device that has auto-negotiation disabled is connected to a Extreme switch that has auto-negotiation enabled, the Extreme switch links at the correct speed, but in half duplex mode. The Extreme switch 10/100 physical interface uses a method called parallel detection to bring up the link. Because the other network device is not participating in auto-negotiation (and does not advertise its capabilities), parallel detection on the Extreme switch is only able to sense 10Mbps versus 100Mbps speed, and not the duplex mode. Therefore, the switch establishes the link in half duplex mode using the correct speed. The only way to establish a full duplex link is to either force it at both sides, or run auto-negotiation on both sides (using full duplex as an advertised capability, which is the default setting on the Extreme switch).
NOTE A mismatch of duplex mode between the Extreme switch and another network device will cause poor network performance. Viewing statistics using the show port rx command on the Extreme switch may display a constant increment of CRC errors. This is characteristic of a duplex mismatch between devices. This is NOT a problem with the Extreme switch. Always verify that the Extreme switch and the network device match in configuration for speed and duplex. No link light on Gigabit fiber port: Check to ensure that the transmit fiber goes to the receive fiber side of the other device, and vice-versa. All gigabit fiber cables are of the cross-over type. The Extreme switch has auto-negotiation set to on by default for gigabit ports. These ports need to be set to auto off (using the command configure port <port #> auto off) if you are connecting it to devices that do not support auto-negotiation. Ensure that you are using multi-mode fiber (MMF) when using a 1000BASE-SX GBIC, and single mode fiber (SMF) when using a 1000BASE-LX GBIC. 1000BASE-SX does not work with SMF. 1000BASE-LX works with MMF, but requires the use of a mode conditioning patchcord (MCP).
VLANs
You cannot add a port to a VLAN: If you attempt to add a port to a VLAN and get an error message similar to
localhost:7 # configure vlan marketing add port 1:1,1:2 ERROR: Protocol conflict on port 1:5
680
you already have a VLAN using untagged traffic on a port. Only one VLAN using untagged traffic can be configured on a single physical port. VLAN configuration can be verified by using the following command:
show vlan <vlan name>
The solution for this error is to remove ports 1 and 2 from the VLAN currently using untagged traffic on those ports. If this were the default VLAN, the command would be
localhost:23 # configure vlan default del port 1:1,1:2
which should now allow you to re-enter the previous command without error as follows:
localhost:26 # configure vlan red add port 1:1,1:2
VLAN names: There are restrictions on VLAN names. They cannot contain whitespaces and cannot start with a numeric value unless you use quotation marks around the name. If a name contains whitespaces, starts with a number, or contains non-alphabetical characters, you must use quotation marks whenever referring to the VLAN name. 802.1Q links do not work correctly: Remember that VLAN names are only locally significant through the command-line interface. For two switches to communicate across a 802.1Q link, the VLAN ID for the VLAN on one switch should have a corresponding VLAN ID for the VLAN on the other switch. If you are connecting to a third-party device and have checked that the VLAN IDs are the same, the Ethertype field used to identify packets as 802.1Q packets may differ between the devices. The default value used by the switch is 8100. If the third-party device differs from this and cannot be changed, you may change the 802.1Q Ethertype used by the switch with the following command:
configure dot1p ethertype <ethertype>
Changing this parameter changes how the system recognizes all tagged frames received, as well as the value it inserts in all tagged frames it transmits. VLANs, IP Addresses and default routes: The system can have an IP address for each configured VLAN. It is necessary to have an IP address associated with a VLAN if you intend to manage (Telnet, SNMP, ping) through that VLAN or route IP traffic. You can also configure multiple default routes for the system. The system first tries the default route with the lowest cost metric.
STP
You have connected an endstation directly to the switch and the endstation fails to boot correctly: The switch has STP enabled, and the endstation is booting before the STP initialization process is complete. Specify that STP has been disabled for that VLAN, or turn off STP for the switch ports of the endstation and devices to which it is attempting to connect, and then reboot the endstation.
681
Troubleshooting
The switch keeps aging out endstation entries in the switch Forwarding Database (FDB): Reduce the number of topology changes by disabling STP on those systems that do not use redundant paths. Specify that the endstation entries are static or permanent.
Once debug mode is enabled, you can configure EMS to capture specific debug information from the switch. Details of EMS can be found in Chapter 10, Status Monitoring and Statistics on page 189. For the systems not yet converted to EMS, ExtremeWare includes a debug tracing facility for the switch. The show debug trace command can be applied to one or all VLANs, as follows:
show debug-tracing {vlan <vlan name>}
The debug commands should only be used under the guidance of Extreme Networks technical personnel. To reset all debug-tracing to the default level, use the following command:
clear debug-trace
To change the debug tracing facility for a certain system to a specified debug level, use the following command:
configure debug-trace <system> <level>vlan <vlan name>
Some of the debug trace systems commands can be applied to a particular VLAN, some apply to the switch as a whole, so the vlan option is not available with all systems. To display the debug tracing configuration, use the following command:
show debug-trace <system> vlan <vlan name>
TOP Command
The top command is a utility that indicates CPU utilization by process.
682
System health check is enabled by default. To disable the system health checker, use the following command:
disable sys-health-check
This command allows you to configure the switchs reaction to a failed health check, and provides the following options: logposts a CRIT message to the log trapsposts a CRIT message to the log and sends a trap card-downposts a CRIT message to the log, sends a trap, and brings the module down system-downposts a CRIT message to the log, sends a trap, and brings the system down The default option is log. To view the status of the system health checker, use this command:
show diag
If you do not specify an IP address, the configured system-dump server IP address is used. To specify the IP address to which to transfer a dump if the system-dump option is specified in the configuration, use the following command:
configure system-dump server <ip address>
This address is also used if no address is provided in the upload system-dump command. The default is 0 or no IP.
683
Troubleshooting
To set an optional timeout for the dump transfer, use the following command:
configure system-dump timeout <seconds>
The default is 0. The minimum non-zero value is 120 seconds. The minimum recommended value is 480 seconds. To return the system-dump configuration to the defaults, use the following command:
unconfigure system-dump
To display the system-dump server IP and dump-timeout, use the following command:
show system-dump
To specify a memory dump if a task generates a software exception, use the following command:
configure sys-recovery-level [all | critical] system-dump [maintenance-mode | msm-failover | reboot | shutdown]
The four options specify the action taken when the dump transfer is complete. The actions occur whether or not the dump was successful. The maintenance-mode option leaves the switch in whatever state it was in before the dump.
System Odometer
Each field replaceable component contains a system odometer counter in EEPROM. You can use the show switch command to see how long an individual component has been in service since it was manufactured. The odometer is supported on the following components:
Alpine
SMMi Baseboard All modules PSU
BlackDiamond
Master MSM64i and slave MSM64i Backplane All modules
Summit7i
CPU Baseboard I/O boards
684
Summit48i
CPU Daughter card
Summit5i
CPU Daughter card
Summit1i
CPU
Modes of Operation
The memory scanning feature has two modes of operation: manual mode, which is the default and recommended mode; and automatic mode, which is only used in redundant networks. Memory scanning is supported on the following modules and platforms: BlackDiamond 6816, BlackDiamond 6808, and BlackDiamond 6804 BlackDiamond modules - MSM64i, F96Ti, F48Ti, G8Xi, G8Ti, G12SXi Alpine 3808, Alpine 3804, and Alpine 3802 Summit48i, Summit7i, Summit5i, Summit1i, and Summit48si
685
Troubleshooting
Manual Mode
Manual mode is initiated by the following command:
run diagnostics packet-memory
NOTE This command is available on ExtremeWare 6.2.1 for BlackDiamond I/O modules, and ExtremeWare 6.2.2 and higher for BlackDiamond MSM64i, Alpine, and stackables. The command is only executed on one module at a time, although you can queue up two run diagnostics commands at a time.
Automatic mode status is listed in the show switch output sys-health-check field. Once auto-recovery mode is enabled, an automated background polling task checks every 20 seconds to see if any checksums have occurred. Three consecutive samples must be corrupted for any module to invoke autoscan. If autoscan is invoked, regardless of platform type or number of errors, there is an initial period where the device is taken offline so the scan can be run.
686
Table 89 describes the behavior of the switch if you configure auto-recovery using the configure sys-health-check command. The behavior differs based on the hardware configuration, the mode selected (online or offline), and the number of errors detected. Table 89: Auto-recovery memory scanning and memory mapping behavior
Platform Alpine Online 3 3 3 3 3 3 Summit 3 3 3 3 3 3 BlackDiamond with one MSM64i (or slave MSM64i is offline) 3 3 3 3 3 3 BlackDiamond with two MSM64is, errors on Master 3 3 3 3 3 3 BlackDiamond with two MSM64is, errors on Slave 3 3 3 3 3 3 Offline New Errors Detected 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 Behavior Switch kept online. Errors mapped, switch kept online. Errors not mapped, switch kept online. Switch enters limited commands mode. Errors mapped, switch kept online. Errors not mapped, switch enters limited commands mode. Switch kept online. Errors mapped, switch kept online. Errors not mapped, switch kept online. Switch enters limited commands mode. Errors mapped, switch kept online. Errors not mapped, switch enters limited commands mode. Switch kept online. Errors mapped, switch kept online. Errors not mapped, switch kept online. Switch enters limited commands mode. Errors mapped, switch kept online. Errors not mapped, switch enters limited commands mode. MSM64i kept online. Errors mapped, MSM64i kept online. Errors not mapped, MSM64i kept online. Master MSM64i fails over. Errors mapped, MSM64i kept online. Errors not mapped, Master MSM64i fails over. MSM64i kept online. Errors mapped, MSM64i kept online. Errors not mapped, MSM64i kept online. Slave MSM64i taken offline. Errors mapped, MSM64i kept online. Errors not mapped, Slave MSM64i taken offline.
687
Troubleshooting
Table 89: Auto-recovery memory scanning and memory mapping behavior (continued)
Platform BlackDiamond with two MSM64is, errors on both Online 3 3 3 3 3 3 BlackDiamond 6816 MSM64is in slots C and D 3 3 3 3 3 3 Alpine and BlackDiamond i series I/O modules 3 3 3 3 3 3 Offline New Errors Detected 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 Behavior Both kept online. Errors mapped, both kept online. Errors not mapped, both kept online. Both enter limited commands mode. Errors mapped, both kept online. Errors not mapped, both enter limited commands mode. MSM64i kept online. Errors mapped, MSM64i kept online. Errors not mapped, MSM64i kept online. MSM64i taken offline Errors mapped, MSM64i kept online. Errors not mapped, MSM64i taken offline. Module kept online. Errors mapped, module kept online. Errors not mapped, module kept online. Module taken offline Errors mapped, module kept online. Errors not mapped, module taken offline.
Table 90 describes the behavior of the switch if you run diagnostics manually using the run diagnostics command with the normal option. The behavior differs based on the hardware configuration, the mode selected (online or offline) using the configure sys-health-check command, and the number of errors detected. Table 90: Manual diagnostics memory scanning and memory mapping behavior, normal
Platform Alpine Online 3 3 3 3 3 3 Summit 3 3 3 3 3 3 Offline New Errors Detected 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 Behavior Switch kept online. Errors mapped, switch kept online. Errors not mapped, switch kept online. Switch kept online. Errors mapped, switch kept online. Errors not mapped, switch enters limited commands mode. Switch kept online. Errors mapped, switch kept online. Errors not mapped, switch kept online. Switch kept online. Errors mapped, switch kept online. Errors not mapped, switch enters limited commands mode.
688
Table 90: Manual diagnostics memory scanning and memory mapping behavior, normal (continued)
Platform BlackDiamond with one MSM64i (or slave MSM64i is offline) Online 3 3 3 3 3 3 BlackDiamond with two MSM64is, errors on Master 3 3 3 3 3 3 BlackDiamond with two MSM64is, errors on Slave 3 3 3 3 3 3 BlackDiamond 6816 MSM64is in slots C and D 3 3 3 3 3 3 Alpine and BlackDiamond i series I/O modules 3 3 3 3 3 3 Offline New Errors Detected 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 0 1-7 >7 Behavior Switch kept online. Errors mapped, switch kept online. Errors not mapped, switch kept online. Switch kept online. Errors mapped, switch kept online. Errors not mapped, switch enters limited commands mode. MSM64i kept online. Errors mapped, MSM64i kept online. Errors not mapped, MSM64i kept online. MSM64i kept online. Errors mapped, MSM64i kept online. Errors not mapped, Master MSM64i fails over. MSM64i kept online. Errors mapped, MSM64i kept online. Errors not mapped, MSM64i kept online. MSM64i kept online. Errors mapped, MSM64i kept online. Errors not mapped, Slave MSM64i enters limited commands mode. MSM64i kept online. Errors mapped, MSM64i kept online. Errors not mapped, MSM64i kept online. MSM64i kept online. Errors mapped, MSM64i kept online. Errors not mapped, MSM64i taken offline. Module kept online. Errors mapped, module kept online. Errors not mapped, module kept online. Module kept online. Errors mapped, module kept online. Errors not mapped, module taken offline.
Table 91 describes the behavior of the switch if you run diagnostics manually using the run diagnostics command with the extended option. The behavior differs based on the hardware configuration and whether errors are detected (the mode selected has no effect). Table 91: Manual diagnostics memory scanning and memory mapping behavior, extended
Platform Alpine Errors Detected? Y N Behavior Switch enters limited commands mode. Switch kept online.
689
Troubleshooting
Table 91: Manual diagnostics memory scanning and memory mapping behavior, extended (continued)
Platform Summit BlackDiamond with one MSM64i (or slave MSM64i is offline) BlackDiamond with two MSM64is, errors on Master BlackDiamond with two MSM64is, errors on Slave BlackDiamond 6816 MSM64is in slots C and D Alpine and BlackDiamond i series I/O modules BlackDiamond non-i series I/O modules Errors Detected? Y N Y N Y N Y N Y N Y N Y N Behavior Switch enters limited commands mode. Switch kept online. Switch enters limited commands mode. Switch kept online. Master MSM64i fails over. MSM64i kept online. MSM64i taken offline. MSM64i kept online. Module taken offline. Module kept online. Module taken offline. Module kept online. Module taken offline. Module kept online.
690
Recommended Mode
Extreme Networks strongly recommends that only manual mode memory scanning be used and that appropriate maintenance windows be arranged for the entire system, not just the intended I/O module paths. In addition to packet memory scan, extended diagnostics must also be run during this window as together these tests can detect not only problems with the packet memory but any other problems with the module. Further, the BlackDiamond chassis must be isolated either physically or logically from the network during the diagnostics run. This ensures that various network features converge properly. We also recommend that, if possible, memory scanning be performed while actual fabric checksums are being reported in the log. Although this is not an absolute requirement, and in fact is not a factor in the actual memory scan, by executing manual memory scanning while there are checksums occurring provides the best correlation between this diagnostic and the actual event.
691
Troubleshooting
Other types of checksum can occur and are signaled under the general checksum log message. These are not detected or corrected by memory scanning. Within an Extreme Networks switch, the following high-level diagram represents the basic data path for packets ingressing and egressing the switch fabric. Figure 143: Switch Fabric
Packet memory SRAM banks access via a Direct Access Controller (DMAC)
Control bus
2a
ASIC
2b
ASIC
DMAC
CPU sub-system
3 1
MAC
MAC
A switch fabric is essentially an extremely high-speed data path between multiple ports, which has a certain degree of flexibility through a forwarding database, to examine and switch packets intelligently between their ingress ports and their egress ports. Data typically enters the switch fabric after passing through the PHY ports and the MAC device layers. From the ingress point of the MAC the data is moved to temporary storage in the packet memory. Checksums are applied at the point of entry to the switch fabric, and these checksums are validated upon exit of the switch fabric. If the checksum does not evaluate correctly to the contents of the packet then some corruption has occurred to that packet. Corruption can occur anywhere along the data path and storage. These corruptions are extremely rare but with a high traffic switch fabric even a temporary PBUS or memory problem can lead to a large amount of individual packet corruptions. If packet corruption occurs in the switch fabric it must occur frequently or consistently to be considered a problem. Nonetheless, log messages are generated to signal when any fabric checksums occur. Consistent checksum log messages indicate a problem. ExtremeWare also protects the CPU from corrupted packets by evaluating the checksums placed by the MAC devices whenever these packets are sent up to the CPU for processing.
692
If your environment does not support a spare chassis or it would be impractical to rotate through the installed modules, then consider temporarily upgrading to the latest ExtremeWare during an extended maintenance window to perform memory scanning on modules in the field. To do this, schedule an extended maintenance window and prepare the system for a temporary upgrade. Do not convert or save the configuration on the switch. It is not possible to correctly run an ExtremeWare 6.2.2 (or later) configuration on an older version of ExtremeWare. In temporarily upgrading your systems, plan to roll back the systems to the original working code image and configuration. This means you need the original ExtremeWare code version accessible by TFTP server from the switch. You also need the latest saved configuration accessible to download back to the switch from a TFTP server. No particular configuration is needed to support running memory scanning. You can use the existing default configuration to scan the supported modules and then restore the system to the original ExtremeWare version and configuration. If you must support a large campus environment with several BlackDiamond or Alpine systems for this screening operation, you can temporarily dedicate a single MSM64i to the latest version of ExtremeWare for the exercise and manually move this around to each system to scan the modules. For stackable platforms, you must load the latest ExtremeWare on every switch to run this test. Be aware that any memory defect found and mapped out under this exercise does not remain mapped out when those modules are returned to a pervious version of ExtremeWare. ExtremeWare does not have the capability to use the mapped out information located in the detected modules EEPROM. The validity of this temporary screening exercise is limited to identifying modules with memory defects.
If the switch reboots the specified number of times within the specified time interval, it stops rebooting and comes up in minimal mode. If you reboot the switch manually or use the run msm-failover or run diagnostics commands, the time interval and count are both reset to 0.
Minimal Mode
In minimal mode, only the CPU, NVRAM, management port, and minimal tasks are active. The following commands are supported in minimal mode: reboot unconfigure switch all unconfigure switch use image use configuration download bootrom download image
693
Troubleshooting
download configuration configure iparp configure vlan ipaddress configure iproute add default configure diagnostics show iproute show iparp show vlan show version show log ping clear log clear log diag-status
694
VLANs IEEE 802.1Q VLAN Tagging IEEE 802.3ad Static ConfigPort-based VLANs MAC-based VLANs Protocol-sensitive VLANs Multiple STP domains per VLAN RFC 3069 VLAN Aggregation for Efficient IP Address Allocation Virtual MANs
695
Quality of Service IEEE 802.1D -1998 (802.1p) Packet Priority RFC 2474 Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers RFC 2598 An Expedited Forwarding PHB RFC 2597 Assured Forwarding PHB Group Bi-directional Rate Shaping RFC 2475 An Architecture for Differentiated Service Layer 1-4, Layer 7 (user name) Policy-Based Mapping Policy-Based Mapping/Overwriting of DiffServ code points, .1p priority
RIP RFC 1058 Routing Information Protocol RFC 2453 RIP Version 2
OSPF RFC 2328 OSPF Version 2 RFC 1587 The OSPF NSSA Option RFC 1765 OSPF Database Overflow RFC 2370 The OSPF Opaque LSA Option
IS-IS RFC 1195 Use of OSI IS-IS for Routing in TCP/IP and Dual Environments ISO 10589 OSI IS-IS Intra-Domain Routing Protocol (Replicated as RFC 1142)
BGP4 RFC 1771 A Border Gateway Protocol 4 (BGP-4) RFC 1965 Autonomous System Confederations for BGP RFC 2796 BGP Route Reflection - An Alternative to Full Mesh IBGP RFC 1997 BGP Communities Attribute RFC 1745 BGP4/IDRP for IP---OSPF Interaction RFC 2385 Protection of BGP Sessions via the TCP MD5 Signature Option RFC 2439 BGP Route Flap Dampening
IP Multicast RFC 2362 Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification PIM-DM Draft IETF PIM Dense Mode v2-dm-03)DVMRP v3 draft IETF DVMRP v3-07 RFC 1112 Host extensions for IP multicasting RFC 2236 Internet Group Management Protocol, Version 2 IGMP Snooping with Configurable Router Registration Forwarding
696
Management - SNMP & MIBs RFC 1157 Simple Network Management Protocol (SNMP) RFC-1215 Convention for defining traps for use with the SNMP RFC 1901 Introduction to Community-based SNMPv2 RFC 1902 Structure of Management Information for Version 2 of the Simple Network Management Protocol (SNMPv2) RFC 1903 Textual Conventions for Version 2 of the Simple Network Management Protocol (SNMPv2) RFC 1904 Conformance Statements for Version 2 of the Simple Network Management Protocol (SNMPv2) RFC 1905 Protocol Operations for Version 2 of the Simple Network Management Protocol (SNMPv2) RFC 1906 Transport Mappings for Version 2 of the Simple Network Management Protocol (SNMPv2) RFC-1212 Concise MIB definitions RFC-1213 Management Information Base for Network Management of TCP/IP-based internets: MIB-II RFC 1757 Remote Network Monitoring Management Information Base RFC 2021 Remote Network Monitoring Management Information Base Version 2 using SMIv2 RFC 2613 Remote Network Monitoring MIB Extensions for Switched Networks Version 1.0 RFC 2233 Evolution of the Interfaces Group of MIB-II RFC 2096 IP Forwarding Table MIB RFC 1724 RIP Version 2 MIB Extension RFC 1850 OSPF Version 2 Management Information Base
RFC 1155 Structure and identification of management information for TCP/IP-based internets RFC 1907 Management Information Base for Version 2 of the Simple Network Management Protocol (SNMPv2) RFC 1406 Definitions of Managed Objects for the DS1 and E1 Interface types RFC 1908 Coexistence between Version 1 and Version 2 of the Internet-standard Network Management RFC 1407 Definitions of Managed Objects for the Framework DS3/E3 Interface Type RFC 3410 Introduction and Applicability Statements for Internet-Standard Management Framework RFC 3411 An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks RFC 3412 Message Processing and Dispatching for the Simple Network Management Protocol (SNMP) RFC 3413 Simple Network Management Protocol (SNMP) Applications RFC 3414 User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) RFC 3415 View-based Access Control Model (VACM) for the Simple Network Management Protocol ExtremeWare vendor MIB (includes ACL, MAC FDB, IP FDB, QoS policy and VLAN configuration and statistics, STP and others) RFC 1493 Definitions of Managed Objects for Bridges RFC 1650 Definitions of Managed Objects for the Ethernet-like Interface Types using SMIv2 RFC 1657 Definitions of Managed Objects for the Fourth Version of the Border Gateway Protocol (BGP-4) using SMIv2 RFC 2665 Definitions of Managed Objects for the Ethernet-like Interface Types RFC 2668 Definitions of Managed Objects for IEEE 802.3 Medium Attachment Units (MAUs) RFC 2787 Definitions of Managed Objects for the Virtual Router Redundancy Protocol RFC 2925 Definitions of Managed Objects for Remote Ping, Traceroute, and Lookup Operations IEEE-802.1x MIB
Management - Other: RFC 1866 Hypertext Markup Language - 2.0 RFC 2068 Hypertext Transfer Protocol -- HTTP/1.1 RFC 854 Telnet Protocol Specification HTML/ HTTP management Secure Shell 2 (SSH2) client and server Secure Copy 2 (SCP2) client and server Telnet client and server NetFlow version 1 export Configuration logging Multiple Images, Multiple Configs BSD System Logging Protocol (SYSLOG), with Multiple Syslog Servers 999 Local Messages (criticals stored across reboots) RFC 2030 Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI
697
Security Routing protocol authentication (see above) Secure Shell (SSHv2) & Secure Copy (SCPv2) with encryption/authentication RFC 1492 An Access Control Protocol, Sometimes Called TACACS RFC 2138 Remote Authentication Dial In User Service (RADIUS) RFC 2139 RADIUS Accounting IEEE 802.1x Port Based Network Access Control RADIUS Per-command Authentication Access Profiles on All Routing Protocols Access Profiles on All Management Methods Network Login (including DHCP / RADIUS integration) MAC Address Security / Lockdown Network Address Translation (NAT) Layer 2/3/4/7 Access Control Lists (ACLs)
Denial of Service Protection RFC 2267 Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing RPF (Unicast Reverse Path Forwarding) Control Wire-speed ACLs Rate Limiting by ACLs IP Broadcast Forwarding Control ICMP and IP-Option Response Control Server Load Balancing with Layer 3,4 Protection of Servers SYN attack protection Uni-directional Session Control CERT (http://www.cert.org) CA--97.28.Teardrop_Land -Teardrop and LAND attack IP Options Attack CA--98-13-tcp-denial-of-service CA--98.01.smurf CA--96.26.ping CA--96.21.tcp_syn_flooding CA--96.01.UDP_service_denial CA--95.01.IP_Spoofing_Attacks_and_Hijacked_ Terminal_Connections CA-2002-03: SNMP vulnerabilities Syndrop Nestea Latierra Newtear Bonk Winnuke Raped Simping Sping Ascend Stream
Host Attacks
698
MPLS - Standards and MIBs RFC 2212 Specification of Guaranteed Quality of Service RFC 2961 RSVP Overhead Refresh Reduction Extensions RFC 3032 MPLS Label Stack Encoding RFC 3031 Multiprotocol Label Switching Architecture RFC 3036 LDP Specification Martini drafts: draft-martini-circuit-encap-mpls-04.txt and draft-martini-l2circuit-trans-mpls-08.txt RSVP-TE LSP tunnel draft: draft-ietf-mpls-rsvp-lsp-tunnel-09.txt Traffic Engineering Extensions to OSPF: draft-katz-yeung-ospf-traffic-06.txt The Extreme MPLS implementation provides read-only (GET but not SET) support for a subset of the MPLS LSR MIB, as defined in the Internet Draft draft-ietf-mpls-lsr-mib-07.txt, and a subset of the MPLS LDP MIB, as defined in the Internet Draft draft-ietf-mpls-ldp-mib-07.txt.
ATM - Standards and MIBs The interface counters in MIB-II (RFC 1213) are supported for ATM. Support for read-only operations (GET operations, but not SET operations) is provided for selected objects in the standard ATM MIB (RFC 2515). Additional MIB objects to support ATM have also been added to the Extreme Networks private MIB.
SONET/SDH - Standards and MIBs GR-253-CORE, Synchronous Optical Network (SONET) Transport Systems: Common Generic Criteria, Bellcore, Issue 2, Revision 2, January 1999. ANSI T1.105.02-1995, Synchronous Optical Network (SONET)Payload Mappings, American National Standards Institute, 1995. ITU-T G.707 (03/96), Network Node Interfaces for the Synchronous Digital Hierarchy (SDH), March 1996. A subset of RFC 2558, Definitions of Managed Objects for the SONET/SDH Interface Type, has been implemented. The Virtual Tributary (VT) group and the Section/Line/Path interval tables were not implemented. Read-only support (GET operations, but not SET operations) has been implemented for the remainder of the MIB.
DiffServ - Standards and MIBs RFC 2474 Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers RFC 2475 An Architecture for Differentiated Services RFC 2597 Assured Forwarding PHB Group RFC 2598 An Expedited Forwarding PHB The Extreme Networks implementation of RED is based on the well-known paper Random Early Detection Gateways for Congestion Avoidance, by Sally Floyd and Van Jacobson. The Extreme Networks implementation of RED also complies with the recommendations published in RFC 2309, Recommendations on Queue Management and Congestion Avoidance in the Internet.
699
PPP - Standards and MIBs RFC 1661 The Point-to-Point Protocol (PPP) RFC 1662 PPP in HDLC-like Framing RFC 2615 PPP over SONET/SDH RFC 1334 PPP Authentication Protocols RFC 1994 PPP Challenge Handshake Authentication Protocol (CHAP) RFC 1989 An Application of the BGP Community Attribute in Multi-home Routing RFC 1332 The PPP Internet Protocol Control Protocol (IPCP) RFC 2878 PPP Bridging Control Protocol (BCP) RFC 1191 Path MTU Discovery RFC 3032 MPLS Label Stack Encoding The interface counters in MIB-II (RFC 1213) are supported for PPP. Support for read-only operations (GET operations, but not SET operations) is provided for the following PPP MIBs: RFC 1471 The Definitions of Managed Objects for the Link Control Protocol of the Point-to-Point Protocol RFC 1472 The Definitions of Managed Objects for the Security Protocols of the Point-to-Point Protocol RFC 1474 The Definitions of Managed Objects for the Bridge Network Control Protocol of the Point-to-Point Protocol RFC 1473 The Definitions of Managed Objects for the IP Network Control Protocol of the Point-to-Point Protocol
Flow Statistics- Standards and MIBs Because no standard MIBs are defined for managing the NetFlow function, Extreme Networks has defined and implemented an enterprise MIB that provides read-only support (GET but not SET operations) for NetFlow configuration parameters and status information. Any of the parameters that can be set with the configure flowstats commands can be accessed through using the MIB, and any of the status information displayed by the show flowstats command can also be read using the MIB. You can download the NetFlow enterprise MIB from the Extreme Networks World Wide Web site at the following URL:
http://www.extremenetworks.com/services/ documentation/
APS - Standards and MIBs GR-253-CORE, Synchronous Optical Network (SONET) Transport Systems: Common Generic Criteria, Bellcore, Issue 2, Revision 2, January 1999. ANSI T1.105.01-1998, Synchronous Optical Networks (SONET)Automatic Protection Switching, American National Standards Institute, 1998. ITU-T G.783 (04/97), Characteristics of Synchronous Digital Hierarchy (SDH) Equipment Functional Blocks, April 1997. Because no standard MIBs are defined for managing the APS function, Extreme Networks has defined and implemented an enterprise MIB that provides read-only support (GET but not SET operations) for APS configuration parameters and status information. Any of the parameters that can be set with the configure aps commands can be accessed through using the MIB, and any of the status information displayed by the show aps command can also be read using the MIB. You can download the APS enterprise MIB from the Extreme Networks World Wide Web site at the following URL:
http://www.extremenetworks.com/services/ software/
700
Index
Numerics
1d mode, STP 3DNS 802.1p slow path traffic 802.1p command support 802.1Q 802.1Q command support 802.1Q encapsulation, TLS 802.3ad load sharing 299 183 580 139 475, 522 580 475, 522 635, 636 86
A
AAL-5 access control lists access levels access list support for ATM module access list support for PoS modules access lists Alpine switch maximum entries BlackDiamond switch maximum entries default QoS profile default rule deleting description examples ICMP filter example ICMP traffic maximum entries permit-established example permit-established keyword restrictions Summit switch maximum entries verifying settings access profile configuration access profiles ExtremeWare Vista reverse mask SNMP Telnet Accounting and Routing Module. See ARM accounting bin configuration accounting configuration commands (table) accounting statistics CLI, retrieving statistics SNMP, retrieving statistics 461 226 45 490 568 229 229 228 228 229 226 229 232 227 229 230 228 229 229 229 441 57 247 62 55 436, 439 436 439 452 453
accounts creating deleting viewing ACLs Address Resolution Protocol. See ARP admin account Adspec advertising labels aging entries, FDB AIS-L event counter (SONET) AIS-P event counter (SONET) alarm actions alarm indication signalline (AIS-L) alarm indication signalpath (AIS-P) alarms Alarms, RMON Alpine switch access list maximum entries system temperature alternate mark inversion (AMI) AMI linecoding APS authentication, configuring configuration examples configuration overview configuration parameter values, resetting configuration quickstart enabling and disabling hello timers, configuring line group creating and deleting forced switch mode, configuring lockout, configuring manual switch mode, configuring port, adding port, deleting status information, displaying module redundancy nonrevertive mode, configuring port redundancy revertive mode, configuring single-module port redundancy example summary of support switch redundancy two-module port redundancy example
47 48 47 226 46 616 604 124 508 508 223 509 509 570 222 229 194 572 572 557 546 561 501 556 559 556 560 559 561 556 557 562 501 558 501 558 501 496 501 502
701
Index
two-switch redundancy example area 0, OSPF areas, OSPF ARM ARP and VLAN aggregation communicating with devices outside subnet configuring proxy ARP disabling additions on superVLAN incapable device proxy ARP between subnets proxy ARP, description of responding to ARP requests subVLANs superVLANs table, displaying Assured Forwarding (AF) PHB Asynchrononous Transfer Mode. See ATM atestReceivedEngineTime ATM overview port status information, displaying receive statistics, summary (table) transmit statistics, summary (table) ATM Adaption Layer. See AAL-5 ATM module feature summary ATM scrambling, configuring authentication APS, configuring PPP local database entry, creating port name and password, configuring protocol, configuring AuthnoPriv AuthPriv Automatic Protection Switching. See APS autonegotiation description autonomous system, description autopolarity
502 382 382 374 364 363 375 363 364 363 363 374 374 365 485, 533 67 461 461 466 466 466 458 467 580 557 517 516 516 69 69 81 401 82
B
B8ZS linecoding backbone area, OSPF basic configuration tasks BCP basic configuration tasks configuring default configuration for bridging Legacy OC-3 port pairs overview BCP and TLS BCP encapsulation BGP attributes autonomous system autonomous system path cluster community description features IGP synchronization 572 382 497 498 518 498 581 497 493, 512 638 580 454, 490 402 401 402 403 402 401 402 407
loopback interface peer groups creating description mandatory parameters neighbors redistributing to OSPF route aggregation route maps route reflectors route selection routing access policies BGP Next Hop Bi-directional rate shaping limitations loopback port maximum bandwidth settings maximum bandwidth settings (table) minimum bandwidth settings minimum bandwidth settings (table) binding labels, description of bipolar eight zero suppression (B8ZS) BlackDiamond switch access list maximum entries default slot configuration MSMs, synchronizing port configuration system temperature blackhole entries, FDB blue alarms BOOTP and UDP-Forwarding using BOOTP relay configuring BootROM menu, accessing prompt upgrading Border Gateway Protocol. See BGP BPDU tunneling bridged PPP links Bridging Control Protocol. See BCP bridging over PoS ports browser controls fonts setting up
407 407 407 407 408 411 406 259 403 411 254 611 146 149 147 147 147 148 148 594 572 229 461, 497 674 81 194 125, 233 570 370 53 370 675 675 675 299 580 498 59 58 57
C
cable length 571 Campus mode 238 C-bit T3 line framing 572 Challenge Handshake Authentication Protocol (CHAP) 580 Challenge Handshake Authentication Protocol. See CHAP CHAP 580 configuring 516 MD5 hash algorithm 511 overview 493, 511 CIR defined 655 CLI accounting statistics, retrieving 452 command history 43
702
Index
command shortcuts line-editing keys named components numerical ranges, BlackDiamond switch numerical ranges, Summit switch symbols syntax helper using clock source code points assignments, changing class selector default mapping tables, resetting mapping, configuring replacing code points, ingress replacing command history shortcuts syntax, understanding Command Line Interface. See CLI Command-Line Interface. See CLI Committed Information Rate See CIR common commands (table) communicating with devices outside subnet complete configuration download concatenated mode configuration downloading downloading complete downloading incremental logging primary and secondary saving changes schedule download uploading to file configure ppp bcp off ports configure ppp ipcp on ports configuring accounting bins E1 port encapsulation label advertisement filters LDP LDP label propagation filters LDP session timers MPLS interfaces MTU PHP QoS mappings resetting parameters T1 port TLS tunnel TTL propagation configuring accounting bins conservative label retention mode console connection controlling Telnet access conventions notice icons, About This Guide text, About This Guide CRC
40 42 41 41 41 42 40 571 480, 486, 486, 482, 481, 482, 528 533 533 530 529 530 659 43 40 39
CRC4 E1 line framing creating VLAN IDs customer VLAN IDs Cyclic Redundancy Check. See CRC
D
database applications, and QoS database overflow, OSPF debug trace support for ARM modules default gateway passwords settings settings, SONET (table) 468, slot configuration 461, STP domain users default VLAN delayed-down-time interval (PPP), configuring deleting a session denial of service protection destination-sensitive accounting, definition of DHCP and UDP-Forwarding DHCP relay, configuring DHCP server diagnostics display IP routing table Differentiated Services Code Points. See DSCP Differentiated Services. See DiffServ DiffServ code points assignments, changing 480, Assured Forwarding 486, Class Selector 486, default 486, Expedited Forwarding 486, mapping tables, configuring 481, mapping tables, resetting 482, QoS profile mapping assignments (table) 480, replacement, enabling 482, code points, ingress replacement, enabling configuring 480, mapping PHBs to QoS profiles (table) 486, DiffServ, configuring direct LSP disabling a switch port disabling route advertising (RIP) disconnecting a Telnet session displaying accounting statistics displaying MPLS information Distance Vector Multicast Routing Protocol. See DVMRP distance-vector protocol, description DLCS description guidelines limitations DNS description Domain Name Service. See DNS domains, STP downloading incremental configuration downstream unsolicited (DU), definition of downstream unsolicited mode 133 381 454 347 46 36 499 497 298 46 106 520 55 260 596 370 370 243 453
43 364 673 491 673 673 673 212 671 671 674 672 519 519 436 570 581 606 605 605 606 598 598 599 600 601 570 638 599 439 591 52 55 26 26 459
528 534 533 533 534 529 530 528 530 659 527 534 140 608 81 380 55 439 601 378 149 149 150 48 298 673 589 590
703
Index
downstream-on-demand mode drop probability (RED), configuring DSCP DSCP mapping DVMRP description routing access policies dynamic entries, FDB dynamic routes
590 483, 530 459, 654 460 454, 490 414 252 124, 233 361, 426
E
E1 port clock source 571 configuring 570 framing 572 EAPS common link 289 domain, creating and deleting 282 enabling and disabling a domain 285 enabling and disabling on a switch 285 polling timers, configuring 282 ring port, unconfiguring 286 shared port configuration rules 293 configuring the domain ID 292 creating and deleting 291 defining the mode 291 shared port, common link failure 290 shared ports 289 show eaps display fields (table) 287 status information, displaying 286, 292 switch mode, defining 282 ECMP. See IP route sharing EDP description 91 EDPCP 493, 514 ELRP description 339 master behavior 340 pre-master behavior 340 terms 339 EMISTP description 299 example 303 rules 304 enabling a switch port 81 encapsulation BCP 580 configuring 581 IPCP 580 equal cost LSPs 610 Equal Cost Multi-Path (ECMP) routing. See IP route sharing errors, port 193 ESF (Extended Super Frame) T1 line framing 572 ESRP activating standby hub 646 and IP multinetting 345 and STP 345 and TLS 646 and VLAN aggregation 334 and VRRP 352 BGP tracking 331
configuration example (figure) 649 description 323 diagnostic tracking 329 direct link 326 domains 335 dont count 335 environment tracking 329 example 342 failover 648 failover time 328 groups 336 host attach 334 linking switches 326 master behavior 327 definition 325 determining 326 electing 327 election algorithms 328 OSPF tracking 331 ping tracking 331 port restart 333 pre-master behavior 327 redundancy 647 restarting ports 333 RIP tracking 332 route table tracking 330, 648 selective forwarding 337 slave mode behavior 327 definition 325 super-VLAN 334 terms 324 tracking, description 329 tunnel endpoint VLAN 647 establishing a Telnet session 53 Events, RMON 222 EXP field 593 Expedited Forwarding (EF) PHB 485, 533 explicit route 622 export restrictions 36 Extreme Discovery Protocol Control Protocol. See EDPCP Extreme Discovery Protocol See EDP Extreme Loop Recovery Protocol. See ELRP Extreme Standby Router Protocol. See ESRP Extreme Standby Routing Protocol. See ESRP ExtremeWare factory defaults 36 features 31 ExtremeWare Vista accessing 58 browser controls 59 browser setup 57 capturing screen output 61 controlling access 57 fonts 58 home page 56, 58 navigating 58 saving changes 60 screen layout 58 screen resolution 57 status messages 59 VLAN configuration 56
704
Index
F
facility data link failover, ESRP failover, RSVP FDB adding an entry aging entries blackhole entries contents creating a permanent entry example displaying dynamic entries dynamic entries, limiting entries limiting entries non-aging entries permanent entries prioritizing entries QoS profile association scanning FEC binding labels definition of propagating labels file server applications, and QoS filters label advertisement label propagation fixed filter reservation style flow control flow redirection flow statistics configuration overview configuration parameters, resetting enabling and disabling flow record filter configuring enabling and disabling flow record timeout, configuring ping-check function, configuring source IP address, configuring status information, displaying fonts, browser Forwarding Database. See FDB Forwarding Equivalence Class. See FEC forwarding modes, SLB fragmentation framing C-bit CRC4 ESF (Extended Super Frame) M13 SF (Super Frame) full L3 functionality 571 648 623 477, 525 123 124 125 123 128 130 124 234 123 129, 233 124 125 129, 233 126 126 594 587, 589 604 134 606 605 618 82 184 212, 536 220, 545 216, 540 217, 219, 217, 219, 217, 220, 542 544 541 544 541 545 58 164 599 572 572 572 572 572 572 35
HDLC tunneling high drop precedence High-Level Data Link Control. See HDLC history command History, RMON home page
I
ICMP, access lists IEEE 802.1Q IEEE 802.3ad load sharing IGMP description snooping static IGMP, support for ATM module IGP path cost, overriding image downloading primary and secondary upgrading implicit NULL labels independent LSP control indirect LSP ingress QoS functions interfaces, router Interframe Gap Internet Group Management Protocol. See IGMP Interpacket Gap Intra-Subnet QoS. See ISQ IP address, entering IP Control Protocol. See IPCP IP multicast routing configuring description DVMRP description example IGMP description snooping PIM mode interoperation PIM multicast border router (PMBR) PIM-DM PIM-SM IP multinetting description example primary VLAN interface secondary VLAN interface using IP route sharing IP routing table IP unicast forwarding described longest prefix match throughput IP unicast packets, routing IP unicast routing BOOTP relay configuration examples configuring default gateway 227 100 86 415 415 416 490 611 667 668 667 594 591 608 654 360, 423 83 83 54 418 34, 413 414 419 415 415 415 415 414 414 367 369 367 367 368 362 453 434 596 596 596 608 370 365 365 359
G
GoGo mode, SLB Greenwich Mean Time Offsets (table) groups GVRP 168 75 68 477, 525
H
HDLC
705
Index
description DHCP relay ECMP enabling IP route sharing multinetting, description multinetting, example proxy ARP route maps router interfaces routing table dynamic routes multiple routes populating static routes verifying the configuration IPCP basic configuration for routing configuring overview IPCP encapsulation IPX configuration example configuring load sharing protocol filters protocol-based VLANs router interfaces routing access policies routing table dynamic routes populating static routes tagged VLANs verifying router configuration IPX/RIP configuring routing table,populating IPX/SAP configuring IS-IS redistributing routes ISP mode ISQ
33 370 365 362 367 369 363 362 360 361 361 361 361 365 499 518 493, 511 580 490 429 427 425 428 428 423 250 426 426 426 425 428 427 426 427 386 238
J
jumbo frame support LCP MRU MTU jumbo frames description enabling IP fragmentation path MTU discovery jumbo frames, supporting 454, 459, 494 566 567 84 84 85 84 595, 599
K
keys line-editing port monitoring 42 194
L
Label Edge Router. See LER
label object label processing by the NP data path (table) label retention modes label space partitioning (table) label stack definition of encapsulation Label Switch Path. See LSP Label Switch Router. See LSR labels advertising advertising modes and route maps binding configuring label advertisement filters configuring propagation filters definition of displaying mappings length locally assigned NULL label, advertising popping propagating remotely assigned retention modes space partitioning swapping label-switch forwarding algorithms LACP LCP jumbo frame MRU Quality Report option support LDP advertising label mappings in TLS configuring filters definition of hello-adjacency message exchange neighbor discovery protocol propagation filters configuring route maps session timers, configuring targeted sessions Legacy BCP LER definition of described liberal label retention mode license keys licensing basic functionality description full L3 functionality license keys ordering verifying line parity errors (SONET) linecoding AMI B8ZS line-editing keys Link Control Protocol. See LCP
604 590 606 594 606 605 587, 589 603 588 594 604 595 604 594 591 594 588, 589, 595 588 86 566 511 493, 511 636 605 589, 604 604 604 604 605, 606 605, 606 606 604 581 589 591 591 35 34 34 35 35 35 35 472, 508 572 572 572 42
706
Index
Link Quality Monitoring. See LQM Link Quality Report Protocol. See LQR link types configuring in RSTP link-state database link-state protocol, description load balancing methods, SLB load sharing algorithms configuring description dynamic load-sharing group, description master port static verifying the configuration load-sharing local routing database locally assigned labels LOF event counter (SONET) logging configuration changes QoS monitor logging in Logical Link Control. See LLC longest prefix match loopback detection loopback port LOP event counter (SONET) LOS event counter (SONET) loss of frame (LOF) loss of pointer (LOP) loss of signal (LOS) low drop precedence LPS tunnel, definition of LQM configuring overview LQR LSP and TLS and TLS tunnels control modes definition of direct equal cost indirect load-sharing multivendor support for indirect overriding IGP path cost precedence routing scaling LSR definition of egress, definition of functions (table) ingress, definition of LER, description of locally assigned labels remotely assigned labels
309 380 378 169 86 87 86 86 86 87 86 90 610 615 594 472, 508 212 145 46 596 572 147 508 508 508 509 508 533 590 515 511 493, 511 636 610 591 589 608 610 608 610 611 611 610 608 623 589 591 592 591 591 594 594
M13 T3 line framing 572 MAC-based security 129, 233 MAC-based VLANs 474, 522 description 112, 226 example 113 groups 112 guidelines 112 limitations 113 timed configuration download 113 maintenance mode, SLB 183 management access 45 management port 52 Management Switch Fabric Module. See MSM master port load sharing 87 maximum receive unit. See MRU maximum Telnet session 53 maximum transmission unit (MTU) 619 Maximum Transmission Unit. See MTU maximum transmission unit. See MTU MD5 hash algorithm 511 medium drop precedence 486, 533 mgmt VLAN 52 MIBs 62 minimum queue length threshold (RED), configuring 485, 532 MLPPP 578 mode of operation Alpine 3802 80 modular switch configuring load sharing 87 enabling and disabling ports 81 jumbo frames 84 load sharing example 89 port number 81 port-mirroring, virtual port 90 slot configuration 79 verifying load sharing 90 monitoring the switch 189 MPLS and OSPF AS 608 configuration example (figure) 612 configuring interfaces 598 definition of 587, 588, 589, 597 displaying information 601 label stack 593 overview 493 packet classification 527 resetting configuration parameters 601 routing IP unicast packets 608 sample network (figure) 588 shim layer 592 terms and acronyms (table) 589 MPLSCP configuration 513 overview 513 MRU 566 MSM 52 MTU 567 configuring 598 fragmentation 599 jumbo frames, supporting 599 multilink group 579 adding to VLAN 579
707
Index
Multilink PPP (MLPPP) multinetting. See IP multinetting multiple routes MultiProtocol Label Switch. See MPLS MultiProtocol Label Switching Control Protocol. See MPLSCP MultiProtocol Label Switching. See MPLS
578 361
N
names, VLANs 106 NAT creating rules 156 rule matching 156 native VLAN, PVST+ 306 NCP BCP, configuring 518 configuring 518 default configuration 497 IPCP, configuring 518 neighbor discovery protocol, LDP 604 NetFlow statistics support 495 Network Address Translation. See NAT Network Control Protocol. See NCP network login 73, 236 campus mode user login 242 disabling 244 settings, displaying 244 Next Hop Label Forward Entry (NHLFE), definition of 589 noAuthnoPriv 69 non-aging entries, FDB 124 Not-So-Stubby_Area. See NSSA npcard debug log messages (table) 455 NSSA. See OSPF
NSSA opaque LSAs point-to-point links redistributing routes redistributing to BGP router types routing access policies settings, displaying SFP algorithm SPF recalculation stub area virtual link wait interval, configuring
383 381 385 386 411 382 251 393 609 609 383 383 390
P
packet memory scanning PAP configuring overview Password authentication protocol (PAP) Password Authentication Protocol. See PAP passwords default forgetting path error message path message path MTU discovery path parity errors (SONET) path payload label mismatch (PLM-P) path tear message payload data scrambling payload data scrambling, configuring Penultimate Hop Popping. See PHP per-hop behaviors. See PHBs permanent entries, FDB Permanent Virtual Circuits. See PVC permit-established keyword persistence, SLB Per-VLAN Spanning Tree. See PVST+ PHBs Assured Forwarding (AF) Assured Forwarding classes (table) Class Selector Default drop precedence levels (table) Expedited Forwarding (EF) support and configuration PHP configuring definition of implicit NULL labels PIM mode interoperation multicast border router (PMBR) PIM-DM description PIM-SM description rendezvous point ping command ping-check PLM-P event counter (SONET) Point-to-Point Protocol (PPP) Point-to-Point Protocol. See PPP 191 580 516 493, 511 580 46 47 617 616 84 472, 508 474, 509 617 467, 514 467 125 228 175 485, 486, 486, 486, 486, 485, 485, 533 533 534 534 533 533 533
O
OAM 461 opaque LSAs, OSPF 381 Open Shortest Path First. See OSPF opening a Telnet session 53 Operations, Administrations and Maintenance. See OAM optical interfaces OC-12 multimode 491 OC-12 single-mode 491 OC-3 multimode 491 OC-3 single-mode 491 OC-3c/STM-1 single-mode 457 ordered LSP control 591 OSPF 454, 490 advantages 378 area 0 382 areas 382 backbone area 382 configuration example 391 consistency 381 database overflow 381 description 378, 380 display filtering 393 enabling 365 link type 385 link-state database 380 MPLS domain 608 normal area 383
599 589, 594 594 454, 490 415 415 414 414 414 49 182 472, 508 578
708
Index
poison reverse port autonegotiation BlackDiamond switch configuring on BlackDiamond switch enabling and disabling errors,viewing loopback monitoring display keys priority, STP receive errors software-controlled redundant configuring description statistics, viewing STP state, displaying STPD membership transmit errors port mode port translation mode, SLB port tunnel PoS port tunnel, configuring port tunneling Ethernet module, configuring MPLS tls- tunnel, configuring port-based VLANs port-mirroring and protocol analyzers description modular switch example stand-alone switch example tagged and untagged frames virtual port PoS module feature summary optical interface characteristics PPP authentication database entry, creating authentication, configuring BCP CHAP configuration parameter values, resetting delayed-down-time interval, configuring EDPCP Frame Check Sequence (FCS), configuring IPCP LCP Link Quality Monitoring (LQM), configuring LQR maximum receive unit (MRU) MPLSCP NCP BCP, configuring IPCP, configuring overview PAP payload data scrambling, configuring port name and password, configuring port status information, displaying PoS checksum, configuring PoS scrambling, configuring PPP links bridged routed
379 81 81 81 81 193 147 194 318 193 94 92 192 321 298 193 299, 318 167 564 495, 563 565 565 98 91 90 91 91 91 90 492 491 578 517 516 512 511 521 520 514 514 511 511 515 511 566 513
PPP user accounts 580 PPP username 580 PR defined 655 precedence levels 486, 533 primary image 668 priority slow path traffic 139 private community, SNMP 62 profiles, QoS 135 propagating labels 604 protocol analyzers, use with port-mirroring 91 protocol filters 104 protocol filters, IPX 428 Protocol Independent Multicast- Dense Mode. See PIM-DM Protocol Independent Multicast- Sparse Mode. See PIM-SM protocol-based VLANs 103, 474, 522 proxy ARP communicating with devices outside subnet 364 conditions 363 configuring 363 MAC address in response 363 responding to requests 363 subnets 364 proxy ARP, description 363 public community, SNMP 62 PVC port status information, displaying 467 PVST+ description 306 native VLAN 306 VLAN mapping 306 PVST+ mode 299
Q
QoS 802.1p and 802.1Q support 802.1p priority and RSVP applications blackhole buffer configuring configuring mapping database applications default QoS profiles description DiffServ model DiffServ support DiffServ, configuring displaying mapping information dot1p-to-exp examples MAC address source port VLAN EXP bits exp-to-dot1p FDB entry association file server applications functions maximum bandwidth minimum bandwidth priority 475, 522 138 615 132 137 135 477, 525 600 133 135 33, 131 592 477, 525 140 603 600 137 143 144 592 600 126 134 459, 477, 494, 525 135 135 135
518 518 493, 510 493, 511 514 516 520 514 514 580 580
709
Index
profile, configuring profiles default description parameters Random Early Detection (RED) RED support support overview traffic groupings blackhole broadcast/unknown rate limiting description explicit packet marking IP address MAC address source port VLAN traffic groupings (table) verifying video applications voice applications web browsing applications QoS monitor description logging real-time display QoS traffic grouping priorities, resetting Quality of Servce. See QoS Quality of Service. See QoS Quality Report option
478, 525 135 134 135 132 477, 525 458, 492 136 137 137 134 138 136 137 143 143 136 146 133 133 133 488, 536 145 145 145 145 132 511
R
RADIUS and TACACS+ 72, 263, 269 client configuration 265 description 72, 263 Merit server configuration (example) 267 per-command authentication 264 per-command configuration (example) 268 RFC 2138 attributes 265 servers 263 TCP port 265 Random Early Detection (RED) 132 Random Early Detection. See RED rapid root failover 299 Rapid Spanning Tree Protocol. See RSTP Rate shaping, bi-directional. See Bi-directional rate shaping RDI-L event counter (SONET) 472, 508 RDI-P event counter (SONET) 472, 508 receive errors 193 RED configuration information, displaying 488, 536 drop probability, configuring 483, 530 enhancements for ATM support 482 enhancements for PoS support 530 minimum queue length threshold, configuring 485, 532 operation compared to WRED (figure) 483, 531 PHB support 485, 533 ports, enabling and disabling 484, 532 red alarms 570 redundancy 647 redundant LSPs 622 redundant ports, software controlled configuring 94
redundant ports, software-controlled description typical configurations REI-L event counter (SONET) REI-P event counter (SONET) remote defect indicatorline (RDI-L) remote defect indicatorpath (RDI-P) remote error indicatorline (REI-L) remote error indicatorpath (REI-P) Remote Monitoring. See RMON remotely assigned label renaming a VLAN reservation attributes and styles (table) reservation confirmation message reservation error message reservation message reservation requests reservation styles reservation tear message reset to factory defaults Resource ReserVation Protocol. See RSVP responding to ARP requests reverse mask RFC 1332 RFC 1638 RFC 2878 RIP advantages configuration example description disabling route advertising enabling limitations poison reverse redistributing routes redistributing to BGP routing access policies routing table entries split horizon triggered updates version 2 RMON alarm actions Alarms group Events group features supported History group probe Statistics group route map and LDP propagation filters labels route maps BGP changing creating description example goto entries IP unicast routing match entries match operation keywords (table) processing set entries
92 92 508 508 509 509 509 509 594 106 618 617 617 617 615 618 617 672
363 247 580 581 580 454, 490 378 388 378, 379 380 365 378 379 386 411 249 379 379 379 380 223 222 222 221 222 221 221 605, 606 606 259 259 255 255 258 256 362 256 256 258 256
710
Index
set operation keywords (table) route recording, RSVP route sharing. See IP route sharing route table tracking, ESRP routed PPP links router interfaces router licensing basic functionality description full L3 functionality license keys ordering verifying router types, OSPF routing access policies access profile applying changing configuring creating types BGP deny DVMRP examples DVMRP OSPF PIM RIP IPX none OSPF permit PIM removing RIP using Routing Information Protocol. See RIP routing IP unicast packets routing over PoS ports routing table, populating routing table, populating IPX routing. See IP unicast routing RSTP alternate port auto link backup port broadcast link configuring link types designated port designated port rapid behavior edge link edge ports operation overview point-to-point link port roles propogating topology information receiving bridge behavior root port root port rapid behavior terms timers RSVP
257 621 648 580 360, 423 34 34 35 35 35 35 382 249 254 246 246 246 254 246 252 253 252 253 249 250 246 251 246 253 255 249 245 608 499 361 426 308 308 308 308 309 308 312 308 308 310 306 308 308 312 312 308 311 307 309
alternate paths and QoS bandwidth accounting definition of explicit route fixed filter reservation style label label request LSP scaling message types objects path error message path message path tear message ping health checking record route redundant LSPs reservation confirmation message reservation error message reservation message reservation requests reservation styles reservation tear message route recording RSVP-TE RSVP-TE, definition of session attribute shared explicit reservation style state traffic engineering extensions tunneling wildcard reservation style RSVP-TE, definition of
622 615 619 589, 615 621, 622 618 620 620 623 616 620 617 616 617 623 621 622 617 617 617 615 618 617 621 615 589 621 618 619 615 620 618 589
S
SAP saving changes using ExtremeWare Vista saving configuration changes scanning the FDB scheduling configuration download screen resolution, ExtremeWare Vista SD BER event counter (SONET) SDH secondary image section parity errors (SONET) security licensing description obtaining security name Server Load Balancing See SLB Server Load Balancing. See SLB service provide service-check sessions, deleting SF (Super Frame) T1 line framing SF BER event counter (SONET) shared explicit reservation style shim header described illustration shim layer shortcuts, command showing MPLS information signal degrade bit error rate (SD BER) 490 60 671 126 674 57 473, 508 458, 493 668 472, 508 36 36 68 590 182 55 572 472, 508 618 589 592 592 592 40 601 474, 509
711
Index
signal failure bit error rate (SF BER) 474, 509 Simple Network Management Protocol. See SNMP SLB 3DNS support 183 active-active 178 active-active operation 178 client persistence 175 components 160 description 159 failover 178 forwarding mode 164 gateway ping-checking 178 GoGo mode 168 health checking 182 high availability 176 host-route 162 least connections 170 load balancing methods 169 maintenance mode 183 manual fail-back 181 nodes 160 persistence 175 ping-check 182 pools 161 port translation mode 167 priority mode 170 proxy ARP 162 proxy client persistence 175 ratio 169 round-robin 169 service-check 182 standard virtual servers 161 sticky persistence 175 subnet-route 162 tcp-port-check 182 traffic type 163 translation mode 166 transparent mode 164 VIPs 161 virtual servers 161 wildcard virtual servers 161 slot automatic configuration 79 clearing 80 manually configuring 79 mismatch 79 packet memory scanning 191 slow path traffic 139 SNAP protocol 105 SNMP accounting statistics, retrieving 453 community strings 62 configuring 62 controlling access 62 read access 62 read/write access 62 settings, displaying 63 supported MIBs 62 system contact 62 system location 63 system name 63 trap receivers 62 using 61 SNMPEngineBoots 67
snmpEngineID 67 SNMPEngineTime 67 SNTP configuring 73 Daylight Savings Time 73 description 73 example 77 Greenwich Mean Time offset 73 Greenwich Mean Time Offsets (table) 75 NTP servers 73 software licensing security features 36 SSH2 protocol 36 software-controlled redundant ports typical configuration 92 SONET clock source 468, 469, 499, 505 configuration parameter values, resetting 472, 507 configuration parameter values, summary (table) 468, 499 error and alarm events (table) 473, 508 framing type 468, 469, 499, 504 overview 458, 493 Path Trace identifier 468, 471, 499, 506 port status information, displaying 472, 507 Section Trace byte 468, 470, 499, 506 Section Trace identifier 468, 470, 499, 506 Signal Degrade threshold 468, 470, 499, 505 Signal Fail threshold 468, 469, 499, 505 Signal Label 468, 471, 499, 507 statistics (table) 472, 508 space partitioning, labels 594 Spanning Tree Protocol. See STP speed, ports 82 split horizon 379 SSH2 protocol authentication key 271 description 36, 56, 270 enabling 270 predefined clients 270 TCP port number 270 stand-alone switch enabling and disabling ports 81 jumbo frames 84 load sharing 87 load sharing example 89 port-mirroring, virtual port 90 verifying load sharing 90 static IGMP 416 static routes 361, 426 statistics port 192 VLAN, per port 109 Statistics, RMON 221 status monitoring 189 STP 1D mode 299 advanced example 303 and ESRP 345 and VLANs 298 and VRRP 352 basic configuration example 300 BPDU tunneling 299 bridge priority 318
712
Index
configurable parameters configuration examples configuring description displaying settings domains EMISTP description example rules ExtremeWare commands forward delay hello time max age overview path cost port mode port modes port priority port state, displaying PVST+ description mode rapid root failover rules and restrictions StpdID support STPD modes stub area, OSPF sub-VLAN Summit switch access list maximum entries super-VLAN SVC switch monitoring RMON features Switched Virtual Connection. See SVC synchronizing MSMs Synchronous Digital Hierarchy. See SDH Synchronous Optical Network. See SONET syntax, understanding system contact, SNMP system location, SNMP system name, SNMP system temperature
317 318 317 33 321 298 299 303 304 477, 525 317 317 317 297 318 318 299 318 321 306 299 299 317 299, 318 477, 525 298 383 372 229 334, 372 461 189 221 674 39 62 63 63 194
T
T1 port cable length clock source configuring facility data link framing linecoding loopback detection TACACS+ and RADIUS description servers, specifying tag mapping tag nesting tagging, VLAN T-Control 571 571 570 571 572 572 572 72, 263, 269 73, 269 269 475, 523 476, 523 100 653
defined 654 tcp-port-check 182 technical support 694 Telnet connecting to another host 53 controlling access 55 disconnecting a session 55 maximum sessions 53 opening a session 53 using 53 Terminal Access Controller Access Control System Plus. See TACACS+ TFTP server 667 using 672 timed configuration download, MAC-based VLANs 113 TLS 802.1Q encapsulation 635, 636 advertising label mappings 636 and BCP 638 and ESRP 646 and LSPs 636 basic configuration example (figure) 642 characteristics 638 configuration example using ESRP (figure) 649 configuration example using PPP transparent mode (figure) 645 definition of 590, 635 deleting tunnels 640 displaying configuration information 640 loopback mode 636 OSPF routes 636 tunnel endpoint VLAN 647 tunnel endpoints, configuring 636 tunnel labels 636 tunnel, definition of 590 tunnels and LSP 610 tunnels, configuring 638 VLAN IDs 638 VLAN label mappings 638 VLAN labels 638 traceroute command 49 traffic engineering (TE), definition of 590 traffic groupings 136 translation mode, SLB 166 transmit errors 193 Transparent LAN Services. See TLS transparent mode, SLB 164 triggered updates 379 trunks 101 Tspec object 615, 616 tunnel endpoint VLAN 647 tunnel labels 636 tunneling 110, 620
U
UDP-Forwarding and BOOTP and DHCP configuring description example profiles VLANs 370 370 371 370 371 371 371
713
Index
upgrading the image uploading the configuration user accounts, PPP user name username, PPP users access levels authenticating creating default viewing
V
VC VC tunnel, definition of video applications, and QoS viewing accounts VIPs, SLB virtual circuit identifier virtual circuit, definition of Virtual Circuit. See VC Virtual LANs. See VLANs virtual link, OSPF virtual path identifier virtual private LAN (VPN), definition of virtual router, VRRP VLAN aggregation description limitations properties proxy ARP secondary IP address sub-VLAN super-VLAN VLAN IDs creating VLAN labels VLAN tagging VLAN tags VLANs and ExtremeWare Vista and STP assigning a tag benefits configuration examples configuring default description disabling route advertising displaying settings IP fragmentation MAC-based description example groups guidelines limitations timed configuration download mgmt mixing port-based and tagged names port-based protocol filters protocol-based 461 590 133 47 161 461 590 383 461 590 348 372 374 374 375 372 372 372 438 638 100 580 56 298 101 97 107 107 106 32 380 108 85 112, 226 113 112 112 113 113 52 103 106 98 104 103
protocol-based, IPX 428 renaming 106 routing 365, 427 statistics, per port 109 tag mapping 475, 523 tag nesting 476, 523 tagged 100 tagged VLAN 802.1p and 802.1Q functions 475, 522 trunks 101 tunneling 110 types 98 UDP-Forwarding 371 vMAN tunneling configuring 110, 583 description 110 example 110 voice applications, QoS 133 VPLS, definition of 590 VRRP advertisement interval 351, 355 and ESRP 352 and Spanning Tree 352 backup router 348 configuration parameters (table) 354 default gateway 347 description 347 electing the master 351 examples 356 interfaces 348 IP address 348, 355 IP address owner 348 MAC address 348 master determining 348 master down interval 351, 355 master router 348 multicast address 351 operation 352 ping tracking 349 port restart 352 preempt mode 355 priority 348, 351, 355 redundancy 353 restarting ports 352 route table tracking 349 skew time 351, 355 tracking, description 348 virtual router 348 virtual router identifier (VRID) 348, 354 virtual router MAC address 348, 351, 353 VLAN tracking 349 VRRP router 348
W
Web access, controlling web browsing applications, and QoS Weighted RED. See WRED wildcard reservation style WRED drop probability 481, 482, 483, 528, 530, operation compared to RED (figure) 483, 57 133 618 531 531
714
Index
xmodem
667
Y
yellow alarms 570
715
Index
716